Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
whmwtxuO00.exe

Overview

General Information

Sample name:whmwtxuO00.exe
renamed because original name is a hash value
Original sample name:592474a6afcaa6a1147524a4a24ae9a535cd58f043e218ab64ae218ee7229f42.exe
Analysis ID:1505121
MD5:c457b64b8faf93fb23adb3d3b6a6cb78
SHA1:b7171be5e8a552346f4f44148c8935ed52ba90d6
SHA256:592474a6afcaa6a1147524a4a24ae9a535cd58f043e218ab64ae218ee7229f42
Infos:

Detection

Metasploit, Meterpreter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
Yara detected Meterpreter
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Yara signature match

Classification

  • System is w10x64
  • whmwtxuO00.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\whmwtxuO00.exe" MD5: C457B64B8FAF93FB23ADB3D3B6A6CB78)
  • cleanup
{"Type": "tcp", "IP": "80.76.176.23", "Port": "4440"}
SourceRuleDescriptionAuthorStrings
whmwtxuO00.exeJoeSecurity_MetasploitPayload_2Yara detected Metasploit PayloadJoe Security
    whmwtxuO00.exeJoeSecurity_MeterpreterYara detected MeterpreterJoe Security
      whmwtxuO00.exeWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
      • 0x2dd9e:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
      whmwtxuO00.exeWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x2dc77:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      • 0x2deaf:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      whmwtxuO00.exeWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x2dce3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      • 0x2df1b:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
      • 0x139e:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
      00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x1277:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      • 0x14af:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x12e3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      • 0x151b:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_MeterpreterYara detected MeterpreterJoe Security
        00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmpMALWARE_Win_MeterpreterDetects Meterpreter payloadditekSHen
        • 0xa58:$s1: PACKET TRANSMIT
        • 0xa68:$s2: PACKET RECEIVE
        • 0x9c8:$s3: \\%s\pipe\%s
        • 0xa08:$s3: \\%s\pipe\%s
        • 0x940:$s4: %04x-%04x:%s
        • 0x812c:$s5: server.dll
        Click to see the 10 entries
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: whmwtxuO00.exeAvira: detected
        Source: whmwtxuO00.exeMalware Configuration Extractor: Meterpreter {"Type": "tcp", "IP": "80.76.176.23", "Port": "4440"}
        Source: whmwtxuO00.exeReversingLabs: Detection: 95%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: whmwtxuO00.exeJoe Sandbox ML: detected

        Networking

        barindex
        Source: Yara matchFile source: whmwtxuO00.exe, type: SAMPLE
        Source: Yara matchFile source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Malware configuration extractorURLs: 80.76.176.23
        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 80.76.176.23:4440
        Source: Joe Sandbox ViewASN Name: ORNRU-ASKvant-telecomuplinkRU ORNRU-ASKvant-telecomuplinkRU
        Source: unknownTCP traffic detected without corresponding DNS query: 80.76.176.23
        Source: unknownTCP traffic detected without corresponding DNS query: 80.76.176.23

