Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Analysis ID:1427172
MD5:6f23976152226e51911822cec434d823
SHA1:4ad1937a39bd1ca37f8956fdd4b08ca28d679c91
SHA256:75b1e14c1d1eb5d692d67a59ee0676b768351f4f0da6451d157b1cc3399009e8
Tags:exe
Infos:

Detection

Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe (PID: 7264 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe" MD5: 6F23976152226E51911822CEC434D823)
    • conhost.exe (PID: 7272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7320 cmdline: C:\Windows\system32\cmd.exe /c color F2 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • cmd.exe (PID: 7384 cmdline: C:\Windows\system32\cmd.exe /c taskkill /f /im Gift2.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • taskkill.exe (PID: 7400 cmdline: taskkill /f /im Gift2.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeAvira: detected
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeVirustotal: Detection: 54%Perma Link
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\iccp_\source\repos\ConsoleApplication1\Release\ConsoleApplication1.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Source: Binary string: C:\Users\iccp_\source\repos\ConsoleApplication1\Release\ConsoleApplication1.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal42.winEXE@8/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7272:120:WilError_03
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "Gift2.exe")
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeVirustotal: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c color F2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im Gift2.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im Gift2.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c color F2Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im Gift2.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im Gift2.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\iccp_\source\repos\ConsoleApplication1\Release\ConsoleApplication1.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Source: Binary string: C:\Users\iccp_\source\repos\ConsoleApplication1\Release\ConsoleApplication1.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1D76 push ecx; ret 0_2_002B1D89
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1B0A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002B1B0A
Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1B0A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002B1B0A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1681 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_002B1681
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1C6C SetUnhandledExceptionFilter,0_2_002B1C6C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c color F2Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im Gift2.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im Gift2.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im Gift2.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1DBA cpuid 0_2_002B1DBA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B19F3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_002B19F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exeCode function: 0_2_002B1160 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,0_2_002B1160
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1427172 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 17/04/2024 Architecture: WINDOWS Score: 42 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 7 SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 cmd.exe 1 7->13         started        process5 15 taskkill.exe 1 9->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe42%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe55%VirustotalBrowse
SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe100%AviraTR/Agent.igzea
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427172
Start date and time:2024-04-17 07:32:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 5s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Detection:MAL
Classification:mal42.winEXE@8/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 5
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
07:33:04API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
File Type:ISO-8859 text, with CRLF line terminators
Category:dropped
Size (bytes):94
Entropy (8bit):4.929120899342838
Encrypted:false
SSDEEP:3:tl+ztIQBV53l0uGVEXmq2i6yBWEv:n+zttBV5V0uGVimq2iLHv
MD5:7D5FB6114CEE641B44C41194DF38C233
SHA1:2FAA3B6AC8CA5DF2F5B89C6BB369DCDC641C7045
SHA-256:C0A29947CBA0BBE037BDBD8190EE1A7A50E6DC16D8739425879F9858A858D264
SHA-512:582BA5C25314622B5FF3FCEE5F654CD9C159B72657220205876D62D63E9181102ED4E8D8DCD7036A27D8383044F3BC4851BCFAAFAFD12A985588F7A83B13D145
Malicious:false
Reputation:low
Preview:.................................................................................
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):5.321778000695748
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
File size:14'848 bytes
MD5:6f23976152226e51911822cec434d823
SHA1:4ad1937a39bd1ca37f8956fdd4b08ca28d679c91
SHA256:75b1e14c1d1eb5d692d67a59ee0676b768351f4f0da6451d157b1cc3399009e8
SHA512:6957e385c560fdb63f3a60c3467932ccf0f99126e74cd64d217816f3d4dc0c9a043702d947e6b7d5ac54014621b139180e8ff9231d43dcf4ef46717329c6a9d9
SSDEEP:384:0bubLBWKupIDaGUIYzHjoaulzun7xN/fBz:3kpIDadIYzT7xN
TLSH:7C621943BB848972C76113B03477B66AD63BB9601FD49783AB95A6950F750C0F433B1E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........[xd.[xd.[xd.R...Wxd...a.Hxd...`.Wxd...g.Zxd...e._xd...e.^xd.[xe..xd...m.Zxd.....Zxd.[x..Zxd...f.Zxd.Rich[xd.........PE..L..
