Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
Analysis ID:1428437
MD5:b696181ac3dcb8cf23d3ac6c0dafed12
SHA1:a95f75df30086eca2ae0c72b0681ceae1507a41d
SHA256:487f4df71699ada1abc071283823f9f248238e0033c596ec9c50cdb4e1a102c3
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe.1ff84540000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeAvira: detected
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeReversingLabs: Detection: 65%
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Users\Michael\Documents\Visual Studio 2005\Projects\stockChartUserUpdate2017\obj\Debug\stockChartUserUpdate.pdb source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe

      Networking

      barindex
      Source: Yara matchFile source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe.1ff84540000.0.unpack, type: UNPACKEDPE
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://itax.twca.com.tw/ecplus/ecplus_UCA_2018_sha1.crl0_
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://itax.twca.com.tw/xmlrca/TaiCARootCA_2012.crl0
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://stock88168.500.com.tw//aps//
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.stock5168.n9s.com//aps//
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.stock88168.com.tw//aps//
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://www.stock88168.com.tw//aps//Ghttp://www.stock5168.n9s.com//aps//Ghttp://stock88168.500.com.tw
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://www.stock88168.com.tw//program//ShowMyPC1.exe
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: http://www.twca.com.tw/0
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: https://www.globalsign.com/repository/0
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: https://www.stock881688.com.tw/
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeString found in binary or memory: https://www.twca.com.tw/0L
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeCode function: 0_2_00007FF848F10B5D0_2_00007FF848F10B5D
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: invalid certificate
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000000.2004352849.000001FF8454A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestockChartUserUpdate.exe" vs SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeBinary or memory string: OriginalFilenamestockChartUserUpdate.exe" vs SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
      Source: classification engineClassification label: mal60.troj.winEXE@1/0@0/0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeMutant created: NULL
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeReversingLabs: Detection: 65%
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeSection loaded: wintypes.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Users\Michael\Documents\Visual Studio 2005\Projects\stockChartUserUpdate2017\obj\Debug\stockChartUserUpdate.pdb source: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeMemory allocated: 1FF84880000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeMemory allocated: 1FF9E330000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Virtualization/Sandbox Evasion
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Disable or Modify Tools
      LSASS Memory12
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe66%ReversingLabsByteCode-MSIL.Ransomware.Crypren
      SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe100%AviraTR/Crypren.jinae
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.stock5168.n9s.com//aps//SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://itax.twca.com.tw/xmlrca/TaiCARootCA_2012.crl0SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
          unknown
          http://www.twca.com.tw/0SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
            unknown
            http://itax.twca.com.tw/ecplus/ecplus_UCA_2018_sha1.crl0_SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
              unknown
              http://www.stock88168.com.tw//aps//SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://www.twca.com.tw/0LSecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
                  unknown
                  http://www.stock88168.com.tw//program//ShowMyPC1.exeSecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
                    unknown
                    http://stock88168.500.com.tw//aps//SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, 00000000.00000002.3256414378.000001FF86331000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://www.stock88168.com.tw//aps//Ghttp://www.stock5168.n9s.com//aps//Ghttp://stock88168.500.com.twSecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
                        unknown
                        https://www.stock881688.com.tw/SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exefalse
                          unknown
                          No contacted IP infos
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1428437
                          Start date and time:2024-04-18 23:31:07 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 11s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
                          Detection:MAL
                          Classification:mal60.troj.winEXE@1/0@0/0
                          EGA Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 9
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe, PID 3784 because it is empty
                          • VT rate limit hit for: SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
                          No simulations
                          No context
                          No context
                          No context
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):5.785185552621054
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          • Win32 Executable (generic) a (10002005/4) 49.96%
                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
                          File size:54'760 bytes
                          MD5:b696181ac3dcb8cf23d3ac6c0dafed12
                          SHA1:a95f75df30086eca2ae0c72b0681ceae1507a41d
                          SHA256:487f4df71699ada1abc071283823f9f248238e0033c596ec9c50cdb4e1a102c3
                          SHA512:3fd5e0ccca8cb5ab7692a9c11c4249766f1e36d23a24d5b8c7398202fc614c45857cead23f80e68cbe2d206bb6c1afebc95b91c6cafebd6e40af400a8dd567d5
                          SSDEEP:768:rFiF95SufAKLJ48ms1u4SSFLgSvD2cBSzeq/YcaPCIA+jkNlTb:QJszequK1HNb
                          TLSH:E4337B4323EE1317FABA17FD49E094295F70E166EC81EB5E381C54E82B237959B40E1B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qe.........."...0..p...0........... ........... ..............................?.....`................................
