Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VInxSo1xrN.exe

Overview

General Information

Sample name:VInxSo1xrN.exe
renamed because original name is a hash value
Original sample name:2a18a597200994af2b1eaa57d789f979.exe
Analysis ID:1538170
MD5:2a18a597200994af2b1eaa57d789f979
SHA1:8c6b392ef200050c0efe99a846aff25f33a3eb37
SHA256:43c13796f343898e53317703cd4178e7e00efcf8b1aa20ce6a5d349ddca5949e
Tags:64exeMeterpretertrojan
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Yara signature match

Classification

  • System is w10x64
  • VInxSo1xrN.exe (PID: 4408 cmdline: "C:\Users\user\Desktop\VInxSo1xrN.exe" MD5: 2A18A597200994AF2B1EAA57D789F979)
  • cleanup
{"Type": "Metasploit Connect", "IP": "188.166.177.132", "Port": 443}
SourceRuleDescriptionAuthorStrings
VInxSo1xrN.exeJoeSecurity_MetasploitPayload_2Yara detected Metasploit PayloadJoe Security
    VInxSo1xrN.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      VInxSo1xrN.exeWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x1811:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      VInxSo1xrN.exeWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x1881:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      VInxSo1xrN.exeWindows_Trojan_Metasploit_91bc5d7dunknownunknown
      • 0x18d7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
        • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
        00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
        • 0x81:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
        00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
        • 0xd7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
        00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.VInxSo1xrN.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            0.2.VInxSo1xrN.exe.140000000.0.unpackWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
            • 0x1659:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
            0.2.VInxSo1xrN.exe.140000000.0.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
            • 0x16c9:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
            0.2.VInxSo1xrN.exe.140000000.0.unpackWindows_Trojan_Metasploit_91bc5d7dunknownunknown
            • 0x171f:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
            0.0.VInxSo1xrN.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              Click to see the 3 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: VInxSo1xrN.exeAvira: detected
              Source: VInxSo1xrN.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "188.166.177.132", "Port": 443}
              Source: VInxSo1xrN.exeReversingLabs: Detection: 86%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: VInxSo1xrN.exeJoe Sandbox ML: detected
              Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
              Source: C:\Users\user\Desktop\VInxSo1xrN.exeCode function: 0_2_00000001400040D6 LoadLibraryA,WSASocketA,connect,recv,0_2_00000001400040D6
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