Icon Hash:00503333460c1004
Entrypoint:0x401677
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5E189B78 [Fri Jan 10 15:42:48 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:87a7ccd365a74668ac9b2126968e31a6
Instruction
call 00007F30F8BED7A9h
jmp 00007F30F8BED259h
push ebp
mov ebp, esp
push 00000000h
call dword ptr [00403028h]
push dword ptr [ebp+08h]
call dword ptr [0040302Ch]
push C0000409h
call dword ptr [00403024h]
push eax
call dword ptr [00403020h]
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 00000324h
push 00000017h
call 00007F30F8BEDD78h
test eax, eax
je 00007F30F8BED3E7h
push 00000002h
pop ecx
int 29h
mov dword ptr [00405118h], eax
mov dword ptr [00405114h], ecx
mov dword ptr [00405110h], edx
mov dword ptr [0040510Ch], ebx
mov dword ptr [00405108h], esi
mov dword ptr [00405104h], edi
mov word ptr [00405130h], ss
mov word ptr [00405124h], cs
mov word ptr [00405100h], ds
mov word ptr [004050FCh], es
mov word ptr [004050F8h], fs
mov word ptr [004050F4h], gs
pushfd
pop dword ptr [00405128h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [0040511Ch], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [00405120h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [0040512Ch], eax
mov eax, dword ptr [ebp-00000324h]
mov dword ptr [00405068h], 00010001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x37f40xdc.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000xcf0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x1d0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x32d00x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x33400x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x110.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x113b0x1200a6ebfcfb9badea8fdd488dfc59ff2addFalse0.630859375data6.140214571585226IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x11520x1200669bd81bca14d2c79c1cee89e9a48fafFalse0.4212239583333333data5.092617121296803IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x3840x200550b6d19eefd3a6f89a89a9be78fdbafFalse0.0546875data0.2804011676589459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60000xcf00xe00bf2156bf655e393d64a3ca68ba2d4e39False0.1953125data2.756166303526463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x70000x1d00x2007b494a992f1720a3e897c9d6826eab32False0.904296875data5.964178796417213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x60f00xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2560EnglishUnited States0.1373873873873874
RT_GROUP_ICON0x6b580x14dataEnglishUnited States1.15
RT_MANIFEST0x6b700x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllSleep, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleHandleW
USER32.dllMessageBoxA
MSVCP140.dll?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEHXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?uncaught_exception@std@@YA_NXZ
VCRUNTIME140.dll__current_exception_context, memset, _except_handler4_common, __current_exception, __std_terminate, __CxxFrameHandler3
api-ms-win-crt-filesystem-l1-1-0.dllremove
api-ms-win-crt-runtime-l1-1-0.dllexit, _initialize_onexit_table, _register_onexit_function, _register_thread_local_exe_atexit_callback, _controlfp_s, terminate, _c_exit, _initterm_e, _exit, _initterm, _cexit, __p___argv, __p___argc, _initialize_narrow_environment, _configure_narrow_argv, _crt_atexit, _seh_filter_exe, _set_app_type, system, _get_initial_narrow_environment
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:07:33:00
Start date:17/04/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.21226.23526.exe"
Imagebase:0x2b0000
