Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
Analysis ID:1428514
MD5:ce1755d3643d9cc1c6fb58e7051d5ad9
SHA1:ed7ed2be9c585917542bc1c9c21ece7fc7b2b3a5
SHA256:6ef619bf548f43105b623bf7ffafa3f5d5b42bf6092d4949ec36677486ad67bd
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    Process Memory Space: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe PID: 2636JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe PID: 2636JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeReversingLabs: Detection: 26%
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeVirustotal: Detection: 30%Perma Link
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeJoe Sandbox ML: detected

        Exploits

        barindex
        Source: Yara matchFile source: 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe PID: 2636, type: MEMORYSTR
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F1C6240_2_00007FF848F1C624
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F24D510_2_00007FF848F24D51
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F25DAC0_2_00007FF848F25DAC
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F1CDE90_2_00007FF848F1CDE9
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F1586D0_2_00007FF848F1586D
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F10F2D0_2_00007FF848F10F2D
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F1A7800_2_00007FF848F1A780
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F25E3A0_2_00007FF848F25E3A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F18F280_2_00007FF848F18F28
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: No import functions for PE file found
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4553321535.000002D72CF18000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAmovadeh0 vs SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000000.2103518247.000002D71ACF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAcegevuyaH vs SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeBinary or memory string: OriginalFilenameAcegevuyaH vs SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, GenericCreateGlobalFunctions.csTask registration methods: 'TaskStopsLongTimePattern'
        Source: classification engineClassification label: mal80.expl.evad.winEXE@1/0@0/0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeMutant created: NULL
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeReversingLabs: Detection: 26%
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeVirustotal: Detection: 30%
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeString found in binary or memory: /AddInServer
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation

        barindex
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, TaskWaitBegincDisplayClass115.cs.Net Code: ModuleReflectionOnlyLoadFrom
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F17963 push ebx; retf 0_2_00007FF848F1796A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848F100BD pushad ; iretd 0_2_00007FF848F100C1
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeCode function: 0_2_00007FF848FF026B push esp; retf 4810h0_2_00007FF848FF0312
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe PID: 2636, type: MEMORYSTR
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeMemory allocated: 2D71C7F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeMemory allocated: 2D734AF0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeMemory allocated: 2D73D2B0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeWindow / User API: threadDelayed 9966Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe TID: 5300Thread sleep count: 9966 > 30Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe TID: 5300Thread sleep time: -9966000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe, 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeProcess token adjusted: DebugJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        121
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Scheduled Task/Job
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Software Packing
        NTDS1
        Process Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe26%ReversingLabsByteCode-MSIL.Trojan.Zilla
        SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe31%VirustotalBrowse
        SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1428514
        Start date and time:2024-04-19 04:24:07 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 3s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        Detection:MAL
        Classification:mal80.expl.evad.winEXE@1/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 86%
        • Number of executed functions: 11
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        TimeTypeDescription
        04:25:41API Interceptor2465461x Sleep call for process: SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe modified
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.081403077916565
        TrID:
        • Win64 Executable GUI Net Framework (217006/5) 49.88%
        • Win64 Executable GUI (202006/5) 46.43%
        • Win64 Executable (generic) (12005/4) 2.76%
        • Generic Win/DOS Executable (2004/3) 0.46%
        • DOS Executable Generic (2002/1) 0.46%
        File name:SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        File size:973'036 bytes
        MD5:ce1755d3643d9cc1c6fb58e7051d5ad9
        SHA1:ed7ed2be9c585917542bc1c9c21ece7fc7b2b3a5
        SHA256:6ef619bf548f43105b623bf7ffafa3f5d5b42bf6092d4949ec36677486ad67bd
        SHA512:696f2b91d5a8bba6dae5b37e9bd128f3942f6eb650ffef5ce614856d27f3d8e01c112492d710f6e77dd98b060fea8502d56e51891c1475234b7a0b065e03539a
        SSDEEP:12288:gu3VMFzvrA/69tpbccoCVW/OQ6/Zic16ZQ9LUUWPXSi0jcLFE7nP5ZxzRHWfl:gu3VM5cC9nVHMc1hMz7FEn1RHWfl
        TLSH:5725E02032885517DBDE337CAFA0D57007B0ED8A5946D76A29D86DCF3ADF7431A213A2
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."...0.................. ....@...... ....................................`................................
