Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Msil.22568.30131.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Analysis ID:1429043
MD5:5a80095f4e26db2f8a0ee24c6a919cda
SHA1:cc32d3f6feb93806da0a34ac7b8c6ed22b769f96
SHA256:083797d70eff24ead4b63e2e7344010db68dd188da144af2b3f24d3aeb1d8176
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Machine Learning detection for sample
Reads the Security eventlog
Reads the System eventlog
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Msil.22568.30131.exe (PID: 6628 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe" MD5: 5A80095F4E26DB2F8A0EE24C6A919CDA)
    • conhost.exe (PID: 6600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe, ProcessId: 6628, TargetFilename: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1talphwc.cwk.ps1
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeVirustotal: Detection: 22%Perma Link
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeReversingLabs: Detection: 18%
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.auditionsante.ap
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.auditionsante.app/download/script/SHOP/Scr
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeString found in binary or memory: https://support.auditionsante.app/download/script/SHOP/Scripts.zip

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShellJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeCode function: 0_2_00007FFD9B8B09B60_2_00007FFD9B8B09B6
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002881000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScripts.exe4 vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,\\StringFileInfo\\000004B0\\OriginalFilename vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.00000000028F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000000.1631748690.0000000000682000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScripts.exe4 vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeBinary or memory string: OriginalFilenameScripts.exe4 vs SecuriteInfo.com.Trojan.Msil.22568.30131.exe
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@2/3@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6600:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1talphwc.cwk.ps1Jump to behavior
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeVirustotal: Detection: 22%
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: wshext.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: SecuriteInfo.com.Trojan.Msil.22568.30131.exe, MainModuleUI.cs.Net Code: Prompt
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeCode function: 0_2_00007FFD9B79D2A5 pushad ; iretd 0_2_00007FFD9B79D2A6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeMemory allocated: CB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeMemory allocated: 1A880000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeWindow / User API: threadDelayed 954Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeWindow / User API: threadDelayed 374Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Msil.22568.30131.exe23%VirustotalBrowse
SecuriteInfo.com.Trojan.Msil.22568.30131.exe18%ReversingLabsByteCode-MSIL.Trojan.Generic
SecuriteInfo.com.Trojan.Msil.22568.30131.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://support.auditionsante.app/download/script/SHOP/Scripts.zip3%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://support.auditionsante.app/download/script/SHOP/Scripts.zipSecuriteInfo.com.Trojan.Msil.22568.30131.exefalseunknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    https://support.auditionsante.apSecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      https://support.auditionsante.app/download/script/SHOP/ScrSecuriteInfo.com.Trojan.Msil.22568.30131.exe, 00000000.00000002.2884945329.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1429043
        Start date and time:2024-04-20 10:28:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 17s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        Detection:MAL
        Classification:mal64.evad.winEXE@2/3@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 5
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):409
        Entropy (8bit):2.260828957907017
        Encrypted:false
        SSDEEP:3:rCSu2v7vO2F/FbUcRATg/cCRrWFFFFf4V0IIHXUIIFINL1/XDpEtzNF6xv:GCvPhAEkC4/0IBIF417pEtzKxv
        MD5:75B511850129A5C084202DFAE651D6BC
        SHA1:D2AAC468EBA651F9A8CBF8FBC1C5E94B7980F5D0
        SHA-256:0FE1FF5D76F20446A9FB0AACCFC044E934F7F7303D864EC6DA3FC4574316F1EC
        SHA-512:0DFA4C46619E2F661E2FEFB1FD429D8032ED8A385E7DC232AF09B29BA1F6BF8C090644677277046BBDECF9D73B9AA0FDAB9F2F1BA4CBB6679FD8F871EE7CA819
        Malicious:false
        Reputation:low
        Preview:.... Directory: C:\Outils_SI\Run......Mode LastWriteTime Length Name ..---- ------------- ------ ---- ..d----- 20/04/2024 10:28 temp ..421..
        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.6508312382930965
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        File size:26'112 bytes
        MD5:5a80095f4e26db2f8a0ee24c6a919cda
        SHA1:cc32d3f6feb93806da0a34ac7b8c6ed22b769f96
        SHA256:083797d70eff24ead4b63e2e7344010db68dd188da144af2b3f24d3aeb1d8176
        SHA512:4464b21a0dacd61a875be1c4b7b47a66ae3f82a767f69826af2dc8d6ef1aab5ff7dee4cd60742a15292ba5ee16862bef2f7432c35729aecd438bdeac4b3b5845
        SSDEEP:768:6EHP8yxk5NkkkkEvkkIhswkkkkkkkkkkkkkwjHNM41v1qbVingm3HrdR:6EHP8y2kkkkOkkIhswkkkkkkkkkkkkk8
        TLSH:3EC219ADA9D8C62ED66F4BBC78B306240375A342591ADB867D8C9DBF2D633010831397
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N1e.................\..........n{... ........@.. ....................................@................................