File size:14'848 bytes
MD5 hash:6F23976152226E51911822CEC434D823
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:07:33:00
Start date:17/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:07:33:00
Start date:17/04/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:C:\Windows\system32\cmd.exe /c color F2
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:07:33:04
Start date:17/04/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:C:\Windows\system32\cmd.exe /c taskkill /f /im Gift2.exe
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:07:33:04
Start date:17/04/2024
Path:C:\Windows\SysWOW64\taskkill.exe
Wow64 process (32bit):true
Commandline:taskkill /f /im Gift2.exe
Imagebase:0x900000
File size:74'240 bytes
MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:21.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7.3%
    Total number of Nodes:124
    Total number of Limit Nodes:7
    execution_graph 459 2b1d8b 462 2b2052 459->462 463 2b1d99 _except_handler4_common 462->463 464 2b16a9 IsProcessorFeaturePresent 465 2b16bd 464->465 468 2b1681 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 465->468 467 2b17a0 468->467 469 2b14e3 473 2b1c6c SetUnhandledExceptionFilter 469->473 471 2b14e8 472 2b14ed _set_new_mode 471->472 473->471 474 2b1365 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N 475 2b1c78 476 2b1caf 475->476 478 2b1c8a 475->478 477 2b1cb7 __current_exception __current_exception_context terminate 478->476 478->477 479 2b137f 480 2b1385 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 479->480 482 2b13b8 480->482 483 2b13b0 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 480->483 483->482 484 2b161c _seh_filter_exe 404 2b13f0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12 485 2b1630 486 2b1c29 GetModuleHandleW 485->486 487 2b1638 486->487 488 2b166e _exit 487->488 489 2b163c 487->489 490 2b1642 _c_exit 489->490 491 2b1647 489->491 490->491 492 2b1430 _set_app_type 516 2b1a92 492->516 494 2b143d _set_fmode 517 2b1a8b 494->517 496 2b1448 __p__commode 518 2b1851 496->518 498 2b1b0a ___scrt_fastfail 6 API calls 500 2b14da 498->500 499 2b1458 __RTC_Initialize 514 2b14c4 499->514 528 2b19de 499->528 502 2b1471 503 2b1476 _configure_narrow_argv 502->503 504 2b1482 503->504 503->514 531 2b1a98 InitializeSListHead 504->531 506 2b1487 507 2b1490 __setusermatherr 506->507 508 2b149b 506->508 507->508 532 2b1aa7 _controlfp_s 508->532 510 2b14aa 511 2b14af _configthreadlocale 510->511 512 2b14bb ___scrt_uninitialize_crt 511->512 513 2b14bf _initialize_narrow_environment 512->513 512->514 513->514 514->498 515 2b14d2 514->515 516->494 517->496 519 2b185d 518->519 520 2b1861 518->520 519->499 521 2b18d0 520->521 523 2b186e ___scrt_release_startup_lock 520->523 522 2b1b0a ___scrt_fastfail 6 API calls 521->522 524 2b18d7 522->524 525 2b187b _initialize_onexit_table 523->525 527 2b1899 523->527 526 2b188a _initialize_onexit_table 525->526 525->527 526->527 527->499 537 2b19b1 528->537 531->506 533 2b1abf 532->533 534 2b1ac0 532->534 533->510 535 2b1b0a ___scrt_fastfail 6 API calls 534->535 536 2b1ac7 535->536 536->510 538 2b19c0 _crt_atexit 537->538 539 2b19c7 _register_onexit_function 537->539 540 2b19d2 538->540 539->540 540->502 541 2b10f0 ?uncaught_exception@std@ 542 2b111f ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 541->542 543 2b1127 541->543 542->543 544 2b1677 547 2b1a40 544->547 546 2b167c 546->546 548 2b1a56 547->548 550 2b1a5f 548->550 551 2b19f3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 548->551 550->546 551->550 405 2b14f5 406 2b1501 ___scrt_is_nonwritable_in_current_image 