        Icon Hash:4bd8d4d2d3dcd84f
        Entrypoint:0x400000
        Entrypoint Section:
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x661FA6AD [Wed Apr 17 10:38:37 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        dec ebp
        pop edx
        nop
        add byte ptr [ebx], al
        add byte ptr [eax], al
        add byte ptr [eax+eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x2925e.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x322de0x1c.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x303840x30400954d2a9a81bfb8c35d3a3ef4d3628d99False0.42253784812176165data6.00057275494538IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x340000x2925e0x294008f91474b388a5a395e942d967274e049False0.07912523674242425data1.2597983498107572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x342dc0xc33PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9250720461095101
        RT_ICON0x34f100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.0289246421388856
        RT_ICON0x457380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.055943872188354005
        RT_ICON0x4ebe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.0688539741219963
        RT_ICON0x540680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.06500944733112896
        RT_ICON0x582900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.10093360995850623
        RT_ICON0x5a8380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.14165103189493433
        RT_ICON0x5b8e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.19508196721311474
        RT_ICON0x5c2680x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.26063829787234044
        RT_GROUP_ICON0x5c6d00x84data0.7272727272727273
        RT_VERSION0x5c7540x490data0.4820205479452055
        RT_VERSION0x5cbe40x490dataEnglishUnited States0.4837328767123288
        RT_MANIFEST0x5d0740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:04:25:06
        Start date:19/04/2024
        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.58558.2907.4089.exe"
        Imagebase:0x2d71acb0000
        File size:973'036 bytes
        MD5 hash:CE1755D3643D9CC1C6FB58E7051D5AD9
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4552305215.000002D71CB16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:15.1%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:3
          Total number of Limit Nodes:0
          execution_graph 9822 7ff848f14442 9823 7ff848f14451 VirtualProtect 9822->9823 9825 7ff848f1453e 9823->9825

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 55 7ff848f1a780-7ff848f1e1c5 57 7ff848f1e20f-7ff848f1e239 55->57 58 7ff848f1e1c7-7ff848f1e208 55->58 61 7ff848f1e23b-7ff848f1e250 57->61 62 7ff848f1e252 57->62 60 7ff848f1e20e 58->60 60->57 63 7ff848f1e254-7ff848f1e259 61->63 62->63 64 7ff848f1e25f-7ff848f1e26e 63->64 65 7ff848f1e356-7ff848f1e376 63->65 70 7ff848f1e278-7ff848f1e279 64->70 71 7ff848f1e270-7ff848f1e276 64->71 69 7ff848f1e3c7-7ff848f1e3d2 65->69 72 7ff848f1e378-7ff848f1e37e 69->72 73 7ff848f1e3d4-7ff848f1e3e3 69->73 74 7ff848f1e27b-7ff848f1e29e 70->74 71->74 75 7ff848f1e841-7ff848f1e859 