        System Summary

        barindex
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Detects Meterpreter payload Author: ditekSHen
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: whmwtxuO00.exe, type: SAMPLEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
        Source: C:\Users\user\Desktop\whmwtxuO00.exeMutant created: NULL
        Source: C:\Users\user\Desktop\whmwtxuO00.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: whmwtxuO00.exeReversingLabs: Detection: 95%
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeSection loaded: rasadhlp.dllJump to behavior
        Source: whmwtxuO00.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: initial sampleStatic PE information: section where entry point is pointing to: .rdqu
        Source: whmwtxuO00.exeStatic PE information: real checksum: 0x33d74 should be: 0x33f2c
        Source: whmwtxuO00.exeStatic PE information: section name: .rdqu
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: whmwtxuO00.exe, 00000000.00000002.3301351165.00000000005AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllww
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\whmwtxuO00.exeNtProtectVirtualMemory: Indirect: 0x140009B63Jump to behavior
        Source: C:\Users\user\Desktop\whmwtxuO00.exeNtAllocateVirtualMemory: Indirect: 0x140009B12Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: whmwtxuO00.exe, type: SAMPLE
        Source: Yara matchFile source: whmwtxuO00.exe, type: SAMPLE
        Source: Yara matchFile source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        1
        Abuse Elevation Control Mechanism
        OS Credential Dumping1
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        DLL Side-Loading
        LSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable Media1
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        whmwtxuO00.exe96%ReversingLabsWin64.Backdoor.Meterpreter
        whmwtxuO00.exe100%AviraTR/Crypt.XPACK.Gen7
        whmwtxuO00.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        80.76.176.230%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        80.76.176.23true
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        80.76.176.23
        unknownRussian Federation
        34629ORNRU-ASKvant-telecomuplinkRUtrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1505121
        Start date and time:2024-09-05 19:52:45 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 33s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:whmwtxuO00.exe
        renamed because original name is a hash value
        Original Sample Name:592474a6afcaa6a1147524a4a24ae9a535cd58f043e218ab64ae218ee7229f42.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@1/0@0/1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • VT rate limit hit for: whmwtxuO00.exe
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        80.76.176.23prompt.exeGet hashmaliciousMetasploit, MeterpreterBrowse
          shell.batGet hashmaliciousUnknownBrowse
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ORNRU-ASKvant-telecomuplinkRUprompt.exeGet hashmaliciousMetasploit, MeterpreterBrowse
            • 80.76.176.23
            shell.batGet hashmaliciousUnknownBrowse
            • 80.76.176.23
            xd.x86.elfGet hashmaliciousMiraiBrowse
            • 188.116.169.218
            RuntimeBroker.exeGet hashmaliciousAsyncRATBrowse
            • 188.116.183.47
            Gq7FlDf6cE.elfGet hashmaliciousMiraiBrowse
            • 188.116.169.225
            http://195.19.93.215/?+bGFyZ2VwaXBlc0BzY2h1bGVyZ3JvdXAuY29tGet hashmaliciousHTMLPhisherBrowse
            • 195.19.93.215
            ry3HbSIIPt.elfGet hashmaliciousMiraiBrowse
            • 188.116.170.113
            01vS5TqGur.elfGet hashmaliciousMiraiBrowse
            • 188.116.169.253
            skyljne.mips.elfGet hashmaliciousMiraiBrowse
            • 188.116.170.148
            No context
            No context
            No created / dropped files found
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):5.929886738071257
            TrID:
            • Win64 Executable GUI (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:whmwtxuO00.exe
            File size:208'384 bytes
            MD5:c457b64b8faf93fb23adb3d3b6a6cb78
            SHA1:b7171be5e8a552346f4f44148c8935ed52ba90d6
            SHA256:592474a6afcaa6a1147524a4a24ae9a535cd58f043e218ab64ae218ee7229f42
            SHA512:0810734f3717783de50b02b64e60dfbe210ecc43be4a013c6f3a659b31122e3195a0fcd2adec2cf14be3d6c4ab6405af7c17ef8ac2ff8b30d7eb5a6c59e89ebc
            SSDEEP:3072:s0E+XfB1GKd/Pq6/Okg15ZLMvTcF1jjS1pE8V4f46ZgLyj6nGycH6My+:ssdaGOBZgvT6XypES4TjFT6
            TLSH:1F146C5632A400BAE977913CC6938B07E7B6B44A07B097CF076443BAAF1B7D2653D721