405->406 427 2b1818 406->427 408 2b1508 409 2b1661 408->409 412 2b1532 408->412 440 2b1b0a IsProcessorFeaturePresent 409->440 411 2b1668 exit 413 2b166e _exit 411->413 414 2b1536 _initterm_e 412->414 419 2b157f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 412->419 415 2b1562 _initterm 414->415 416 2b1551 414->416 415->419 417 2b15d3 _get_initial_narrow_environment __p___argv __p___argc 431 2b1000 system MessageBoxA 417->431 419->417 421 2b15cb _register_thread_local_exe_atexit_callback 419->421 420 2b15ef 438 2b1c29 GetModuleHandleW 420->438 421->417 424 2b15fd 425 2b1601 _cexit 424->425 426 2b1606 ___scrt_uninitialize_crt 424->426 425->426 426->416 428 2b1821 427->428 444 2b1dba IsProcessorFeaturePresent 428->444 430 2b182d ___scrt_uninitialize_crt 430->408 446 2b11b0 431->446 434 2b11b0 7 API calls 435 2b106a system 434->435 436 2b11b0 7 API calls 435->436 437 2b1084 6 API calls 436->437 437->420 439 2b15f9 438->439 439->411 439->424 441 2b1b1f ___scrt_fastfail 440->441 442 2b1b2b memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 441->442 443 2b1c15 ___scrt_fastfail 442->443 443->411 445 2b1ddd 444->445 445->430 447 2b11f1 446->447 447->447 448 2b1272 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12 447->448 453 2b1263 447->453 448->453 450 2b12f7 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J 451 2b129b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 450->451 452 2b1311 450->452 454 2b1044 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z Sleep 451->454 455 2b13b0 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 451->455 452->451 458 2b131f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 452->458 453->450 453->451 456 2b12f5 453->456 457 2b12ca ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 453->457 454->434 455->454 456->450 457->451 457->453 458->451 458->452

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_002B142A 1 Function_002B1C29 2 Function_002B16A9 22 Function_002B1681 2->22 3 Function_002B17A2 4 Function_002B2120 28 Function_002B141F 4->28 5 Function_002B1427 6 Function_002B1AA7 18 Function_002B1B0A 6->18 7 Function_002B1AA4 8 Function_002B1DBA 9 Function_002B193D 10 Function_002B19B1 11 Function_002B1630 11->1 12 Function_002B1430 12->6 12->7 16 Function_002B1A8B 12->16 12->18 20 Function_002B1A8E 12->20 26 Function_002B1A98 12->26 30 Function_002B1A92 12->30 42 Function_002B1AF2 12->42 50 Function_002B1AC8 12->50 55 Function_002B19DE 12->55 57 Function_002B1851 12->57 60 Function_002B1CD6 12->60 61 Function_002B1AD5 12->61 13 Function_002B1D30 14 Function_002B11B0 15 Function_002B1D8B 56 Function_002B2052 15->56 17 Function_002B1F8A 52 Function_002B1CCE 18->52 19 Function_002B1989 19->7 21 Function_002B1D02 23 Function_002B1000 23->14 24 Function_002B1B04 25 Function_002B1818 25->7 25->8 27 Function_002B2118 29 Function_002B161C 31 Function_002B2110 32 Function_002B196C 32->17 33 Function_002B1C6C 34 Function_002B14E3 34->16 34->33 35 Function_002B1160 36 Function_002B17E6 36->17 37 Function_002B1365 38 Function_002B1C78 39 Function_002B137F 40 Function_002B1AFE 41 Function_002B19F3 43 Function_002B13F0 44 Function_002B10F0 45 Function_002B20F0 45->28 46 Function_002B1677 53 Function_002B1A40 46->53 47 Function_002B1D76 48 Function_002B14F5 48->1 48->13 48->18 48->19 48->23 48->24 48->25 48->32 48->36 48->40 54 Function_002B18D8 48->54 49 Function_002B1AC9 51 Function_002B1ACF 53->41 54->3 54->13 55->10 57->17 57->18 58 Function_002B1950 59 Function_002B20D0 59->28 61->49 61->51

    Control-flow Graph

    APIs