              System Summary

              barindex
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Detects Meterpreter stager payload Author: ditekSHen
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: VInxSo1xrN.exe, type: SAMPLEMatched rule: MALWARE_Win_MeterpreterStager author = ditekSHen, description = Detects Meterpreter stager payload
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
              Source: C:\Users\user\Desktop\VInxSo1xrN.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: VInxSo1xrN.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\Desktop\VInxSo1xrN.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\VInxSo1xrN.exeSection loaded: mswsock.dllJump to behavior
              Source: VInxSo1xrN.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: initial sampleStatic PE information: section where entry point is pointing to: .ewti
              Source: VInxSo1xrN.exeStatic PE information: real checksum: 0x525c should be: 0x5414
              Source: VInxSo1xrN.exeStatic PE information: section name: .ewti
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: VInxSo1xrN.exe, 00000000.00000002.3275360351.0000000000466000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: VInxSo1xrN.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.VInxSo1xrN.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              OS Credential Dumping1
              Security Software Discovery
              Remote ServicesData from Local System2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
              System Information Discovery
              Remote Desktop ProtocolData from Removable Media1
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              VInxSo1xrN.exe87%ReversingLabsWin64.Backdoor.Meterpreter
              VInxSo1xrN.exe100%AviraTR/Crypt.XPACK.Gen7
              VInxSo1xrN.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              188.166.177.132
              unknownNetherlands
              14061DIGITALOCEAN-ASNUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1538170
              Start date and time:2024-10-20 17:56:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 35s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:VInxSo1xrN.exe
              renamed because original name is a hash value
              Original Sample Name:2a18a597200994af2b1eaa57d789f979.exe
              Detection:MAL
              Classification:mal96.troj.winEXE@1/0@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 1
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • VT rate limit hit for: VInxSo1xrN.exe
              No simulations
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              DIGITALOCEAN-ASNUSbin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 138.197.177.4
              arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
              • 142.93.208.241
              Setup.exeGet hashmaliciousLummaCBrowse
              • 104.131.68.180
              SecuriteInfo.com.Win32.TrojanX-gen.27480.13449.exeGet hashmaliciousUnknownBrowse
              • 159.89.214.31
              la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
              • 165.227.165.202
              la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
              • 174.138.36.13
              la.bot.m68k.elfGet hashmaliciousUnknownBrowse
              • 198.199.83.188
              la.bot.arm7.elfGet hashmaliciousUnknownBrowse
              • 162.243.19.47
              la.bot.arm7.elfGet hashmaliciousUnknownBrowse
              • 103.253.147.242
              SecuriteInfo.com.Win64.Evo-gen.31489.1077.exeGet hashmaliciousXmrigBrowse
              • 139.59.168.209
              No context
              No context
              No created / dropped files found
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):1.3153376257975895
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:VInxSo1xrN.exe
              File size:7'168 bytes
              MD5:2a18a597200994af2b1eaa57d789f979
              SHA1:8c6b392ef200050c0efe99a846aff25f33a3eb37
              SHA256:43c13796f343898e53317703cd4178e7e00efcf8b1aa20ce6a5d349ddca5949e
              SHA512:ca325320594c7a4a9e6cb4a90671d408521f035f6a01b432f65153592baa05a0fbce9ae353040f81bcfccb5233fed3408348453424cf3ea46e16e9b7124cb0c3
              SSDEEP:24:eFGStrJ9u0/6PEnZdkBQAVoakfwKLqFeNDMSCvOXpmB:is0CokBQVxolSD9C2kB
              TLSH:DFE1751337144EB6D87C057D56E2FDA7B1AC4E283B3B42B68E2803173932124A9F4E19
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9$..}E..}E..}E..Z...~E..}E~..E..t=..|E..t=..|E..Rich}E..................PE..d...}<.K..........#......0...........@.........@...
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140004000
              Entrypoint Section:.ewti
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x4BC63C7D [Wed Apr 14 22:06:53 2010 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:b4c6fff030479aa3b12625be67bf4914
              Instruction
              cld
              dec eax
              and esp, FFFFFFF0h
              call 00007FB13885C4B1h
              inc ecx
              push ecx
              inc ecx
              push eax
              push edx
              push ecx
              push esi
              dec eax
              xor edx, edx
              dec eax
              mov edx, dword ptr [edx+60h]
              dec eax
              mov edx, dword ptr [edx+18h]
              dec eax
              mov edx, dword ptr [edx+20h]
              dec eax
              mov esi, dword ptr [edx+50h]
              dec eax
              movzx ecx, word ptr [edx+4Ah]
              dec ebp
              xor ecx, ecx
              dec eax
              xor eax, eax
              lodsb
              cmp al, 61h
              jl 00007FB13885C3E4h
              sub al, 20h
              inc ecx
              ror ecx, 0Dh
              inc ecx
              add ecx, eax
              loop 00007FB13885C3CFh
              push edx
              dec eax
              mov edx, dword ptr [edx+20h]
              mov eax, dword ptr [edx+3Ch]
              inc ecx
              push ecx
              dec eax
              add eax, edx
              cmp word ptr [eax+18h], 020Bh
              jne 00007FB13885C458h
              mov eax, dword ptr [eax+00000088h]
              dec eax
              test eax, eax
              je 00007FB13885C449h
              dec eax
              add eax, edx
              push eax
              inc esp
              mov eax, dword ptr [eax+20h]
              mov ecx, dword ptr [eax+18h]
              dec ecx
              add eax, edx
              jecxz 00007FB13885C438h
              dec eax
              dec ecx
              dec ebp
              xor ecx, ecx
              inc ecx
              mov esi, dword ptr [eax+ecx*4]
              dec eax
              add esi, edx
              dec eax
              xor eax, eax
              lodsb
              inc ecx
              ror ecx, 0Dh
              inc ecx
              add ecx, eax
              cmp al, ah
              jne 00007FB13885C3D3h
              dec esp
              add ecx, dword ptr [esp+08h]
              inc ebp
              cmp ecx, edx
              jne 00007FB13885C3BAh
              pop eax
              inc esp
              mov eax, dword ptr [eax+24h]
              dec ecx
              add eax, edx
              inc cx
              mov ecx, dword ptr [eax+ecx*2]
              inc esp
              mov eax, dword ptr [eax+1Ch]
              dec ecx
              add eax, edx
              inc ecx
              mov eax, dword ptr [eax+ecx*4]
              inc ecx
              pop eax
              dec eax
              add eax, edx
              inc ecx
              pop eax
              pop esi
              pop ecx
              pop edx
              inc ecx
              pop eax
              inc ecx
              pop ecx
              inc ecx
              pop edx
              dec eax
              sub esp, 20h
              inc ecx
              Programming Language:
              • [IMP] VS2005 build 50727
              • [ASM] VS2008 SP1 build 30729
              • [LNK] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x42000x6c.ewti
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x42700x8.ewti
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x30000x18.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x104e0x1200a4a5deae25708a9e05f50bcad7075c86False0.025390625data0.16810049402497224IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x30000x840x200253b88122c36b6951090c6288183e4aeFalse0.15625data0.9630867345987311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .ewti0x40000x2780x400b4275ab464ce66743fa90163d79d4643False0.529296875data4.303720215479542IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              DLLImport
              KERNEL32.dllVirtualAlloc, ExitProcess
              TimestampSource PortDest PortSource IPDest IP
              Oct 20, 2024 17:56:59.282205105 CEST49704443192.168.2.5188.166.177.132
              Oct 20, 2024 17:56:59.282243013 CEST44349704188.166.177.132192.168.2.5
              Oct 20, 2024 17:56:59.282428026 CEST49704443192.168.2.5188.166.177.132
              TimestampSource PortDest PortSource IPDest IP
              Oct 20, 2024 17:57:50.301189899 CEST5359513162.159.36.2192.168.2.5
              Oct 20, 2024 17:57:51.107572079 CEST53561331.1.1.1192.168.2.5

