Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
Analysis ID:1433050
MD5:a19187b62c78200ed29449c41f872ac6
SHA1:1e2bbb0ae156513bc070657f02ca2e7440847a37
SHA256:87eb7f02f97c135ae0d2e28201bbf91575f69e625cc483886020cf8cc678c79a
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe (PID: 4712 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5: A19187B62C78200ED29449C41F872AC6)
    • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6564 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 4332 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 3692 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 4856 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 3936 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 7124 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 7056 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 6164 cmdline: C:\Windows\system32\WerFault.exe -u -p 4712 -s 516 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeAvira: detected
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeReversingLabs: Detection: 31%
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeVirustotal: Detection: 41%Perma Link
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115644955.000000014007C000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_46d88a26-2
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.0000000141EA2000.00000040.00000001.01000000.00000006.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.00000001420D6000.00000040.00000001.01000000.00000006.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.00000001420D6000.00000040.00000001.01000000.00000006.sdmp
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/L
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/y=
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4712 -s 516
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engineClassification label: mal84.evad.winEXE@18/1@1/2
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6164:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6300:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\cf61b6f6-cc49-4c74-9e0c-ecd7a63a3e68Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeReversingLabs: Detection: 31%
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeVirustotal: Detection: 41%
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4712 -s 516
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic file information: File size 37365264 > 1048576
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x2304c00
Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.0000000141EA2000.00000040.00000001.01000000.00000006.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.00000001420D6000.00000040.00000001.01000000.00000006.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2116203527.00000001420D6000.00000040.00000001.01000000.00000006.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic PE information: section name: .themida
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeStatic PE information: section name: .boot

Boot Survival

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Windows\System32\timeout.exe TID: 1576Thread sleep count: 34 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeSystem information queried: ModuleInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeMemory protected: page execute and read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeNtQueryInformationProcess: Indirect: 0x14259EAF8Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeNtQuerySystemInformation: Indirect: 0x1424CD11BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeNtQueryInformationProcess: Indirect: 0x14255F38BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeNtSetInformationThread: Indirect: 0x142592491Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
33
Virtualization/Sandbox Evasion
OS Credential Dumping521
Security Software Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Disable or Modify Tools
LSASS Memory33
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1433050 Sample: SecuriteInfo.com.Win64.Evo-... Startdate: 29/04/2024 Architecture: WINDOWS Score: 84 33 keyauth.win 2->33 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Machine Learning detection for sample 2->43 9 SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe 1 2->9         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 9->35 37 127.0.0.1 unknown unknown 9->37 45 Query firmware table information (likely to detect VMs) 9->45 47 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->47 49 Hides threads from debuggers 9->49 51 3 other signatures 9->51 13 cmd.exe 1 9->13         started        15 cmd.exe 1 9->15         started        17 conhost.exe 9->17         started        19 WerFault.exe 2 9->19         started        signatures6 process7 process8 21 certutil.exe 3 1 13->21         started        23 find.exe 1 13->23         started        25 find.exe 1 13->25         started        27 cmd.exe 1 15->27         started        process9 29 conhost.exe 27->29         started        31 timeout.exe 1 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe32%ReversingLabsWin64.Trojan.Miner
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe42%VirustotalBrowse
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe100%AviraTR/Agent.muuhf
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
keyauth.win1%VirustotalBrowse
SourceDetectionScannerLabelLink
https://keyauth.win/api/1.2/0%Avira URL Cloudsafe
https://keyauth.win/api/1.2/y=0%Avira URL Cloudsafe
https://keyauth.win/api/1.2/L0%Avira URL Cloudsafe
https://keyauth.win/api/1.2/y=0%VirustotalBrowse
https://keyauth.win/api/1.2/1%VirustotalBrowse
https://keyauth.win/api/1.2/L0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://keyauth.win/api/1.2/LSecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://keyauth.win/api/1.2/y=SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.Evo-gen.29020.27952.exefalse
    high