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0(color F2), ref: 002B1013
    • MessageBoxA.USER32(00000000,002B3164,002B3158,00000000), ref: 002B102C
      • Part of subcall function 002B11B0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000004,00000000), ref: 002B1396
      • Part of subcall function 002B11B0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 002B13A3
      • Part of subcall function 002B11B0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 002B13B2
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z.MSVCP140(002B13F0), ref: 002B1049
    • Sleep.KERNELBASE(00002710), ref: 002B1054
      • Part of subcall function 002B11B0: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ.MSVCP140(?,75C50660,7676C730), ref: 002B1274
      • Part of subcall function 002B11B0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(00000000,?,75C50660,7676C730), ref: 002B12DD
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0(taskkill /f /im Gift2.exe), ref: 002B106F
      • Part of subcall function 002B11B0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z.MSVCP140(?,000000FF,00000000,?,75C50660,7676C730), ref: 002B1306
      • Part of subcall function 002B11B0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 002B1332
    • MessageBoxA.USER32(00000000,002B3208,^_^,00000000), ref: 002B1092
    • remove.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(D:\Gift2.exe), ref: 002B109F
    • remove.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(D:\Gift_Protector.exe), ref: 002B10A9
    • MessageBoxA.USER32(00000000,002B3270,Tips,00000000), ref: 002B10BC
    • MessageBoxA.USER32(00000000,Bye ^_^,002B3148,00000000), ref: 002B10CC
    • ?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140 ref: 002B10D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$Message$?sputc@?$basic_streambuf@V01@removesystem$??6?$basic_ostream@?flush@?$basic_ostream@?get@?$basic_istream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@SleepV01@@V12@
    • String ID: Bye ^_^$D:\Gift2.exe$D:\Gift_Protector.exe$Tips$^_^$color F2$taskkill /f /im Gift2.exe$1+
    • API String ID: 663692276-1637155831
    • Opcode ID: 35729c04ee84feedbea4f71f5ca3f90e75db1c8c2a18dca0660ca3988b838283
    • Instruction ID: f4fce0bb0a8bd5f1d8995555bafb305219fec477391300154acaf4b20cad610c
    • Opcode Fuzzy Hash: 35729c04ee84feedbea4f71f5ca3f90e75db1c8c2a18dca0660ca3988b838283
    • Instruction Fuzzy Hash: 4E1191317F421477D200F7AC7C1BFC676189F86FA1F044621FA09622D0D8E0BB348A66
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 7 2b11b0-2b11ee 8 2b11f1-2b11f6 7->8 8->8 9 2b11f8-2b120f 8->9 10 2b1228-2b1233 9->10 11 2b1211 9->11 14 2b1236-2b1240 10->14 12 2b1213-2b1215 11->12 13 2b1221-2b1226 11->13 12->10 15 2b1217-2b1219 12->15 13->14 16 2b1242-2b124f 14->16 17 2b1251-2b1261 14->17 15->10 20 2b121b 15->20 16->17 18 2b1263-2b1265 17->18 19 2b1267-2b126c 17->19 22 2b128d-2b1299 18->22 23 2b128b 19->23 24 2b126e-2b1270 19->24 20->13 25 2b121d-2b121f 20->25 27 2b129b-2b12a0 22->27 28 2b12a5-2b12b8 22->28 23->22 24->23 26 2b1272-2b1289 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ 24->26 25->10 25->13 26->22 29 2b138c-2b13ae ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z ?uncaught_exception@std@@YA_NXZ 27->29 30 2b12ba 28->30 31 2b12f7-2b130f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z 28->31 35 2b13b8-2b13c7 29->35 36 2b13b0-2b13b2 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ 29->36 34 2b12c0-2b12c2 30->34 32 2b133d-2b1342 31->32 33 2b1311-2b1313 31->33 40 2b134e-2b1385 32->40 33->32 39 2b1315-2b1317 33->39 41 2b12f5 34->41 42 2b12c4 34->42 37 2b13c9 35->37 38 2b13ce-2b13e1 35->38 36->35 37->38 43 2b1319 39->43 44 2b134c 39->44 40->29 41->31 46 2b12ca-2b12e6 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z 42->46 47 2b12c6-2b12c8 42->47 48 2b131b-2b131d 43->48 49 2b131f-2b133b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z 43->49 44->40 50 2b12e8-2b12eb 46->50 51 2b12ed-2b12f3 46->51 47->41 47->46 48->44 48->49 49->32 52 2b1344-2b134a 49->52 50->40 51->34 52->39