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:11:56:58
              Start date:20/10/2024
              Path:C:\Users\user\Desktop\VInxSo1xrN.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\VInxSo1xrN.exe"
              Imagebase:0x140000000
              File size:7'168 bytes
              MD5 hash:2A18A597200994AF2B1EAA57D789F979
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000000.2035464855.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:40.7%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:85.7%
                Total number of Nodes:7
                Total number of Limit Nodes:1
                execution_graph 34 140004000 37 1400040d6 LoadLibraryA 34->37 41 14000411b 37->41 38 14000411f WSASocketA 39 14000413e connect 38->39 40 14000415e recv 39->40 39->41 40->41 41->38 41->39 41->40 42 1400041ee 41->42 42->42

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00000001400040D6 1 Function_0000000140004000 1->0

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3275434407.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.3275416900.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_140000000_VInxSo1xrN.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoadSocketconnectrecv
                • String ID: unMa$ws2_32
                • API String ID: 1878761123-2325342229
                • Opcode ID: 5f618063190c484947275fde59f4432e44e1d23342846cae0cf92d0bfe8b3de9
                • Instruction ID: b0ea8ab1f3fa553c0986a8616b821665abafa190a86ee8e6c2cc83238e467db0
                • Opcode Fuzzy Hash: 5f618063190c484947275fde59f4432e44e1d23342846cae0cf92d0bfe8b3de9
                • Instruction Fuzzy Hash: E721E6E175525828FA2792A33D17FF544456B29FE0F1840207F1E4F7D5DC68C6C2411D