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x407b6e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x65314E11 [Thu Oct 19 15:41:05 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x7b140x57.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x4d8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x5b740x5c00f177fc98ae6a09de5c1a9b96a35efcb9False0.4822944972826087data5.854097719988981IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x80000x4d80x6007f5428930fd1de249a9fa29348d7aa80False0.3697916666666667data3.7038144251805765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0xa0000xc0x200ec9983e8172d1b0eb1f2d51c085049cdFalse0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x80a00x244data0.4586206896551724
        RT_MANIFEST0x82e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
        DLLImport
        mscoree.dll_CorExeMain
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:28:52
        Start date:20/04/2024
        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe"
        Imagebase:0x680000
        File size:26'112 bytes
        MD5 hash:5A80095F4E26DB2F8A0EE24C6A919CDA
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:10:28:52
        Start date:20/04/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:15.1%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:8
          Total number of Limit Nodes:1
          execution_graph 2672 7ffd9b8b4d9c 2674 7ffd9b8b4da5 2672->2674 2673 7ffd9b8b4d62 2674->2673 2675 7ffd9b8b4e0d GetFileType 2674->2675 2676 7ffd9b8b4e44 2675->2676 2677 7ffd9b8b0692 2678 7ffd9b8b4dc0 GetFileType 2677->2678 2680 7ffd9b8b4e44 2678->2680

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 99 7ffd9b8b09b6-7ffd9b8b0b5e call 7ffd9b8b0698 127 7ffd9b8b0b78-7ffd9b8b0c2a 99->127 128 7ffd9b8b0b60-7ffd9b8b0b68 99->128 143 7ffd9b8b0c2c-7ffd9b8b0c70 127->143 144 7ffd9b8b0c83-7ffd9b8b0e3c call 7ffd9b8b0198 127->144 128->127 131 7ffd9b8b0b6a-7ffd9b8b0b76 128->131 131->128 154 7ffd9b8b0ca6-7ffd9b8b0cc0 143->154 155 7ffd9b8b0c72 143->155 164 7ffd9b8b0e4a 144->164 165 7ffd9b8b0e3e-7ffd9b8b0e48 144->165 160 7ffd9b8b0cc6-7ffd9b8b0d0a 154->160 161 7ffd9b8b0d6b-7ffd9b8b0da7 154->161 157 7ffd9b8b0c79-7ffd9b8b0c81 155->157 157->143 157->144 181 7ffd9b8b0d25-7ffd9b8b0d29 160->181 182 7ffd9b8b0d0c-7ffd9b8b1490 call 7ffd9b8b156a call 7ffd9b8b15c3 160->182 188 7ffd9b8b0da9-7ffd9b8b0daf 161->188 189 7ffd9b8b0db4-7ffd9b8b0df0 161->189 166 7ffd9b8b0e4f-7ffd9b8b0e51 164->166 165->166 168 7ffd9b8b0e65-7ffd9b8b0eb3 call 7ffd9b8b14d8 call 7ffd9b8b151f 166->168 169 7ffd9b8b0e53-7ffd9b8b147c call 7ffd9b8b14d8 call 7ffd9b8b151f call 7ffd9b8b156a call 7ffd9b8b15c3 166->169 204 7ffd9b8b0eb5-7ffd9b8b0ec3 168->204 205 7ffd9b8b0ecb-7ffd9b8b0ed8 168->205 223 7ffd9b8b14c6-7ffd9b8b14d7 169->223 186 7ffd9b8b0d66 181->186 187 7ffd9b8b0d2b-7ffd9b8b0d61 181->187 182->223 186->161 187->157 188->144 189->157 228 7ffd9b8b0df6-7ffd9b8b0dfb 189->228 217 7ffd9b8b0eca 204->217 210 7ffd9b8b12eb-7ffd9b8b12ee 205->210 211 7ffd9b8b0ede-7ffd9b8b0ee1 205->211 215 7ffd9b8b1306-7ffd9b8b13b7 210->215 216 7ffd9b8b12f0-7ffd9b8b12fe 210->216 211->186 218 7ffd9b8b0ee7-7ffd9b8b0f03 211->218 244 7ffd9b8b13b9-7ffd9b8b13c1 215->244 216->215 217->205 229 7ffd9b8b1296-7ffd9b8b1299 218->229 230 7ffd9b8b0f09-7ffd9b8b0f22 218->230 228->144 232 7ffd9b8b129b-7ffd9b8b12bf 229->232 233 7ffd9b8b12c1-7ffd9b8b12d8 229->233 230->229 239 7ffd9b8b0f28-7ffd9b8b0f4f 230->239 237 7ffd9b8b12e0-7ffd9b8b12e5 232->237 233->237 237->210 237->211 239->229 248 7ffd9b8b0f55-7ffd9b8b0f58 239->248 246 7ffd9b8b13de-7ffd9b8b1403 244->246 247 7ffd9b8b13c3-7ffd9b8b13d3 244->247 253 7ffd9b8b1405-7ffd9b8b1440 246->253 254 7ffd9b8b144c-7ffd9b8b1496 call 7ffd9b8b156a call 7ffd9b8b15c3 246->254 251 7ffd9b8b13da-7ffd9b8b13dc 247->251 249 7ffd9b8b0f5a-7ffd9b8b0f68 248->249 250 7ffd9b8b0f70-7ffd9b8b0fbf 248->250 249->250 269 7ffd9b8b0ff7-7ffd9b8b1037 250->269 270 7ffd9b8b0fc1-7ffd9b8b0ff2 250->270 251->244 251->246 253->254 272 7ffd9b8b1498-7ffd9b8b14a9 254->272 273 7ffd9b8b14b0-7ffd9b8b14c5 254->273 282 7ffd9b8b1039-7ffd9b8b1098 269->282 283 7ffd9b8b109a-7ffd9b8b1102 269->283 270->237 272->273 282->283 296 7ffd9b8b1107-7ffd9b8b1147 282->296 283->237 301 7ffd9b8b1149-7ffd9b8b11a8 296->301 302 7ffd9b8b11aa-7ffd9b8b1212 296->302 301->302 315 7ffd9b8b1217-7ffd9b8b1294 301->315 302->237 315->237