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ.MSVCP140(?,75C50660,7676C730), ref: 002B1274
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(00000000,?,75C50660,7676C730), ref: 002B12DD
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z.MSVCP140(?,000000FF,00000000,?,75C50660,7676C730), ref: 002B1306
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 002B1332
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000004,00000000), ref: 002B1396
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 002B13A3
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 002B13B2
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 1492985063-0
    • Opcode ID: 493dbaadf0932e7aa4c4a8c19bcfc77034f5ed099af0a928dc2b73d94e0a3767
    • Instruction ID: 9e2a1afd76827fe8e2f18caa6464f1a9427858c3fe1af7db845e5b1f9712edaa
    • Opcode Fuzzy Hash: 493dbaadf0932e7aa4c4a8c19bcfc77034f5ed099af0a928dc2b73d94e0a3767
    • Instruction Fuzzy Hash: 2F719C35A102158FCB14CF58D9A4BA9BBF1BF49354F598298DC15EB3A2D731EC25CB40
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z.MSVCP140(0000000A), ref: 002B1400
    • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z.MSVCP140 ref: 002B140C
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ.MSVCP140 ref: 002B1414
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$V12@$?flush@?$basic_ostream@?put@?$basic_ostream@?widen@?$basic_ios@
    • String ID:
    • API String ID: 1875450691-0
    • Opcode ID: 8f56973cfe5dda65162210000cababfaff4ddbb02a23f2fbe0180c4a83425b95
    • Instruction ID: 1500856adba929424b1e6507e6caaa6bddc2b33cb5991b80d2a216928c942681
    • Opcode Fuzzy Hash: 8f56973cfe5dda65162210000cababfaff4ddbb02a23f2fbe0180c4a83425b95
    • Instruction Fuzzy Hash: 83D05B353402349BC604EB4CFC5CA6C77A8EF49B517044509F946C7351CB359B1187D5
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 197 2b1dba-2b1dd7 IsProcessorFeaturePresent 198 2b1ddd-2b1e42 197->198 199 2b1f86-2b1f89 197->199 200 2b1e87 198->200 201 2b1e44-2b1e51 198->201 204 2b1e8d-2b1e99 200->204 202 2b1e53-2b1e58 201->202 203 2b1e76-2b1e85 201->203 202->203 205 2b1e5a-2b1e5f 202->205 203->204 206 2b1e9b-2b1ebd 204->206 207 2b1eca 204->207 205->203 209 2b1e61-2b1e66 205->209 208 2b1ecd-2b1eea 206->208 210 2b1ebf-2b1ec8 206->210 207->208 211 2b1f83-2b1f85 208->211 212 2b1ef0-2b1f08 208->212 209->203 213 2b1e68-2b1e6d 209->213 210->208 211->199 212->211 214 2b1f0a-2b1f10 212->214 213->203 215 2b1e6f-2b1e74 213->215 214->211 216 2b1f12-2b1f2a 214->216 215->200 215->203 216->211 217 2b1f2c-2b1f46 216->217 217->211 218 2b1f48-2b1f63 217->218 218->211 219 2b1f65-2b1f74 218->219 219->211 220 2b1f76-2b1f7d 219->220 220->211
    APIs
    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 002B1DD0
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: FeaturePresentProcessor
    • String ID:
    • API String ID: 2325560087-0
    • Opcode ID: 7c7f9541e41c8b4233fb727ec391531b7a073a1b14b686d2ffa10a88962656ec
    • Instruction ID: 1e7e029c59f8d447190f1caa81eebfb0298d554ae8600269376bfb8fc742f2a9
    • Opcode Fuzzy Hash: 7c7f9541e41c8b4233fb727ec391531b7a073a1b14b686d2ffa10a88962656ec
