Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uk1HIyOQbk.exe

Overview

General Information

Sample name:uk1HIyOQbk.exe
renamed because original name is a hash value
Original sample name:4ef284c7f56474536bfb5d1527132def.exe
Analysis ID:1417422
MD5:4ef284c7f56474536bfb5d1527132def
SHA1:67acd4f8d3dac7319f780ee902fb5ce0a823cbca
SHA256:f2c8303d2447229782a7072ac4eca105c984494d92b0b783e12749dc779a18b5
Tags:64exetrojan
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • uk1HIyOQbk.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\uk1HIyOQbk.exe" MD5: 4EF284C7F56474536BFB5D1527132DEF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: uk1HIyOQbk.exeAvira: detected
Source: uk1HIyOQbk.exeReversingLabs: Detection: 83%
Source: uk1HIyOQbk.exeVirustotal: Detection: 76%Perma Link
Source: uk1HIyOQbk.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 51.91.30.159:443 -> 192.168.2.4:49730 version: TLS 1.0
Source: uk1HIyOQbk.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exe HTTP/1.1Host: www.upload.eeConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 51.91.30.159 51.91.30.159
Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: unknownHTTPS traffic detected: 51.91.30.159:443 -> 192.168.2.4:49730 version: TLS 1.0
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exe HTTP/1.1Host: www.upload.eeConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: www.upload.ee
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 29 Mar 2024 07:58:54 GMTContent-Type: text/html; charset=UTF-8Content-Length: 425Connection: closeStrict-Transport-Security: max-age=31536000X-XSS-Protection: 1P3P: CP="CAO PSA OUR"
Source: uk1HIyOQbk.exe, 00000000.00000002.1661402521.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: uk1HIyOQbk.exe, 00000000.00000002.1661402521.0000000003701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.upload.ee
Source: uk1HIyOQbk.exe, 00000000.00000002.1661402521.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.upload.ee
Source: uk1HIyOQbk.exeString found in binary or memory: https://www.upload.ee/download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exe
Source: uk1HIyOQbk.exe, 00000000.00000002.1661402521.0000000003721000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.upload.ee/files/16412149/RouletteBotPro_x64.exe.html?msg=sess_error
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: uk1HIyOQbk.exeStatic PE information: No import functions for PE file found
Source: uk1HIyOQbk.exe, 00000000.00000000.1616414840.00000000001C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRoulleteBotPro_x32-x64.exe4 vs uk1HIyOQbk.exe
Source: uk1HIyOQbk.exeBinary or memory string: OriginalFilenameRoulleteBotPro_x32-x64.exe4 vs uk1HIyOQbk.exe
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeSection loaded: wintypes.dllJump to behavior
Source: classification engineClassification label: mal60.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uk1HIyOQbk.exe.logJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeMutant created: NULL
Source: uk1HIyOQbk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: uk1HIyOQbk.exeReversingLabs: Detection: 83%
Source: uk1HIyOQbk.exeVirustotal: Detection: 76%
Source: uk1HIyOQbk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: uk1HIyOQbk.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: uk1HIyOQbk.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeCode function: 0_2_00007FFD9B8B16F5 push eax; retf 0_2_00007FFD9B8B177D
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeCode function: 0_2_00007FFD9B8B1755 push eax; retf 0_2_00007FFD9B8B177D
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeCode function: 0_2_00007FFD9B8B16A5 push eax; retf 0_2_00007FFD9B8B177D
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeCode function: 0_2_00007FFD9B8B159D push eax; retf 0_2_00007FFD9B8B177D
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeMemory allocated: 1B660000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exe TID: 5848Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exe TID: 2364Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: uk1HIyOQbk.exeBinary or memory string: MEOxkZEIRIftqEmuxjljwTdy
Source: uk1HIyOQbk.exe, 00000000.00000002.1660929785.00000000008FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltt
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeQueries volume information: C:\Users\user\Desktop\uk1HIyOQbk.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\uk1HIyOQbk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
uk1HIyOQbk.exe83%ReversingLabsByteCode-MSIL.Downloader.TinyDow
uk1HIyOQbk.exe76%VirustotalBrowse
uk1HIyOQbk.exe100%AviraHEUR/AGEN.1313095
uk1HIyOQbk.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.upload.ee
51.91.30.159
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://www.upload.ee/download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.upload.eeuk1HIyOQbk.exe, 00000000.00000002.1661402521.00000000036E9000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.upload.eeuk1HIyOQbk.exe, 00000000.00000002.1661402521.0000000003701000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameuk1HIyOQbk.exe, 00000000.00000002.1661402521.00000000036E9000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://www.upload.ee/files/16412149/RouletteBotPro_x64.exe.html?msg=sess_erroruk1HIyOQbk.exe, 00000000.00000002.1661402521.0000000003721000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              51.91.30.159
              www.upload.eeFrance
              16276OVHFRfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1417422
              Start date and time:2024-03-29 08:58:07 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 1s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:1
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:uk1HIyOQbk.exe
              renamed because original name is a hash value
              Original Sample Name:4ef284c7f56474536bfb5d1527132def.exe
              Detection:MAL
              Classification:mal60.winEXE@1/1@1/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 2
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Execution Graph export aborted for target uk1HIyOQbk.exe, PID 6840 because it is empty
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              08:58:56API Interceptor1x Sleep call for process: uk1HIyOQbk.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              51.91.30.159OFFICIAL TAX DEMAND NOTICE.htmlGet hashmaliciousUnknownBrowse
              • www.upload.ee/image/14036935/bgq1.jpg
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              www.upload.eevHpxL6E2sQ.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
              • 51.91.30.159
              file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
              • 51.91.30.159
              wn1gncGy2T.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
              • 51.91.30.159
              noDmpaxL0x.exeGet hashmaliciousBabuk, Djvu, Glupteba, SmokeLoader, Xehook StealerBrowse
              • 51.91.30.159
              doTtQFWKly.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook StealerBrowse
              • 51.91.30.159
              file.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook StealerBrowse
              • 51.91.30.159
              PADD8toZVX.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
              • 51.91.30.159
              MT5Um6Ykrl.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
              • 51.91.30.159
              PO7431.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
              • 51.91.30.159
              file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, Mars Stealer, PureLog StealerBrowse
              • 51.91.30.159
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              OVHFRMcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
              • 91.121.160.6
              SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exeGet hashmaliciousUnknownBrowse
              • 198.50.129.180
              Facture_160087511.htmlGet hashmaliciousScreenConnect ToolBrowse
              • 158.69.9.165
              SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exeGet hashmaliciousUnknownBrowse
              • 51.38.43.18
              assento 555 pro-Model-2.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
              • 144.217.159.195
              awb_shipping_doc_23642.vbsGet hashmaliciousFormBook, GuLoaderBrowse
              • 188.165.61.82
              https://www.rewardgateway.com/Get hashmaliciousHTMLPhisherBrowse
              • 51.222.241.100
              http://www.rewardgateway.comGet hashmaliciousHTMLPhisherBrowse
              • 51.222.241.145
              https://www.rewardgateway.com/Get hashmaliciousHTMLPhisherBrowse
              • 51.222.241.100
              f699.jsGet hashmaliciousUnknownBrowse
              • 51.91.79.17
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              54328bd36c14bd82ddaa0c04b25ed9adSecuriteInfo.com.Win32.CrypterX-gen.9933.28197.exeGet hashmaliciousPureLog Stealer, Xehook StealerBrowse
              • 51.91.30.159
              SecuriteInfo.com.Win32.TrojanX-gen.23765.12042.exeGet hashmaliciousUnknownBrowse
              • 51.91.30.159
              SecuriteInfo.com.Win32.TrojanX-gen.23765.12042.exeGet hashmaliciousUnknownBrowse
              • 51.91.30.159
              PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
              • 51.91.30.159
              vHpxL6E2sQ.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
              • 51.91.30.159
              PURCHASE_ORDER.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
              • 51.91.30.159
              8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
              • 51.91.30.159
              SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
              • 51.91.30.159
              SecuriteInfo.com.Win32.MalwareX-gen.21073.8844.exeGet hashmaliciousUnknownBrowse
              • 51.91.30.159
              WKn5bYRJGH.exeGet hashmaliciousLimeRATBrowse
              • 51.91.30.159
              No context
              Process:C:\Users\user\Desktop\uk1HIyOQbk.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1281
              Entropy (8bit):5.370111951859942
              Encrypted:false
              SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
              MD5:12C61586CD59AA6F2A21DF30501F71BD
              SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
              SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
              SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.723174445954432
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:uk1HIyOQbk.exe
              File size:132'096 bytes
              MD5:4ef284c7f56474536bfb5d1527132def
              SHA1:67acd4f8d3dac7319f780ee902fb5ce0a823cbca
              SHA256:f2c8303d2447229782a7072ac4eca105c984494d92b0b783e12749dc779a18b5
              SHA512:66eeb418547e932f778323a6036ecb85e7cbc639576c817125b23c5bb9a4ec1871bbcdf635bb7ea301ccf5e2fe772044213382b9f5b345ad7a83d870c1162832
              SSDEEP:3072:+hyUfzbspKNMOccF6l3iMAelbWTz6KLYXDMx960:+hyUMyMOUIGbWtS
              TLSH:5CD3B600ACD5CD73DB299533F5E492632AAA5D1CF1922B2D1A43E7641CFAFB68D02374
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...y..e.........."...................... .....@..... .......................@............@...@......@............... .....
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x140000000
              Entrypoint Section:
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x65FAAB79 [Wed Mar 20 09:25:13 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:
              Instruction
              dec ebp
              pop edx
              nop
              add byte ptr [ebx], al
              add byte ptr [eax], al
              add byte ptr [eax+eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x518.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1fa340x1fc00cd389ba90d55d6d32d60f5c5c4a1c601False0.543337844488189data5.739346599453468IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x220000x5180x60063cf91601a80f362965a83ed215b83d9False0.38671875data3.8490985313335333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x220a00x284data0.4503105590062112
              RT_MANIFEST0x223280x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
              TimestampSource PortDest PortSource IPDest IP
              Mar 29, 2024 08:58:53.532263994 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:53.532314062 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:53.532407999 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:53.574434996 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:53.574466944 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:53.946873903 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:53.946994066 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:53.960810900 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:53.960827112 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:53.961147070 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:54.001701117 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:54.037719011 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:54.084230900 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:54.300198078 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:54.300270081 CET4434973051.91.30.159192.168.2.4
              Mar 29, 2024 08:58:54.300328970 CET49730443192.168.2.451.91.30.159
              Mar 29, 2024 08:58:54.329386950 CET49730443192.168.2.451.91.30.159
              TimestampSource PortDest PortSource IPDest IP
              Mar 29, 2024 08:58:53.429188967 CET6218753192.168.2.41.1.1.1
              Mar 29, 2024 08:58:53.525166035 CET53621871.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Mar 29, 2024 08:58:53.429188967 CET192.168.2.41.1.1.10x5836Standard query (0)www.upload.eeA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Mar 29, 2024 08:58:53.525166035 CET1.1.1.1192.168.2.40x5836No error (0)www.upload.ee51.91.30.159A (IP address)IN (0x0001)false
              • www.upload.ee
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.44973051.91.30.1594436840C:\Users\user\Desktop\uk1HIyOQbk.exe
              TimestampBytes transferredDirectionData
              2024-03-29 07:58:54 UTC124OUTGET /download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exe HTTP/1.1
              Host: www.upload.ee
              Connection: Keep-Alive
              2024-03-29 07:58:54 UTC247INHTTP/1.1 404 Not Found
              Server: nginx
              Date: Fri, 29 Mar 2024 07:58:54 GMT
              Content-Type: text/html; charset=UTF-8
              Content-Length: 425
              Connection: close
              Strict-Transport-Security: max-age=31536000
              X-XSS-Protection: 1
              P3P: CP="CAO PSA OUR"
              2024-03-29 07:58:54 UTC425INData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 70 20 61 6c 69 67 6e 3d 22 63 65 6e 74 65 72 22 3e 3c 68 31 3e 45 72 72 6f 72 20 34 30 34 3c 2f 68 31 3e 3c 62 72 20 2f 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 64 6f 63 75 6d 65 6e 74 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 75 70 6c 6f 61 64 2e 65 65 2f 66 69 6c 65 73 2f 31 36 34 31 32 31 34 39 2f 52 6f 75 6c 65 74 74 65 42 6f 74 50 72 6f 5f 78 36 34 2e 65 78 65 2e 68 74 6d 6c 3f 6d 73 67 3d 73 65 73 73 5f 65 72 72 6f 72 22
              Data Ascii: <html><head><title>404 - Page Not Found</title></head><body><p align="center"><h1>Error 404</h1><br />Page Not Found</p><script type="text/javascript">document.location.href="https://www.upload.ee/files/16412149/RouletteBotPro_x64.exe.html?msg=sess_error"