    https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, 00000000.00000002.2115438203.00000000004EC000.00000004.00000020.00020000.00000000.sdmpfalse
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.26.0.5
    keyauth.winUnited States
    13335CLOUDFLARENETUSfalse
    IP
    127.0.0.1
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1433050
    Start date and time:2024-04-29 02:23:11 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 53s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:16
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
    Detection:MAL
    Classification:mal84.evad.winEXE@18/1@1/2
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe, PID 4712 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    104.26.0.5SecuriteInfo.com.Riskware.Application.14509.10596.exeGet hashmaliciousUnknownBrowse
      KvS2rT08PQ.exeGet hashmaliciousBlank Grabber, Njrat, Umbral StealerBrowse
        SecuriteInfo.com.Win64.TrojanX-gen.26710.19883.exeGet hashmaliciousUnknownBrowse
          RAvynkVRMR.exeGet hashmaliciousUnknownBrowse
            RAvynkVRMR.exeGet hashmaliciousUnknownBrowse
              loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
                    vIXP03a.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win32.MalwareX-gen.12374.8764.exeGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        keyauth.winSecuriteInfo.com.Riskware.Application.14509.10596.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        KvS2rT08PQ.exeGet hashmaliciousBlank Grabber, Njrat, Umbral StealerBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.TrojanX-gen.26710.19883.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        RAvynkVRMR.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        RAvynkVRMR.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        vIXP03a.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win32.MalwareX-gen.12374.8764.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUShttps://cloudsss-c367.iardainwkasn.workers.dev/Get hashmaliciousUnknownBrowse
                        • 104.21.35.193
                        https://s3.ap-southeast-1.amazonaws.com/8mybucket21233.ujko87.mybucket11233rfvdjdfjkd.mybucket1183.3/Wi0n0ertrf500mpAlert042/index.htmlGet hashmaliciousTechSupportScamBrowse
                        • 104.22.24.131
                        https://vbvfdvdjvv.fyfyvfytvghv.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.235.181
                        Vqzx4PFehn.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                        • 172.67.144.153
                        https://www.steam.workshopslist.com/Get hashmaliciousUnknownBrowse
                        • 1.1.1.1
                        https://villademacotera.com/cardGet hashmaliciousUnknownBrowse
                        • 104.21.67.8
                        https://snog7sud46p5082i.azureedge.net/Get hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        https://apptttt7.z19.web.core.windows.net/Win0security-helpline07/index.html?ph0n=+1-000-000-0000Get hashmaliciousTechSupportScamBrowse
                        • 172.67.208.186
                        https://steam.workshopsharedfil.com/sharedfilesGet hashmaliciousUnknownBrowse
                        • 172.67.202.46
                        https://pub-d90b4e6b37254e1687ebe94c4d177a68.r2.dev/ADOBE%281%29.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ce5f3254611a8c095a3d821d4453987731jvjGbPV0.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        31jvjGbPV0.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Riskware.Application.14509.10596.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.TrojanX-gen.26710.19883.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Variant.Jaik.52393.17592.31202.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.FileRepMalware.26162.12640.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.MalwareX-gen.1700.8009.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.MalwareX-gen.1700.8009.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.TrojanX-gen.21257.15643.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        No context
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):24
                        Entropy (8bit):3.7201755214643453
                        Encrypted:false
                        SSDEEP:3:UyUCb/B/:UG
                        MD5:D1D0AF8100919FD648C1678A99429700
                        SHA1:775E9ED42B57933254FDF7FC4A98F99B3EFBB6BB
                        SHA-256:14F4381256CD82AD0CC88F9F4657310DF3DD9A0B234BE4A882CC5FAD7520BAA5
                        SHA-512:7EC9CAA2963673B109E26462301A128AB9B25C4DA3579434114720758D8348D234773CAD7AC77D9116391F7E4772C6BB1D212C6CDC566E8E98710DC078A0FEF1
                        Malicious:false
                        Reputation:low
                        Preview:Etablishing connection..
                        File type:PE32+ executable (console) x86-64, for MS Windows
                        Entropy (8bit):7.866022317790468
                        TrID:
                        • Win64 Executable Console (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
                        File size:37'365'264 bytes
                        MD5:a19187b62c78200ed29449c41f872ac6
                        SHA1:1e2bbb0ae156513bc070657f02ca2e7440847a37
                        SHA256:87eb7f02f97c135ae0d2e28201bbf91575f69e625cc483886020cf8cc678c79a
                        SHA512:a3b1e20af8aec41a94d192489d01332e5b6aaea95d1fa63c0b39ae21524fae5e5c5e7088f05ba044d0ac8e2010e68b309eacb85a49b524d9ccf968165809e62a
                        SSDEEP:786432:7zlk9sxzKPY83RtqenfZtKBztQnCCwN9Pb9nTeB:FkGzKPY8hZktGwbJaB
                        TLSH:2987335AD97E20B8D8B783B9C2827917D761BC92D3D1C6E306D0CA359FAB2D1D63C610
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=.k0y..cy..cy..cp..cm..c.;.cq..c.;.bs..c.;.b}..c.;.b^..c.;.b...c2..bd..cy..c...c...b...cn..b{..cn..b{..c.8.b{..c.8.bx..cRichy..