                          Icon Hash:6c626353256262b2
                          Entrypoint:0x11008816
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x11000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x6551E489 [Mon Nov 13 08:55:37 2023 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Signature Valid:false
                          Signature Issuer:CN=TaiCA Secure CA, OU=Certification Service Provider, O=TAIWAN-CA.COM Inc., C=TW
                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                          Error Number:-2146762487
                          Not Before, Not After
                          • 20/12/2022 01:44:23 17/01/2024 16:59:59
                          Subject Chain
                          • E=@@, CN=B122018080, OU=The Capital Group, OU=RA-TheCapital, O=Certification Service Provider, O=TaiCA Secure CA, C=TW
                          Version:3
                          Thumbprint MD5:EFD39909A096EAA2A075DC0BD42150C0
                          Thumbprint SHA-1:DE2BA519DCB4F4659135E49D42BFEE4140CA3E4C
                          Thumbprint SHA-256:83C276FE5020BD1D50B412E0A6A30AC8781DFE82DDE619174E284774F1839880
                          Serial:7EAC7FBF
                          Instruction
                          jmp dword ptr [11002000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x87c40x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1d30.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0xb0000x25e8
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x868c0x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x681c0x7000469018cbe177436e1d37cf425bfb0b99False0.41796875data5.726790140605667IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xa0000x1d300x2000ebbfbcee161da4c73a8a5d72b7025a61False0.4444580078125data6.3795842109194645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xc0000xc0x10008174595332082d1f42dad937dae3d7e5False0.008544921875data0.013126943721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xa1000xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.5265432098765432
                          RT_GROUP_ICON0xadb80x14data1.15
                          RT_VERSION0xaddc0x33adata0.4213075060532688
                          RT_MANIFEST0xb1280xc03XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4627642276422764
                          DLLImport
                          mscoree.dll_CorExeMain
                          No network behavior found

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:23:31:55
                          Start date:18/04/2024
                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10310.21629.exe"
                          Imagebase:0x1ff84540000
                          File size:54'760 bytes
                          MD5 hash:B696181AC3DCB8CF23D3AC6C0DAFED12
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >
                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 490eaec030b93641740eb72c7ca15f5bd18c2a2243eab516a732a1e833319677
                            • Instruction ID: 250f8deeb5c0cb38e2f522bb4ac2a538cf7c7fb92751c8979df154601e9c7e4e
                            • Opcode Fuzzy Hash: 490eaec030b93641740eb72c7ca15f5bd18c2a2243eab516a732a1e833319677
                            • Instruction Fuzzy Hash: DE227230A19A8ECFDB89EF18C454AA577F1FF59344F2445BAD409CB296CF36A842CB10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 928ea0d6eb40737a09ab7d935cff7767324b2a4376a36da463faa8be3c17755d
                            • Instruction ID: ddcd450bff0c030279d1a2b6f3094013004e176ae975d83117b07bfebd95721a