72->75 76 7ff848f1e384-7ff848f1e3a5 call 7ff848f1a760 72->76 80 7ff848f1e3f9 73->80 81 7ff848f1e3e5-7ff848f1e3f7 73->81 79 7ff848f1e2f3-7ff848f1e2fe 74->79 88 7ff848f1e85b-7ff848f1e896 call 7ff848f1a460 75->88 89 7ff848f1e8a3-7ff848f1e8d1 call 7ff848f15658 75->89 90 7ff848f1e3aa-7ff848f1e3c4 76->90 85 7ff848f1e2a0-7ff848f1e2a6 79->85 86 7ff848f1e300-7ff848f1e317 79->86 87 7ff848f1e3fb-7ff848f1e400 80->87 81->87 85->75 91 7ff848f1e2ac-7ff848f1e2f0 call 7ff848f1a760 85->91 104 7ff848f1e319-7ff848f1e33f call 7ff848f1a760 86->104 105 7ff848f1e346-7ff848f1e351 call 7ff848f1a610 86->105 92 7ff848f1e48c-7ff848f1e4a0 87->92 93 7ff848f1e406-7ff848f1e428 call 7ff848f1a760 87->93 130 7ff848f1e898-7ff848f1e8a1 88->130 131 7ff848f1e8e0-7ff848f1e8eb 88->131 135 7ff848f1e8dc-7ff848f1e8df 89->135 136 7ff848f1e8d3-7ff848f1e8db 89->136 90->69 91->79 94 7ff848f1e4f0-7ff848f1e4ff 92->94 95 7ff848f1e4a2-7ff848f1e4a8 92->95 122 7ff848f1e42a-7ff848f1e454 93->122 123 7ff848f1e456-7ff848f1e457 93->123 116 7ff848f1e50c 94->116 117 7ff848f1e501-7ff848f1e50a 94->117 100 7ff848f1e4aa-7ff848f1e4c5 95->100 101 7ff848f1e4c7-7ff848f1e4df 95->101 100->101 119 7ff848f1e4e8-7ff848f1e4eb 101->119 104->105 105->92 125 7ff848f1e50e-7ff848f1e513 116->125 117->125 128 7ff848f1e698-7ff848f1e6ad 119->128 132 7ff848f1e459-7ff848f1e460 122->132 123->132 133 7ff848f1e519-7ff848f1e51c 125->133 134 7ff848f1e81f-7ff848f1e820 125->134 147 7ff848f1e6ed 128->147 148 7ff848f1e6af-7ff848f1e6eb 128->148 130->89 145 7ff848f1e8ed-7ff848f1e8f5 131->145 146 7ff848f1e8f6-7ff848f1e907 131->146 132->92 142 7ff848f1e462-7ff848f1e487 call 7ff848f1a788 132->142 143 7ff848f1e51e-7ff848f1e53b call 7ff848f10188 133->143 144 7ff848f1e564 133->144 140 7ff848f1e823-7ff848f1e832 134->140 135->131 136->135 174 7ff848f1e833-7ff848f1e83a 140->174 142->92 172 7ff848f1e80e-7ff848f1e81e 142->172 143->144 183 7ff848f1e53d-7ff848f1e562 143->183 152 7ff848f1e566-7ff848f1e56b 144->152 145->146 149 7ff848f1e909-7ff848f1e911 146->149 150 7ff848f1e912-7ff848f1e94d 146->150 154 7ff848f1e6ef-7ff848f1e6f4 147->154 148->154 149->150 167 7ff848f1e954-7ff848f1e95f 150->167 168 7ff848f1e94f call 7ff848f1c350 150->168 159 7ff848f1e66c-7ff848f1e68f 152->159 160 7ff848f1e571-7ff848f1e57d 152->160 161 7ff848f1e764-7ff848f1e7a5 call 7ff848f15590 154->161 162 7ff848f1e6f6-7ff848f1e753 call 7ff848f15590 154->162 178 7ff848f1e695-7ff848f1e696 159->178 160->75 170 7ff848f1e583-7ff848f1e592 160->170 192 7ff848f1e7aa-7ff848f1e7b2 161->192 216 7ff848f1e7d4 162->216 217 7ff848f1e755-7ff848f1e75e 162->217 184 7ff848f1e971 167->184 185 7ff848f1e961-7ff848f1e96f 167->185 168->167 175 7ff848f1e5a5-7ff848f1e5b2 call 7ff848f10188 170->175 176 7ff848f1e594-7ff848f1e5a3 170->176 174->75 193 7ff848f1e5b8-7ff848f1e5be 175->193 176->193 178->128 183->152 191 7ff848f1e973-7ff848f1e978 184->191 185->191 195 7ff848f1e97a-7ff848f1e98d call 7ff848f13d78 191->195 196 7ff848f1e98f-7ff848f1e997 call 7ff848f155a8 191->196 192->140 197 7ff848f1e7b4-7ff848f1e7b7 192->197 199 7ff848f1e5c0-7ff848f1e5ed 193->199 200 7ff848f1e5f3-7ff848f1e5f8 193->200 211 7ff848f1e99c-7ff848f1e9a3 195->211 196->211 197->174 203 7ff848f1e7b9 197->203 199->200 200->75 201 7ff848f1e5fe-7ff848f1e61e 200->201 214 7ff848f1e620-7ff848f1e62e 201->214 215 7ff848f1e632-7ff848f1e65b 201->215 209 7ff848f1e7bb-7ff848f1e7ce 203->209 210 7ff848f1e800-7ff848f1e80b 203->210 209->216 210->172 219 7ff848f1e65c-7ff848f1e662 call 7ff848f19b48 214->219 220 7ff848f1e630-7ff848f1e631 214->220 215->219 216->216 217->161 223 7ff848f1e667-7ff848f1e66a 219->223 220->215 223->128
