Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Analysis ID:1429037
MD5:abbfe93d01183831f51e40aba4bad37f
SHA1:17a1f4110b3e711965681bbeb48f6339f8c86078
SHA256:7d4d612275a6f4c3d1b0d23c3ae19cf39fcdd729f3f899f3df44b619bea7e17b
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe (PID: 7340 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe" MD5: ABBFE93D01183831F51E40ABA4BAD37F)
    • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeVirustotal: Detection: 49%Perma Link
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\.Jakob\Other\OffensiveTools\SharpDPAPI\SharpChrome\obj\Debug\SharpChrome.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: Binary string: C:\.Jakob\Other\OffensiveTools\SharpDPAPI\SharpChrome\obj\Debug\SharpChrome.pdbt source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeCode function: 4x nop then jmp 00007FFD9B8909ECh0_2_00007FFD9B8905FA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeCode function: 4x nop then dec eax0_2_00007FFD9B890E3D
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, 00000000.00000000.1662599128.0000017AE4604000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSharpChrome.exe8 vs SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeBinary or memory string: OriginalFilenameSharpChrome.exe8 vs SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Crypto.csCryptographic APIs: 'TransformFinalBlock'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Crypto.csCryptographic APIs: 'TransformFinalBlock'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Crypto.csCryptographic APIs: 'TransformFinalBlock'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Dpapi.csCryptographic APIs: 'TransformFinalBlock'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Dpapi.csCryptographic APIs: 'TransformFinalBlock'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, LSADump.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Helpers.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Helpers.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Chrome.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Sqlite3.csSuspicious method names: .Sqlite3.accessPayload
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Sqlite3.csSuspicious method names: .Sqlite3.copyPayload
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, Sqlite3.csSuspicious method names: .Sqlite3.fetchPayload
Source: classification engineClassification label: mal52.winEXE@2/2@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe.logJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7348:120:WilError_03
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, 00000000.00000000.1662488123.0000017AE4532000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, 00000000.00000000.1662488123.0000017AE4532000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;?Cannot add a PRIMARY KEY column5Cannot add a UNIQUE columnuCannot add a REFERENCES column with non-NULL default value
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, 00000000.00000000.1662488123.0000017AE4532000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, 00000000.00000000.1662488123.0000017AE4532000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeVirustotal: Detection: 49%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\.Jakob\Other\OffensiveTools\SharpDPAPI\SharpChrome\obj\Debug\SharpChrome.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: Binary string: C:\.Jakob\Other\OffensiveTools\SharpDPAPI\SharpChrome\obj\Debug\SharpChrome.pdbt source: SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeMemory allocated: 17AE4830000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeMemory allocated: 17AFE360000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe TID: 7400Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe49%VirustotalBrowse
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1429037
Start date and time:2024-04-20 09:24:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Detection:MAL
Classification:mal52.winEXE@2/2@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 7
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Execution Graph export aborted for target SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe, PID 7340 because it is empty
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
File Type:CSV text
Category:modified
Size (bytes):226
Entropy (8bit):5.355760272568367
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2FDkwIyp1v:Q3La/KDLI4MWuPXcp1v
MD5:FC3575D5BE1A5405683DC33B66D36243
SHA1:1C816D34B7D5B96E077DC3EF640BA8C7BA370502
SHA-256:1D7F7FBA862417A1D0351C1BF454F1A9BB0ED7FFD5DF1112EED802C01BDDA50C
SHA-512:68914FE00F8550A623074F9ACC31ACEF8A3F6DFDDBD9FDA23512079BEC5E8A4D4E82BC8CD8D536E6C88F4DA3A704AC376785B44343BD3BED83E440857A3C0164
Malicious:false
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..
Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
File Type:ASCII text, with CRLF, LF line terminators
Category:dropped
Size (bytes):2609
Entropy (8bit):4.5145667984138695
Encrypted:false
SSDEEP:48:aQjqhVfMZCvSCw8ziM2E3u+z78AZHV7LyNWaN/U:5qv5+UzXZJyNWaN/U
MD5:260343F14B3470C1B8B296B2F5B76AFB
SHA1:3537CF1ED434D08F5254D696C83877FDACC5F719
SHA-256:B7A56E5F7BECAB189A8721BED0EE4A0ADA730D142AFCAE00D387139AAC6EA9BB
SHA-512:34B1BD2A384641D0F39846BA40735DBE1E789BAF2A557953DB007E4D61D3799258A1B48F62AAB0CF9B992E1ECE201CB0A00D0FA19DAF014C9A2FFA189A0EE654
Malicious:false
Reputation:low
Preview:.. __ _ .. (_ |_ _. ._ ._ / |_ ._ _ ._ _ _ .. __) | | (_| | |_) \_ | | | (_) | | | (/_ .. | .. v1.11.3 ......Retrieve a domain controller's DPAPI backup key, optionally specifying a DC and output file:.... SharpChrome backupkey [/nowrap] [/server:SERVER.domain] [/file:key.pvk]......Global arguments for the 'cookies', 'logins', and 'statekeys' commands:.... Decryption:.. /unprotect - force use of CryptUnprotectData() (default for unprivileged execution).. /password:X - first decrypt the current user's masterkeys using a plaintext password. Works with any function, as well as remotely... GUID1:SHA1 ... - use a one or more GUID:SHA1 masterkeys for decryption.. /mkfile:FILE - use a file of one or more GUID:SHA1 masterkeys for decryption.. /pvk:BASE64... - use a base64'ed DPAPI do
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.855361281636871
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Generic Win/DOS Executable (2004/3) 0.01%
File name:SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
File size:856'576 bytes
MD5:abbfe93d01183831f51e40aba4bad37f
SHA1:17a1f4110b3e711965681bbeb48f6339f8c86078
SHA256:7d4d612275a6f4c3d1b0d23c3ae19cf39fcdd729f3f899f3df44b619bea7e17b
SHA512:409c90d186f2ba150c2fdf07b05e89bd9018c345a744d9e7d74558907bcfbeac1e55785c5aec9d60fcc3454e6691091e99928f25e2dfbdf0ab902c225b6b80a0
SSDEEP:12288:GbSQ9B+7gR0bsImCCayCayZeP2MQRM+8RK+7I/ZNr/T0mE+eom+:t8r0bsIUYUPbKEk7r/TLE+ea
TLSH:69055B642AE0AE16E5BE5B7A80B258155370B011EB73FB4F06C4E0B92DB3391DD14FA7
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.d.........."...0.................. ...@....@.. ....................................`................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x4cd39e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x64DE2792 [Thu Aug 17 13:58:42 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax+00h], cl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax+00h], al
xor al, byte ptr [eax]
add byte ptr [eax], al
push esp
add byte ptr [eax+eax], ah
inc edi
pop es
or al, byte ptr [edi]
add dword ptr [eax], eax
add dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
or al, byte ptr [ecx]
or byte ptr [eax], al
or al, 00h
or eax, dword ptr [ecx]
adc byte ptr [eax], al
sbb al, 00h
dec eax
add byte ptr [eax], bl
add byte ptr [eax], cl
add byte ptr [ebx], dl
and byte ptr [eax], ah
add byte ptr [eax], ch
add byte ptr [eax+21h], dl
sub byte ptr [eax], al
or byte ptr [eax], al
dec eax
add byte ptr [eax], dh
add byte ptr [eax], cl
add byte ptr [eax+00h], dh
cmp byte ptr [eax], al
or byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [edi], eax
add eax, 05050505h
add eax, 4D53534Bh
add al, byte ptr [eax]
add dword ptr [eax], eax
add dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [ecx], eax
add eax, dword ptr [eax]
add eax, 01000600h
add byte ptr [eax], al
add byte ptr [ecx], al
add dword ptr [edx], eax
add byte ptr [eax+1Bh], al
mov ch, byte ptr [ecx]
push ecx
sub esp, dword ptr [ebp+34h]
and ch, byte ptr [esi+2Dh]
xor dword ptr [edx], eax
xor byte ptr [eax+ebp+5F107418h], cl
mov byte ptr [ebx], cl
insd
mov dword ptr [edx+06h], esi
sbb eax, 388B5F68h
or dword ptr [60663C73h+ecx], edx
jnle 00007FFBA4B699E8h
xor eax, 4415156Ch
add esp, dword ptr fs:[ecx]
jl 00007FFBA4B69A2Dh
imul eax, dword ptr [4A470E5Fh], 13h
xor esp, dword ptr [edx+31h]
and al, 20h
push FFFFFF86h
pop esp
adc dword ptr [edx+2Ah], eax