                            • Opcode Fuzzy Hash: 928ea0d6eb40737a09ab7d935cff7767324b2a4376a36da463faa8be3c17755d
                            • Instruction Fuzzy Hash: 37A18F30A18A5D8FDB94EF18C894BA9B3B5FF69301F5151E5A40DD72A6CB70EE818F40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cbc6a4a8998ec71bddc08a27ed7f7dc6bb7d765608575e50c1c000b5519ecd8f
                            • Instruction ID: 969bbe38a4a8d2f1f79f868c44a89e14d885bdda7c8d17154b36e7d6b4fa9e3a
                            • Opcode Fuzzy Hash: cbc6a4a8998ec71bddc08a27ed7f7dc6bb7d765608575e50c1c000b5519ecd8f
                            • Instruction Fuzzy Hash: FC811770A09A5D8FDB98EF18C894BA9B3B1FF99304F5401A9D40DD7296CF35AD82CB04
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f904dace425b5b76c77af907d0617e80638518db9b5262d79d2c9676cd35a6a9
                            • Instruction ID: 0ddcfb9a020d7e1a59c3b860f7ffab0b6fe5f1a68d8142f341f1ab6b30ad2e94
                            • Opcode Fuzzy Hash: f904dace425b5b76c77af907d0617e80638518db9b5262d79d2c9676cd35a6a9
                            • Instruction Fuzzy Hash: 67711930A19A5A8FDB99EF28C895BA973B1FF58740F5505B8E40DC7292CE35ED81CB04
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1893f9fa47ee6ea2b776ee89f7adf43e757a9ff34c80b0c1370151e804fbc602
                            • Instruction ID: dc80a7cd1c615ca10d28b261fc6ec7ac949e2cdb6595d7f38170122671af390f
                            • Opcode Fuzzy Hash: 1893f9fa47ee6ea2b776ee89f7adf43e757a9ff34c80b0c1370151e804fbc602
                            • Instruction Fuzzy Hash: 7F410D7192A95A9FEBD9EF18C8516EAB3B1FF58744F0042B5D00DD3286DF34AE818B40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 75081cbaefc96dfcae4511920da21689b5ae09f3936ff501ba2d4212ea94c02b
                            • Instruction ID: 844dc7597324302e915d193ca2291814093d95059a647dac14680f5d7c20b842
                            • Opcode Fuzzy Hash: 75081cbaefc96dfcae4511920da21689b5ae09f3936ff501ba2d4212ea94c02b
                            • Instruction Fuzzy Hash: BB312A30908A4D8FDF95EF68D454AE97BF1FF6A341F1400AAD408E7292DB759885CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0352f0eda5538e9b39ef4653bddbc5f7a6a4c46e22a8c5242899bbdabdea56b3
                            • Instruction ID: 37e3e3a443cdd3340d4d05190b6f46398334e318285f6041d1758c38509d4c87
                            • Opcode Fuzzy Hash: 0352f0eda5538e9b39ef4653bddbc5f7a6a4c46e22a8c5242899bbdabdea56b3
                            • Instruction Fuzzy Hash: A421BF3290C51D8FDB45FB18D4A56F9B3A1FB99350F04017AD00AE21C2DF6498408B50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0daa6a9559463b34d58987021d8ec49a3c237e184f639ea83d8f20f3b28c60ff
                            • Instruction ID: 7d23f3e02fa247662407f6472bf9b60a9e798a88005085a3bf8450245f2a3dae
                            • Opcode Fuzzy Hash: 0daa6a9559463b34d58987021d8ec49a3c237e184f639ea83d8f20f3b28c60ff
                            • Instruction Fuzzy Hash: D6114F70A08A4E8FDB84EF18D850BA973A1FF99340F5154A4E40DCB6D6CB75AC81CB14
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3258352619.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a77b47ba51cc3c6ca837d764ab190ade0440022e81131e185974cdb79661c123
                            • Instruction ID: a2c1a2879f370daddea393fc1a43d8fb280c78017653b75eac6b4f269b7c96b5
                            • Opcode Fuzzy Hash: a77b47ba51cc3c6ca837d764ab190ade0440022e81131e185974cdb79661c123
                            • Instruction Fuzzy Hash: 56E01A30E1992D9EDBA9EB1888557E8B7B2FB1C740F4006E9809DE22D6DE341D818B04
                            Uniqueness

                            Uniqueness Score: -1.00%