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID: Y_L;
          • API String ID: 0-493232020
          • Opcode ID: 7dc9c62a6cc4c41d9d9eca8a603a023cd92d1d3432dd294236cff172ea9b5e9f
          • Instruction ID: 695fc74f26d55cb26246688944e3adc464b99392c42aab8a16d0635e8fc111b9
          • Opcode Fuzzy Hash: 7dc9c62a6cc4c41d9d9eca8a603a023cd92d1d3432dd294236cff172ea9b5e9f
          • Instruction Fuzzy Hash: E152E630E1CA498FEBA8EB289455A7977E1FF59340F5401BEE44EC72D2DF24AC428B45
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d273b529a093554e3f589d9d3fcf1af878883ba5ff912fa583d19e97e6639a0f
          • Instruction ID: 23ef58600bf0c583b9b6af64fbf324e17fd9f02048f6e4ba066e1d67febab9c0
          • Opcode Fuzzy Hash: d273b529a093554e3f589d9d3fcf1af878883ba5ff912fa583d19e97e6639a0f
          • Instruction Fuzzy Hash: 64420731E1D98A8FE3A9E72C68165B5B7D1FF99360F0442BAD04EC71D2DF1DA8068385
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e714b9e01fa30b55fc0927194deaece51454bce632de76455bd06874562e7f47
          • Instruction ID: ffe829613563f0804a56d21670ed086f08a85db1e7f3512e527129462c652618
          • Opcode Fuzzy Hash: e714b9e01fa30b55fc0927194deaece51454bce632de76455bd06874562e7f47
          • Instruction Fuzzy Hash: 30229831A0CB864FE349EB2884911B5B7E1FF95351F1445BED08AC72E6EF29AC42C785
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a5c8245cd638cdda35b8311f7812b1e3c388ed58f54f4ffaf78bc7875f39d757
          • Instruction ID: f0be39b403ac495c068ddd82f603e674ecafaab43b5543308d4519fb83485bec
          • Opcode Fuzzy Hash: a5c8245cd638cdda35b8311f7812b1e3c388ed58f54f4ffaf78bc7875f39d757
          • Instruction Fuzzy Hash: 08F15531E1DAC94FE759BB2C98521B97BE1EF96750F0801BED48AC71C3DE18AC428395
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 56a2e29675814bd03c72f30c05a2c5bf58141d824e8d8fa895164b2936ab8bbf
          • Instruction ID: 0e95656564a9caaa0759cdaf3325590d26434c1c2d00ce9fe34064b6c8dc2e33
          • Opcode Fuzzy Hash: 56a2e29675814bd03c72f30c05a2c5bf58141d824e8d8fa895164b2936ab8bbf
          • Instruction Fuzzy Hash: A3F1663190CB864FE31DEB288491575B7E2FF91341F1446BED4CAC72E6DE28A846C781
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 925bea97766d0d1fe5606b0122c676e4a06bbd65f23a6d223ee68e806a85fc85
          • Instruction ID: dd85880321aebc1228ce24ee0ace155a2a5f71e70688263e0b2c15e479d3f153
          • Opcode Fuzzy Hash: 925bea97766d0d1fe5606b0122c676e4a06bbd65f23a6d223ee68e806a85fc85
          • Instruction Fuzzy Hash: DE719331A2CA494FD758FB2894554BAB3E1FF99351F50063EE58BC3292DE28FC428685
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4a485374f835965c0c597e9e7e3e81f63a67d60c52e0ef3103fdad1d8ba4b018