          Memory Dump Source
          • Source File: 00000000.00000002.2887389027.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e9df7fcca313e092f3c8359efc809039548d439556dde18b0ad54ebb53ec0cee
          • Instruction ID: 77402e21e0d8fb52149daf3af2c84dc6cacdc1b07966fcf654ca6f5d23268b35
          • Opcode Fuzzy Hash: e9df7fcca313e092f3c8359efc809039548d439556dde18b0ad54ebb53ec0cee
          • Instruction Fuzzy Hash: F7824330B199198FDBA8EB6CC465A6873E2FF58704F5105B9D01EC72E6DE35EC428B81
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.2887389027.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_SecuriteInfo.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: fcd90fb84be9c753c88a75eb440ea0b26783c10f728ff9b2726629535c41f7c5
          • Instruction ID: 8ae4f817d62a46e83b53dbfabf065addbe93b908defe45b9fc00f20236c69603
          • Opcode Fuzzy Hash: fcd90fb84be9c753c88a75eb440ea0b26783c10f728ff9b2726629535c41f7c5
          • Instruction Fuzzy Hash: B931E83190CA5C8FEB59DBA8D80A7E8BBF0FB55321F04426FD049C35A2CB756456CB91
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 69 7ffd9b8b0692-7ffd9b8b4e05 72 7ffd9b8b4e0d-7ffd9b8b4e42 GetFileType 69->72 73 7ffd9b8b4e4a-7ffd9b8b4e66 72->73 74 7ffd9b8b4e44 72->74 74->73
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.2887389027.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_SecuriteInfo.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: b1364e2e9c44ef2357252a15196213fdee3e3f40b84823ed95c4e49b2500ce98
          • Instruction ID: 27279d1ac6553408270e4a60c1077b49e2247d87861527cc2d8999b2f6f9cd1a
          • Opcode Fuzzy Hash: b1364e2e9c44ef2357252a15196213fdee3e3f40b84823ed95c4e49b2500ce98
          • Instruction Fuzzy Hash: 6321A471A08A0C9FDB58DB98D849BFDB7E0FB59321F00422ED04AD3551DB706456CB81
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 510 7ffd9b79f024-7ffd9b79f059 513 7ffd9b79f06a-7ffd9b79f06c 510->513 514 7ffd9b79f05b-7ffd9b79f065 510->514 516 7ffd9b79f06d-7ffd9b79f0db 513->516 515 7ffd9b79f067 514->515 514->516 515->513 519 7ffd9b79f0dd-7ffd9b79f0e4 516->519 520 7ffd9b79f0e6-7ffd9b79f0ff 519->520 521 7ffd9b79f10b-7ffd9b79f120 519->521 522 7ffd9b79f103-7ffd9b79f109 520->522 522->519
          Memory Dump Source
          • Source File: 00000000.00000002.2887114823.00007FFD9B79D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B79D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b79d000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4f5f5b1170af81bfac0372db47a5e7e065d7ae549df4b2f33ee9e9f53ffca54d
          • Instruction ID: 36a6f3b833bda64b89b5ec2a31fc15e7091c5e326bc5e5f3d7590d7506a78af0
          • Opcode Fuzzy Hash: 4f5f5b1170af81bfac0372db47a5e7e065d7ae549df4b2f33ee9e9f53ffca54d
          • Instruction Fuzzy Hash: 2141037150EBC44FE7668B2C98559523FF0EF56320B1606EFE088CF1A7D625A846C7A2
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.2887114823.00007FFD9B79D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B79D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b79d000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3645904b0370e8059654fb9182bd50a0581eed21f00a2b8ab6025fa704ae5fc6
          • Instruction ID: 97a84024df4168d089f415b7b980d6215ff668040c3369801870eadc4f279d21
          • Opcode Fuzzy Hash: 3645904b0370e8059654fb9182bd50a0581eed21f00a2b8ab6025fa704ae5fc6
          • Instruction Fuzzy Hash: 74115E7295EBC58FD7539B3488659117FB0EF13240B0A05E7D089CF0B7D628E845C762
          Uniqueness

          Uniqueness Score: -1.00%