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x1426b8058
                        Entrypoint Section:.boot
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                        Time Stamp:0x65E9C7EC [Thu Mar 7 13:58:04 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:fe0d8ab40356cb4254aca68bc2252510
                        Instruction
                        call 00007F8F60F80777h
                        inc ecx
                        push edx
                        dec ecx
                        mov edx, esp
                        inc ecx
                        push edx
                        dec ecx
                        mov esi, dword ptr [edx+10h]
                        dec ecx
                        mov edi, dword ptr [edx+20h]
                        cld
                        mov dl, 80h
                        mov al, byte ptr [esi]
                        dec eax
                        inc esi
                        mov byte ptr [edi], al
                        dec eax
                        inc edi
                        mov ebx, 00000002h
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        jnc 00007F8F60F805D6h
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        jnc 00007F8F60F80650h
                        xor eax, eax
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        jnc 00007F8F60F806F8h
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        adc eax, eax
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        adc eax, eax
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        adc eax, eax
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        adc eax, eax
                        je 00007F8F60F805FBh
                        push edi
                        mov eax, eax
                        dec eax
                        sub edi, eax
                        mov al, byte ptr [edi]
                        pop edi
                        mov byte ptr [edi], al
                        dec eax
                        inc edi
                        mov ebx, 00000002h
                        jmp 00007F8F60F8057Ah
                        mov eax, 00000001h
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        adc eax, eax
                        add dl, dl
                        jne 00007F8F60F805F9h
                        mov dl, byte ptr [esi]
                        dec eax
                        inc esi
                        adc dl, dl
                        jc 00007F8F60F805D8h
                        sub eax, ebx
                        mov ebx, 00000001h
                        jne 00007F8F60F80620h
                        mov ecx, 00000001h
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa03b20x3a0.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x26b23200x4cd4.themida
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x49bd0000x10.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xa10180x28.tls
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x7a5400x7a600f5ea0a864096cb29e8a7ca24fdd01750False0.5136219994892748zlib compressed data6.370823094871043IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x7c0000x1be360x1c00066534c24794301e7fd4e332f6ed0b12fFalse0.344970703125data5.203656184373033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x980000x1cc80x12004857839ae0c93fab536089893d6350bfFalse0.3708767361111111Matlab v4 mat-file (little endian) \202\217\\217\312\217\\217\200\217a\217\336)^\217\372\216]\217\201\217Z\217`\215\\221V8[\217X\265L\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\202\217\\217\254\267Z\217\202\211\204\214\202\217^\265\234\217\204\261\200\217^\265\234\217\204\004\200\217^\265\221\277[\217k\220\\217\203\217\~\252\245\\217\204\307\\217, text, rows 0, columns 05.304849909020239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x9a0000x4cbc0x4e00e7cba025bed896446cd3baa4d20637fbFalse0.4831229967948718data5.855651927279747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x9f0000x5c40x60089f79ee6820122af2b380fd69e74a83fFalse0.5774739583333334data5.2391606818793734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .idata0xa00000x10000x800903e6620521fbaf5bab2eb8a916ed66cFalse0.345703125data3.881390261972612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0xa10000x10000x200052fd91e82f0404de530dfe5fc8a2697False0.0625data0.28456851570206254IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .themida0xa20000x26160000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .boot0x26b80000x2304c000x2304c00675a240ea7b9c9f65870da8c8ed0c415unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .reloc0x49bd0000x10000x1087e0e7831256a6ae4de2f122ff119ea7False1.5GLS_BINARY_LSB_FIRST2.349601752714581IMAGE_SCN_MEM_READ
                        DLLImport
                        kernel32.dllGetModuleHandleA
                        USER32.dllGetAsyncKeyState
                        ADVAPI32.dllGetTokenInformation
                        SHELL32.dllShellExecuteA
                        MSVCP140.dll?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
                        ntdll.dllRtlLookupFunctionEntry
                        Normaliz.dllIdnToAscii
                        WLDAP32.dll
                        CRYPT32.dllCertGetCertificateChain
                        WS2_32.dllsend
                        RPCRT4.dllRpcStringFreeA
                        PSAPI.DLLGetModuleInformation
                        USERENV.dllUnloadUserProfile
                        VCRUNTIME140.dll__current_exception