    • Instruction Fuzzy Hash: 2A5192B1D20715CBEB15CF54E8957A9B7F0FB48390F648A6AD811EB350D3B4E960CB90
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001C78,002B14E8), ref: 002B1C71
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 61cf2d66a301a2a21a4d6bfe6c766e0e51809c8603de8ef53ade96716e19b437
    • Instruction ID: 268a73a7fe9c8f5f58c4d61b8cb5038ca120e040db959f02f09901a07abe4a23
    • Opcode Fuzzy Hash: 61cf2d66a301a2a21a4d6bfe6c766e0e51809c8603de8ef53ade96716e19b437
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a60e91c44719e0bd2beabc187d436a6996f266cb19cff68a8c1e963e81129974
    • Instruction ID: 71c37f99c97ac498ecd77d6e3e8e3e0cf801b9a3b2e16643d59ea160b805c8fc
    • Opcode Fuzzy Hash: a60e91c44719e0bd2beabc187d436a6996f266cb19cff68a8c1e963e81129974
    • Instruction Fuzzy Hash: 5FF01535644A48DFC714DF18D990F65B7E8EB09B14F1446ADE91A8BBA1DB36A800CA40
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 002B1433
    • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 002B143E
    • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 002B144A
    • __RTC_Initialize.LIBCMT ref: 002B1462
    • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,002B1D02), ref: 002B1477
      • Part of subcall function 002B1A98: InitializeSListHead.KERNEL32(002B5358,002B1487), ref: 002B1A9D
    • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_00001A8B), ref: 002B1495
    • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 002B14B0
    • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 002B14BF
    • ___scrt_fastfail.LIBCMT ref: 002B14D5
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Initialize$HeadList___scrt_fastfail__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
    • String ID:
    • API String ID: 1979175733-0
    • Opcode ID: 13f2405d8610a04c015e69bf39719ea070162a3a33119ae536e0575e07247256
    • Instruction ID: 29b950db6757a54802de685ac6d3535bb65f9cd6941949f363c1c335a972bb35
    • Opcode Fuzzy Hash: 13f2405d8610a04c015e69bf39719ea070162a3a33119ae536e0575e07247256
    • Instruction Fuzzy Hash: D201CD5193371320DA203BF20833AEF06A81F413E0BD54851B804AA4C3EE55F875CDB3
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 142 2b1c78-2b1c88 143 2b1c8a-2b1c8e 142->143 144 2b1caf-2b1cb4 142->144 143->144 145 2b1c90-2b1c98 143->145 146 2b1c9a-2b1c9f 145->146 147 2b1cb7-2b1ccd __current_exception __current_exception_context terminate 145->147 146->147 148 2b1ca1-2b1ca6 146->148 148->147 149 2b1ca8-2b1cad 148->149 149->144 149->147
    APIs
    • __current_exception.VCRUNTIME140 ref: 002B1CB7
    • __current_exception_context.VCRUNTIME140 ref: 002B1CC1
    • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 002B1CC8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2935220085.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
    • Associated: 00000000.00000002.2935196368.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935236246.00000000002B3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2935255921.00000000002B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __current_exception__current_exception_contextterminate
    • String ID: csm
    • API String ID: 2542180945-1018135373
    • Opcode ID: 4bddf418a0423be7ddbd91b8a9e592eab66874cdac81dfaf63a8a0d0ab8db705
    • Instruction ID: 7a3bd88c3f93a46f155a28cefbe4d2f21a1f93ed6c95498db7211334c76c5464
    • Opcode Fuzzy Hash: 4bddf418a0423be7ddbd91b8a9e592eab66874cdac81dfaf63a8a0d0ab8db705
    • Instruction Fuzzy Hash: 10F0A7314703068B8B316F69905409EBB6DBE623A13E80A17E854DB6A0C770ED71CBD3
    Uniqueness

    Uniqueness Score: -1.00%