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:08:58:52
              Start date:29/03/2024
              Path:C:\Users\user\Desktop\uk1HIyOQbk.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\uk1HIyOQbk.exe"
              Imagebase:0x1c0000
              File size:132'096 bytes
              MD5 hash:4EF284C7F56474536BFB5D1527132DEF
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Reset < >
                Memory Dump Source
                • Source File: 00000000.00000002.1662201171.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_uk1HIyOQbk.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58fb2de3e1263e460fc2f1f2333f5e1c03e9105c78a34126045467f71ccedcb2
                • Instruction ID: ccfa9f3de03d8c1a11a125e86f613032ebba88da9dde026b15671f7b9fdab7a1
                • Opcode Fuzzy Hash: 58fb2de3e1263e460fc2f1f2333f5e1c03e9105c78a34126045467f71ccedcb2
                • Instruction Fuzzy Hash: 3F210431F1DA1D4FE785E77888666BD77E1EF88200B0500BBE40CC32E6CE2828014791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.1662201171.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_uk1HIyOQbk.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bd4723330a6c65f2e6bae243aeb6ebad5d04c97127a4621a50291b557b308e3b
                • Instruction ID: ac0d455425802e635c025b193b33a07bd8ff60922c31eaab7c6728758bb624d7
                • Opcode Fuzzy Hash: bd4723330a6c65f2e6bae243aeb6ebad5d04c97127a4621a50291b557b308e3b
                • Instruction Fuzzy Hash: E4E04F35A1890C8FCB40FF6CE804999B7E5FB99325B0103BAE41DC7191E625D5548781
                Uniqueness

                Uniqueness Score: -1.00%