                        VCRUNTIME140_1.dll__CxxFrameHandler4
                        api-ms-win-crt-runtime-l1-1-0.dllstrerror
                        api-ms-win-crt-heap-l1-1-0.dll_callnewh
                        api-ms-win-crt-stdio-l1-1-0.dll_close
                        api-ms-win-crt-utility-l1-1-0.dllqsort
                        api-ms-win-crt-string-l1-1-0.dllstrncmp
                        api-ms-win-crt-filesystem-l1-1-0.dllrename
                        api-ms-win-crt-time-l1-1-0.dll_time64
                        api-ms-win-crt-convert-l1-1-0.dllstrtol
                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                        api-ms-win-crt-math-l1-1-0.dll_dclass
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 29, 2024 02:24:08.572989941 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:08.573050022 CEST44349708104.26.0.5192.168.2.5
                        Apr 29, 2024 02:24:08.573117018 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:08.581326008 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:08.581343889 CEST44349708104.26.0.5192.168.2.5
                        Apr 29, 2024 02:24:08.828624964 CEST44349708104.26.0.5192.168.2.5
                        Apr 29, 2024 02:24:08.828738928 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:10.697557926 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:10.697604895 CEST44349708104.26.0.5192.168.2.5
                        Apr 29, 2024 02:24:10.697964907 CEST49708443192.168.2.5104.26.0.5
                        Apr 29, 2024 02:24:10.698232889 CEST44349708104.26.0.5192.168.2.5
                        Apr 29, 2024 02:24:10.698302031 CEST49708443192.168.2.5104.26.0.5
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 29, 2024 02:24:08.452337980 CEST4928853192.168.2.51.1.1.1
                        Apr 29, 2024 02:24:08.568070889 CEST53492881.1.1.1192.168.2.5
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Apr 29, 2024 02:24:08.452337980 CEST192.168.2.51.1.1.10x93ecStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Apr 29, 2024 02:24:08.568070889 CEST1.1.1.1192.168.2.50x93ecNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                        Apr 29, 2024 02:24:08.568070889 CEST1.1.1.1192.168.2.50x93ecNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                        Apr 29, 2024 02:24:08.568070889 CEST1.1.1.1192.168.2.50x93ecNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:02:24:02
                        Start date:29/04/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe"
                        Imagebase:0x140000000
                        File size:37'365'264 bytes
                        MD5 hash:A19187B62C78200ED29449C41F872AC6
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:02:24:02
                        Start date:29/04/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:02:24:07
                        Start date:29/04/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                        Imagebase:0x7ff702d00000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:02:24:07
                        Start date:29/04/2024
                        Path:C:\Windows\System32\certutil.exe
                        Wow64 process (32bit):false
                        Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5
                        Imagebase:0x7ff72a560000
                        File size:1'651'712 bytes
                        MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:5
                        Start time:02:24:07
                        Start date:29/04/2024
                        Path:C:\Windows\System32\find.exe
                        Wow64 process (32bit):false
                        Commandline:find /i /v "md5"
                        Imagebase:0x7ff745190000
                        File size:17'920 bytes
                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:02:24:07
                        Start date:29/04/2024
                        Path:C:\Windows\System32\find.exe
                        Wow64 process (32bit):false
                        Commandline:find /i /v "certutil"
                        Imagebase:0x7ff745190000
                        File size:17'920 bytes
                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:7
                        Start time:02:24:10
                        Start date:29/04/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                        Imagebase:0x7ff702d00000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:02:24:10
                        Start date:29/04/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                        Imagebase:0x7ff702d00000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:02:24:10
                        Start date:29/04/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:12
                        Start time:02:24:11
                        Start date:29/04/2024
                        Path:C:\Windows\System32\timeout.exe
                        Wow64 process (32bit):false
                        Commandline:timeout /t 5
                        Imagebase:0x7ff626dc0000
                        File size:32'768 bytes
                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:13
                        Start time:02:24:11
                        Start date:29/04/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 4712 -s 516
                        Imagebase:0x7ff714150000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        No disassembly