          • Instruction ID: bc0094f8919cc76e6ea273a7f0a087a71b4648359e65dc71035a2bb7b3c46d97
          • Opcode Fuzzy Hash: 4a485374f835965c0c597e9e7e3e81f63a67d60c52e0ef3103fdad1d8ba4b018
          • Instruction Fuzzy Hash: 8B41593190D6895FD71E9F3898660B57BA5EB87320B0582BFD487C71E3DE28680783D5
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 82a60651581ece871bd2eb85fab1bbf6c4d384e0e64f497da659befc5acb4961
          • Instruction ID: 8921d7c89c76dd4f0d183f3e9404f27fef840b8fd53a67940be71dc000ba135b
          • Opcode Fuzzy Hash: 82a60651581ece871bd2eb85fab1bbf6c4d384e0e64f497da659befc5acb4961
          • Instruction Fuzzy Hash: D041273190D6895FD71E9F7488661B57FA5EF87210F0582BED087C71D3DE28680783A1
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 292 7ff848f14442-7ff848f1444f 293 7ff848f1445a-7ff848f1446b 292->293 294 7ff848f14451-7ff848f14459 292->294 295 7ff848f1446d-7ff848f14475 293->295 296 7ff848f14476-7ff848f1453c VirtualProtect 293->296 294->293 295->296 301 7ff848f1453e 296->301 302 7ff848f14544-7ff848f14575 296->302 301->302
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: 4e8211886621bab663d841bcaea560f8516a69e6ef35cde5cf991790a294c571
          • Instruction ID: 7e3d7e53abaebdbf0317b343f647130dc3c1b98fe564b2fe90fd5851806f114a
          • Opcode Fuzzy Hash: 4e8211886621bab663d841bcaea560f8516a69e6ef35cde5cf991790a294c571
          • Instruction Fuzzy Hash: 1441593190D7884FDB19DFA898466F97BE1EF96321F04426FD089C3193CB786846C796
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4559448049.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848ff0000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 78251214ad590ef1b57fa79a4ad3669241c82ce36b482e98b6b04b7806b2847d
          • Instruction ID: bfd926f2f65e9712478c61643428fce56e5599df6da1bd34c6f6933639950667
          • Opcode Fuzzy Hash: 78251214ad590ef1b57fa79a4ad3669241c82ce36b482e98b6b04b7806b2847d
          • Instruction Fuzzy Hash: 2451683190CA8A8FDB55FB18C891AF8B7E0FF95344F5405AAC64ECB0D6CB24A846CB44
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4559448049.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848ff0000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 67e01045987f21d3c1053250ecc7a386efea4f28eab731ae84d5baa8a5c26d38
          • Instruction ID: 95d3f72fea7db47dbd035bb229f93e5af12352b3f71653205ee5a5c13955293a
          • Opcode Fuzzy Hash: 67e01045987f21d3c1053250ecc7a386efea4f28eab731ae84d5baa8a5c26d38
          • Instruction Fuzzy Hash: 87E07E31A096298EDB65EA48DC81B99B3B1EB99250F0042E6D54DA7251CB30AA858B82
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4558899869.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 416d49bed63b5b563a0dd7d7bdcb20c5e183ab241fdbf58ce885f84353706e6f
          • Instruction ID: 42d037e1856543bff53185360f37f3c9c5b25aefe1995dea50eea37e99002bd6
          • Opcode Fuzzy Hash: 416d49bed63b5b563a0dd7d7bdcb20c5e183ab241fdbf58ce885f84353706e6f
          • Instruction Fuzzy Hash: E4B1E23191EBC64FD316A73888641A5BFA0EF53350F1D46FAC09ACB0E7DA19AC46C355
          Uniqueness

          Uniqueness Score: -1.00%