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9$..}E..}E..}E..Z...~E..}E~..E..t=..|E..t=..|E..Rich}E..................PE..d...}<.K..........#......@...........@.........@...
            Icon Hash:00928e8e8686b000
            Entrypoint:0x140004000
            Entrypoint Section:.rdqu
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:TERMINAL_SERVER_AWARE
            Time Stamp:0x4BC63C7D [Wed Apr 14 22:06:53 2010 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:b4c6fff030479aa3b12625be67bf4914
            Instruction
            dec ebp
            pop edx
            inc ecx
            push edx
            push ebp
            dec eax
            mov ebp, esp
            dec eax
            sub esp, 20h
            dec eax
            and esp, FFFFFFF0h
            call 00007F7B8CECB9E5h
            pop ebx
            dec eax
            add ebx, 00005E37h
            call ebx
            dec eax
            add ebx, 0002B1B4h
            dec ecx
            mov eax, ebx
            push 00000004h
            pop edx
            call eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            clc
            add byte ptr [eax], al
            add byte ptr [esi], cl
            pop ds
            mov edx, 09B4000Eh
            int 21h
            mov eax, 21CD4C01h
            push esp
            push 70207369h
            jc 00007F7B8CECBA51h
            jc 00007F7B8CECBA44h
            insd
            and byte ptr [ebx+61h], ah
            outsb
            outsb
            outsd
            je 00007F7B8CECBA02h
            bound esp, dword ptr [ebp+20h]
            jc 00007F7B8CECBA57h
            outsb
            and byte ptr [ecx+6Eh], ch
            and byte ptr [edi+ecx*2+53h], al
            and byte ptr [ebp+6Fh], ch
            or eax, 00240A0Dh
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            mov ebx, FF717351h
            xor byte ptr [1D30FF22h], bl
            and bh, bh
            xor byte ptr [FC61B922h], bl
            and bl, bl
            xor byte ptr [FD61B922h], bl
            and al, byte ptr [eax+esi+61B9221Dh]
            retn F522h
            xor byte ptr [9A48F622h], bl
            and bh, dh
            xor byte ptr [8E48F622h], bl
            and ch, dh
            xor byte ptr [1C30FF22h], bl
            and bh, byte ptr [ebx]
            xor byte ptr [FD498222h], bl
            and ah, ah
            xor byte ptr [00000022h], bl
            Programming Language:
            • [IMP] VS2005 build 50727
            • [ASM] VS2008 SP1 build 30729
            • [LNK] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x354480x6c.rdqu
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x354b80x8.rdqu
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x30000x18.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x104e0x1200a4a5deae25708a9e05f50bcad7075c86False0.025390625data0.16810049402497224IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x30000x840x20025e6c54bdb625551eb1d822555f35050False0.16015625OpenPGP Secret Key1.0032626886729739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rdqu0x40000x314c00x316007f63f30c30561c76de60281a26d0660bFalse0.4803698575949367PE32+ executable (DLL) (GUI) x86-64, for MS Windows6.039707209316133IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            DLLImport
            KERNEL32.dllVirtualAlloc, ExitProcess
            TimestampSource PortDest PortSource IPDest IP
            Sep 5, 2024 19:53:36.424169064 CEST497044440192.168.2.580.76.176.23
            Sep 5, 2024 19:53:36.429083109 CEST44404970480.76.176.23192.168.2.5
            Sep 5, 2024 19:53:36.429179907 CEST497044440192.168.2.580.76.176.23
            TimestampSource PortDest PortSource IPDest IP
            Sep 5, 2024 19:53:56.573919058 CEST53543381.1.1.1192.168.2.5

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:13:53:35
            Start date:05/09/2024
            Path:C:\Users\user\Desktop\whmwtxuO00.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\whmwtxuO00.exe"
            Imagebase:0x140000000
            File size:208'384 bytes
            MD5 hash:C457B64B8FAF93FB23ADB3D3B6A6CB78
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3301283760.00000000001BD000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000000.00000002.3301271073.00000000001B3000.00000002.00001000.00020000.00000000.sdmp, Author: ditekSHen
            • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000000.00000002.3301456231.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: ditekSHen
            • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000000.00000000.2039435017.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: ditekSHen
            Reputation:low
            Has exited:false

            No disassembly