or byte ptr [eax+69h], bh
xor al, byte ptr [eax+eax]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xcd34c0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5bc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xcd2140x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xd07940xd0800afa179e7393c92d9cba35d43b4583e36False0.4078776041666667data5.859971661657489IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0xd40000x5bc0x60065d2c1fabc2fa8313ed8449e9d55cdfaFalse0.4173177083333333data4.109979990466998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xd60000xc0x200fec5939c7b1146a21b47e3a3ef2e17daFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0xd40900x32cdata0.4211822660098522
RT_MANIFEST0xd43cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:09:24:55
Start date:20/04/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe"
Imagebase:0x17ae4530000
File size:856'576 bytes
MD5 hash:ABBFE93D01183831F51E40ABA4BAD37F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:09:24:55
Start date:20/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 731ad0c92f7295af1ae8e46781545326aa3ff09be1c261ceee881f7bbe9e04b4
    • Instruction ID: f8ccba8db7e6bba95d67faecc06bcbb81fe7063ba5fc94041fa15a11e3a14d1e
    • Opcode Fuzzy Hash: 731ad0c92f7295af1ae8e46781545326aa3ff09be1c261ceee881f7bbe9e04b4
    • Instruction Fuzzy Hash: 5A719031A1A65D8FDB55EBA8C4646FDBFB1EF4A304F0500BAC049E72A2CA386945CB41
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3b8b36405c1637774fd06c6ce0fa022f19bb3e8fdffd9f3b2c8cc6a8b1eb3d1a
    • Instruction ID: ce81cdf8e8558fd98d5f70fce5e33c9b76c058eba2f4e21bbb9a26bdd5a782ff
    • Opcode Fuzzy Hash: 3b8b36405c1637774fd06c6ce0fa022f19bb3e8fdffd9f3b2c8cc6a8b1eb3d1a
    • Instruction Fuzzy Hash: 60617C71E1A65D8FDB64DFA8C465AFDBBB1EF19300F14007AD049E72E2CA389A45CB41
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2676a2256faa2f264d08d548100f5d66c05a3725f7f44ba748c3bdd8c0ced94d
    • Instruction ID: 06604f7c4292644c4e2b4e751da4bf82581f7d6f697b51d471401ef3791f7f03
    • Opcode Fuzzy Hash: 2676a2256faa2f264d08d548100f5d66c05a3725f7f44ba748c3bdd8c0ced94d
    • Instruction Fuzzy Hash: 2C31D431A0E6AD8EDB16ABB898652E97FB0EF06318F0900B7D058D71E3D9285948C781
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 99668585016dbed32cd421b81d2677eea357defc6f21336d27930ef2363e7434
    • Instruction ID: 7b17c66b452ddb101473920ac41757c7d2b657f95e1b95f13fc41a7699b34596
    • Opcode Fuzzy Hash: 99668585016dbed32cd421b81d2677eea357defc6f21336d27930ef2363e7434
    • Instruction Fuzzy Hash: 36412721A0F1C96FE76AA77058369E97FA0DF47240B0901FBD08DCB0F7C92E19458312
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a972db22615d5f86b26da9b11671399afb91c98d3a33edf12babe2dae2ef3da1
    • Instruction ID: 59aae30e7391cd0dfa22d45bb99e938e0db0ff3436fdd13b9a14410b46722665
    • Opcode Fuzzy Hash: a972db22615d5f86b26da9b11671399afb91c98d3a33edf12babe2dae2ef3da1
    • Instruction Fuzzy Hash: A221DA51E0F6895FF76AAB7488729687FB0DF47240B1610FAD189CB1F7CD1A19488712
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d28832cfcad0dded8eb6bb2f6bd38f08929787cf7885ccccd8b3a1f28a60bb7e
    • Instruction ID: 2dc38ecc3b32225a873676850f4b41395f40c36851199bb471d091ef6e95ca7b
    • Opcode Fuzzy Hash: d28832cfcad0dded8eb6bb2f6bd38f08929787cf7885ccccd8b3a1f28a60bb7e
    • Instruction Fuzzy Hash: BB012671D0E28D2FD756EB7088659E87FE0EF4A200F0500AAD049D71E2C9650645C701
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.1669036562.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b890000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1aaf1560d3e0fac52296181cbf7ce1ba8a408b796e6c836cea61f182fd336392
    • Instruction ID: 5771f128ebbe74c206e2f02f2bac4b556840ebe3d75a17b6000d677a7a42074f
    • Opcode Fuzzy Hash: 1aaf1560d3e0fac52296181cbf7ce1ba8a408b796e6c836cea61f182fd336392
    • Instruction Fuzzy Hash: AC01F431E1E68D6FEBA5EB6489692E97FF0EF59300F4600F6D408C71E6EE346A448701
    Uniqueness

    Uniqueness Score: -1.00%