Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe

Overview

General Information

Sample name:SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe
Analysis ID:1430480
MD5:832d2e222679399e099ca696a14fa66a
SHA1:a34bf6c8d76702928670ceb7f4e0a7a40ac41d07
SHA256:eda26cab4e335bc20786046a525aa6079c0bba7d6aa5bbd49164e6ce1c796c62
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
PE file contains section with special chars
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeReversingLabs: Detection: 26%
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

System Summary

barindex
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .8;y
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .gJ+
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .z!h
Source: classification engineClassification label: mal56.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5340:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: opengl32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: d3dx9_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: glu32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeSection loaded: netutils.dllJump to behavior
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic file information: File size 15426560 > 1048576
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: Raw size of .z!h is bigger than: 0x100000 < 0xeb4000
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .z!h
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .8;y
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .gJ+
Source: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exeStatic PE information: section name: .z!h
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe26%ReversingLabs
SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430480
Start date and time:2024-04-23 17:43:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:19
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe
Detection:MAL
Classification:mal56.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):7.882561338128393
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe
File size:15'426'560 bytes
MD5:832d2e222679399e099ca696a14fa66a
SHA1:a34bf6c8d76702928670ceb7f4e0a7a40ac41d07
SHA256:eda26cab4e335bc20786046a525aa6079c0bba7d6aa5bbd49164e6ce1c796c62
SHA512:3c329e34f63ad6b35ef45ddcc8bf1340f5fbd3ad390c3679f29399c17549da439bd7441eda8df9a46fa5b4481463fc0559e4d8287e5985931e66ffd434de0ca7
SSDEEP:393216:Gep4reXJVP/OwfTap66qNVjqdKCQ4f2ObDsgjs0c:34rQJV5Lh6EIKCQvObIgg
TLSH:EFF623C1BED6D6ACC4EB8A2469C2435AA0E273CD85FE060F39CE5C037E81E555D4B672
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."....%.......................@............................. ............`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x140c1b899
Entrypoint Section:.z!h
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6616DE9B [Wed Apr 10 18:46:51 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:754a134b6cfe058d75cf3b189eb6965b
Instruction
inc ecx
push eax
dec ecx
mov eax, 569117ABh
xor eax, 41872053h
bswap eax
dec edi
lea eax, dword ptr [eax+eax*4+57845B39h]
pushfd
dec ecx
or eax, E3B3CF3Fh
dec esi
mov eax, dword ptr [esp+eax+10040009h]
dec eax
mov dword ptr [esp+08h], 4AD56642h
push dword ptr [esp+00h]
popfd
dec eax
lea esp, dword ptr [esp+08h]
call 00007F39AD778D08h
push 00000076h
sal ecx, cl
jc 00007F39ACB9C1F5h
jnc 00007F39ACB9C26Ch
mov eax, dword ptr [1435CB35h]
mov ch, D5h
fild word ptr [esi]
pop es
pop ebp
in al, 15h
fild word ptr [esi]
pop es
lodsb
sub al, 1Ch
popfd
fild word ptr [esi]
pop es
test dword ptr [esp+eax*2+0706DF75h], edi
in al, dx
pop ebp
pushfd
mov ebp, 7C0706DFh
in al, dx
adc al, F0h
mov eax, 4F05D4A3h
mov cl, 25h
jne 00007F39ACB9C253h
fsubr qword ptr [eax]
cli
test dword ptr [eax], ebp
loopne 00007F39ACB9C1D4h
mul dword ptr [edi-61h]
mov edi, 4B247FBFh
aad B0h
sbb eax, 247FBEFEh
dec ebx
test ecx, ebx
adc ebx, eax
lodsb
hlt
xor al, F7h
pop ds
cmp bl, ah
add ecx, ebx
mov bl, 0Fh
in eax, dx
retn 6B1Ch
jnc 00007F39ACB9C1C5h
out EDh, eax
retn C31Ch
jmp 00007F39ACB9C235h
aas
in eax, dx
retn 0B1Ch
wait
cmp ecx, edi
in eax, dx
retn DB1Ch
fistp dword ptr [ebx]
jmp far ebp
retn 761Ch
aam 6Bh
cmpsb
imul esp, dword ptr [ebx+00h], 00h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x13e70700x2d0.z!h
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a710000x1d5.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1a61a000xe49c.z!h
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a700000x128.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1696ba00x28.z!h
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1a618c00x140.z!h
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xbba0000x258.gJ+
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x12fdc00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1310000x5038a0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1820000x1222a80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x2a50000xbb2c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.8;y0x2b10000x9087a50x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.gJ+0xbba0000x1aa00x1c0005301775b356399c991ebb7d87e7a5e6False0.034458705357142856data0.24893533075217245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.z!h0xbbc0000xeb3e9c0xeb40000fa5103ab9fc6de588da7b74e969bec0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x1a700000x1280x200f4ae5a960ec1aee26d6a61f1f235d888False0.42578125data2.859107820987811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1a710000x1d50x200a39645f823d9c7990df96fcb62e01811False0.529296875data4.726212239845141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x1a710580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
OPENGL32.dllwglGetCurrentDC
KERNEL32.dllTlsGetValue
USER32.dllPtInRect
GDI32.dllCreateDIBSection
ADVAPI32.dllRegOpenKeyExW
SHELL32.dllShellExecuteA
ntdll.dllNtRaiseHardError
MSVCP140.dll?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
IMM32.dllImmReleaseContext
IPHLPAPI.DLLGetAdaptersInfo
d3dx9_43.dllD3DXMatrixTranspose
urlmon.dllURLDownloadToFileA
WININET.dllInternetCanonicalizeUrlA
Normaliz.dllIdnToAscii
WLDAP32.dll
CRYPT32.dllCertFreeCertificateChain
WS2_32.dllgetsockopt
RPCRT4.dllUuidCreate
PSAPI.DLLGetModuleInformation
USERENV.dllUnloadUserProfile
VCRUNTIME140.dll__vcrt_LoadLibraryExW
VCRUNTIME140_1.dll__CxxFrameHandler4
api-ms-win-crt-stdio-l1-1-0.dllfsetpos
api-ms-win-crt-utility-l1-1-0.dllqsort
api-ms-win-crt-string-l1-1-0.dllstrcpy_s
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
api-ms-win-crt-runtime-l1-1-0.dllexit
api-ms-win-crt-convert-l1-1-0.dllstrtoul
api-ms-win-crt-time-l1-1-0.dll_localtime64
api-ms-win-crt-multibyte-l1-1-0.dll_mbsicmp
api-ms-win-crt-filesystem-l1-1-0.dll_access
api-ms-win-crt-math-l1-1-0.dllldexp
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
KERNEL32.dllGetSystemTimeAsFileTime
KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:7
Start time:17:44:08
Start date:23/04/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W64.ABRisk.HGSF-5324.18792.11913.exe"
Imagebase:0x7ff6dc120000
File size:15'426'560 bytes
MD5 hash:832D2E222679399E099CA696A14FA66A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:9
Start time:17:44:08
Start date:23/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly