Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
openurl.exe

Overview

General Information

Sample name:openurl.exe
Analysis ID:1431823
MD5:c907c48492d52f2de4c9b9e22c256742
SHA1:4767e3c8a4f31628ef6e759def710e5dad46c1ee
SHA256:1e69e00f0361e9a4d21b0386015c7b8d8186bec53ad325ea2c079441fcb37f62

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • openurl.exe (PID: 4568 cmdline: "C:\Users\user\Desktop\openurl.exe" MD5: C907C48492D52F2DE4C9B9E22C256742)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: openurl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: openurl.exeStatic PE information: certificate valid
Source: openurl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: openurl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: openurl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: openurl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: openurl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: openurl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: openurl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: openurl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: openurl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: openurl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: openurl.exeString found in binary or memory: http://ocsp.digicert.com0
Source: openurl.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: openurl.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: openurl.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: openurl.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: openurl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean2.winEXE@1/0@0/0
Source: openurl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\openurl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\openurl.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\openurl.exeSection loaded: qt5widgets.dllJump to behavior
Source: C:\Users\user\Desktop\openurl.exeSection loaded: qt5gui.dllJump to behavior
Source: C:\Users\user\Desktop\openurl.exeSection loaded: qt5core.dllJump to behavior
Source: C:\Users\user\Desktop\openurl.exeSection loaded: vcruntime140.dllJump to behavior
Source: openurl.exeStatic PE information: certificate valid
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: openurl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: openurl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: openurl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: openurl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: openurl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: openurl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: openurl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771EC6 push ecx; ret 0_2_00771ED9
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771C37 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00771C37
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_0077177E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0077177E
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771C37 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00771C37
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771DCA SetUnhandledExceptionFilter,0_2_00771DCA
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771EFE cpuid 0_2_00771EFE
Source: C:\Users\user\Desktop\openurl.exeCode function: 0_2_00771B21 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00771B21
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
openurl.exe0%VirustotalBrowse
openurl.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431823
Start date and time:2024-04-25 20:44:58 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:openurl.exe
Detection:CLEAN
Classification:clean2.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 5
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target openurl.exe, PID 4568 because there are no executed function
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.76336290594607
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:openurl.exe
File size:28'496 bytes
MD5:c907c48492d52f2de4c9b9e22c256742
SHA1:4767e3c8a4f31628ef6e759def710e5dad46c1ee
SHA256:1e69e00f0361e9a4d21b0386015c7b8d8186bec53ad325ea2c079441fcb37f62
SHA512:5ce8719a09b3b44c927696dd5dac8cbf88e7ac0fd0d73cc0248ea6df0f784db2266694487164c5e8ac8cd70fb327f6ee2bb529066df77b0e1d9eb7534fc3a7ae
SSDEEP:384:W0u8hA4tY+FGJqwf+vCx4331FSsJrQDIYiBwHwJAM+o/8E9VF0NyWdUQp:W0De+FGYdvDTS+9YiBwQJAMxkEsp
TLSH:06D26C53A6620421C7AAD934366492BD8437B2B68FF4C5D3B64DDC050BB43D1AEBC29F
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8...k...k...k..kk...k...j...k...j...k...j...k...j...k...j...kq..j...k...ko..kH..j...kH..k...kH..j...kRich...k...............
Icon Hash:00928e8e8686b000
Entrypoint:0x401774
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x653A0168 [Thu Oct 26 06:04:24 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:7ded77a493c412b7cf3fcbdff7eb4244
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 30/08/2022 02:00:00 03/10/2025 01:59:59
Subject Chain
  • CN="CHENGDU YIWO Tech Development Co., Ltd.", O="CHENGDU YIWO Tech Development Co., Ltd.", L=\u6210\u90fd\u5e02, S=\u56db\u5ddd\u7701, C=CN
Version:3
Thumbprint MD5:A9CA0963936C7546B2348E650C8D8514
Thumbprint SHA-1:8F5F832BA07AE78DC635886D20042C21300D5DB9
Thumbprint SHA-256:8A6407872F4E2E95BB570B1751BED91D0B9D0BC90643F8F9E505374BF77519AB
Serial:0AB53526DD9E3F80814952E212FFB1C4
Instruction
call 00007F3D98DB559Ah
jmp 00007F3D98DB501Fh
push ebp
mov ebp, esp
push 00000000h
call dword ptr [00403038h]
push dword ptr [ebp+08h]
call dword ptr [0040303Ch]
push C0000409h
call dword ptr [00403034h]
push eax
call dword ptr [00403030h]
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 00000324h
push 00000017h
call 00007F3D98DB5A90h
test eax, eax
je 00007F3D98DB51A7h
push 00000002h
pop ecx
int 29h
mov dword ptr [00406238h], eax
mov dword ptr [00406234h], ecx
mov dword ptr [00406230h], edx
mov dword ptr [0040622Ch], ebx
mov dword ptr [00406228h], esi
mov dword ptr [00406224h], edi
mov word ptr [00406250h], ss
mov word ptr [00406244h], cs
mov word ptr [00406220h], ds
mov word ptr [0040621Ch], es
mov word ptr [00406218h], fs
mov word ptr [00406214h], gs
pushfd
pop dword ptr [00406248h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [0040623Ch], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [00406240h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [0040624Ch], eax
mov eax, dword ptr [ebp-00000324h]
mov dword ptr [00406188h], 00010001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3bf40xf0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2f0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x46000x2950
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x3c4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x34100x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34300x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x22c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x14bb0x1600e12640cc47c66ff997049de674eebcdaFalse0.6001420454545454data6.069138714519844IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x21820x2200dc5a3705dfc2b354b8b6ca937527d14dFalse0.37741268382352944SysEx File - Matsushita5.178236114595099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x4a40x2006fe65bd718b5bc543c2ba62d4a840b7aFalse0.30859375data2.9718967515549712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x70000x2f00x400e33ada534120cb3b2f206eb257e8373fFalse0.400390625data4.287460805804473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x3c40x40020c987d66827f430a6999a2b16f73379False0.85546875data6.2142258599387805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x70600x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5500770416024653
DLLImport
Qt5Widgets.dll?sizeHint@QWidget@@UBE?AVQSize@@XZ, ?tabletEvent@QWidget@@MAEXPAVQTabletEvent@@@Z, ?qt_metacast@QMainWindow@@UAEPAXPBD@Z, ?staticMetaObject@QMainWindow@@2UQMetaObject@@B, ?showEvent@QWidget@@MAEXPAVQShowEvent@@@Z, ?sharedPainter@QWidget@@MBEPAVQPainter@@XZ, ?setVisible@QWidget@@UAEX_N@Z, ?resizeEvent@QWidget@@MAEXPAVQResizeEvent@@@Z, ?redirected@QWidget@@MBEPAVQPaintDevice@@PAVQPoint@@@Z, ?paintEvent@QWidget@@MAEXPAVQPaintEvent@@@Z, ?paintEngine@QWidget@@UBEPAVQPaintEngine@@XZ, ?nativeEvent@QWidget@@MAE_NABVQByteArray@@PAXPAJ@Z, ?moveEvent@QWidget@@MAEXPAVQMoveEvent@@@Z, ?mouseReleaseEvent@QWidget@@MAEXPAVQMouseEvent@@@Z, ?mousePressEvent@QWidget@@MAEXPAVQMouseEvent@@@Z, ?mouseMoveEvent@QWidget@@MAEXPAVQMouseEvent@@@Z, ?mouseDoubleClickEvent@QWidget@@MAEXPAVQMouseEvent@@@Z, ?minimumSizeHint@QWidget@@UBE?AVQSize@@XZ, ?metric@QWidget@@MBEHW4PaintDeviceMetric@QPaintDevice@@@Z, ?leaveEvent@QWidget@@MAEXPAVQEvent@@@Z, ?keyReleaseEvent@QWidget@@MAEXPAVQKeyEvent@@@Z, ?keyPressEvent@QWidget@@MAEXPAVQKeyEvent@@@Z, ??0QApplication@@QAE@AAHPAPADH@Z, ?inputMethodQuery@QWidget@@UBE?AVQVariant@@W4InputMethodQuery@Qt@@@Z, ?inputMethodEvent@QWidget@@MAEXPAVQInputMethodEvent@@@Z, ?initPainter@QWidget@@MBEXPAVQPainter@@@Z, ?hideEvent@QWidget@@MAEXPAVQHideEvent@@@Z, ?heightForWidth@QWidget@@UBEHH@Z, ?hasHeightForWidth@QWidget@@UBE_NXZ, ?focusOutEvent@QWidget@@MAEXPAVQFocusEvent@@@Z, ?focusNextPrevChild@QWidget@@MAE_N_N@Z, ?focusInEvent@QWidget@@MAEXPAVQFocusEvent@@@Z, ?event@QMainWindow@@MAE_NPAVQEvent@@@Z, ?wheelEvent@QWidget@@MAEXPAVQWheelEvent@@@Z, ?enterEvent@QWidget@@MAEXPAVQEvent@@@Z, ?dropEvent@QWidget@@MAEXPAVQDropEvent@@@Z, ?dragMoveEvent@QWidget@@MAEXPAVQDragMoveEvent@@@Z, ?dragLeaveEvent@QWidget@@MAEXPAVQDragLeaveEvent@@@Z, ?dragEnterEvent@QWidget@@MAEXPAVQDragEnterEvent@@@Z, ?devType@QWidget@@UBEHXZ, ?createPopupMenu@QMainWindow@@UAEPAVQMenu@@XZ, ?contextMenuEvent@QMainWindow@@MAEXPAVQContextMenuEvent@@@Z, ?closeEvent@QWidget@@MAEXPAVQCloseEvent@@@Z, ?changeEvent@QWidget@@MAEXPAVQEvent@@@Z, ?actionEvent@QWidget@@MAEXPAVQActionEvent@@@Z, ??1QMainWindow@@UAE@XZ, ??0QMainWindow@@QAE@PAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z, ?exec@QApplication@@SAHXZ, ??1QApplication@@UAE@XZ, ?qt_metacall@QMainWindow@@UAEHW4Call@QMetaObject@@HPAPAX@Z
Qt5Gui.dll?openUrl@QDesktopServices@@SA_NABVQUrl@@@Z
Qt5Core.dll?eventFilter@QObject@@UAE_NPAV1@PAVQEvent@@@Z, ?disconnectNotify@QObject@@MAEXABVQMetaMethod@@@Z, ?customEvent@QObject@@MAEXPAVQEvent@@@Z, ?connectNotify@QObject@@MAEXABVQMetaMethod@@@Z, ?timerEvent@QObject@@MAEXPAVQTimerEvent@@@Z, ?dynamicMetaObject@QObjectData@@QBEPAUQMetaObject@@XZ, ?absoluteFilePath@QDir@@QBE?AVQString@@ABV2@@Z, ??1QDir@@QAE@XZ, ??0QDir@@QAE@ABVQString@@@Z, ?remove@QFile@@QAE_NXZ, ??1QFile@@UAE@XZ, ??0QFile@@QAE@ABVQString@@@Z, ?close@QFileDevice@@UAEXXZ, ?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ, ?arguments@QCoreApplication@@SA?AVQStringList@@XZ, ?readAll@QTextStream@@QAE?AVQString@@XZ, ??1QTextStream@@UAE@XZ, ??0QTextStream@@QAE@PAVQIODevice@@@Z, ??1QUrl@@QAE@XZ, ??0QUrl@@QAE@ABVQString@@W4ParsingMode@0@@Z, ?at@QListData@@QBEPAPAXH@Z, ?size@QListData@@QBEHXZ, ?dispose@QListData@@SAXPAUData@1@@Z, ?fromAscii_helper@QString@@CAPAU?$QTypedArrayData@G@@PBDH@Z, ??4QString@@QAEAAV0@$$QAV0@@Z, ??4QString@@QAEAAV0@ABV0@@Z, ??1QString@@QAE@XZ, ?childEvent@QObject@@MAEXPAVQChildEvent@@@Z, ?open@QFile@@UAE_NV?$QFlags@W4OpenModeFlag@QIODevice@@@@@Z
KERNEL32.dllGetCommandLineW, LocalFree, WideCharToMultiByte, GetModuleHandleW, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter
VCRUNTIME140.dll_CxxThrowException, __std_exception_destroy, __std_exception_copy, _except_handler4_common, __CxxFrameHandler3, memset
api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_exe, _exit, _register_onexit_function, _cexit, _crt_atexit, _controlfp_s, terminate, _initialize_onexit_table, exit, _set_app_type, _register_thread_local_exe_atexit_callback, _initterm_e, _initterm, _get_narrow_winmain_command_line, _initialize_narrow_environment, _configure_narrow_argv, _c_exit
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_callnewh, malloc, free, _set_new_mode
SHELL32.dllCommandLineToArgvW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:20:45:42
Start date:25/04/2024
Path:C:\Users\user\Desktop\openurl.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\openurl.exe"
Imagebase:0x770000
File size:28'496 bytes
MD5 hash:C907C48492D52F2DE4C9B9E22C256742
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001DD6,007715EB), ref: 00771DCF
    Memory Dump Source
    • Source File: 00000000.00000002.3236938989.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.3236927116.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236951064.0000000000773000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236962826.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236974561.0000000000776000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236985795.0000000000777000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_openurl.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: db1a7066d390aa06c78a8cb1c6eae4b4b6cf2f5603ca3d38c82b1a0ac19bccb7
    • Instruction ID: 73ed68acff1d49496047380e9fe1ca8b972b42a42f6707f2e4fdec5b9eadb218
    • Opcode Fuzzy Hash: db1a7066d390aa06c78a8cb1c6eae4b4b6cf2f5603ca3d38c82b1a0ac19bccb7
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ??0QMainWindow@@QAE@PAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(00000000,00000000,78DCBE09,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007710C0
    • ?arguments@QCoreApplication@@SA?AVQStringList@@XZ.QT5CORE(?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007710DE
    • ?fromAscii_helper@QString@@CAPAU?$QTypedArrayData@G@@PBDH@Z.QT5CORE(00773260,00000000,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007710F5
    • ?size@QListData@@QBEHXZ.QT5CORE(?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771104
    • ?at@QListData@@QBEPAPAXH@Z.QT5CORE(00000002,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771114
    • ??4QString@@QAEAAV0@ABV0@@Z.QT5CORE(00000000,00000002,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077111D
    • ?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ.QT5CORE(00000000,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077112C
    • ??0QDir@@QAE@ABVQString@@@Z.QT5CORE(00000000,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077113D
    • ??1QString@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077114A
    • ?fromAscii_helper@QString@@CAPAU?$QTypedArrayData@G@@PBDH@Z.QT5CORE(openUrl,00000007,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771157
    • ?absoluteFilePath@QDir@@QBE?AVQString@@ABV2@@Z.QT5CORE(?,000000FF,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C), ref: 0077116E
    • ??0QFile@@QAE@ABVQString@@@Z.QT5CORE(00000000,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077117C
    • ??1QString@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771185
    • ??1QString@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771192
    • ?open@QFile@@UAE_NV?$QFlags@W4OpenModeFlag@QIODevice@@@@@Z.QT5CORE(00000011,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077119D
    • ??0QTextStream@@QAE@PAVQIODevice@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711AE
    • ?readAll@QTextStream@@QAE?AVQString@@XZ.QT5CORE(00000000,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711BF
    • ??4QString@@QAEAAV0@$$QAV0@@Z.QT5CORE(00000000,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711C9
    • ??1QString@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711D2
    • ?close@QFileDevice@@UAEXXZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711DB
    • ??1QTextStream@@UAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711E8
    • ?remove@QFile@@QAE_NXZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711F1
    • ??1QFile@@UAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 007711FA
    • ??1QDir@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771207
    • ??0QUrl@@QAE@ABVQString@@W4ParsingMode@0@@Z.QT5CORE(00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C), ref: 00771216
    • ?openUrl@QDesktopServices@@SA_NABVQUrl@@@Z.QT5GUI(00000000,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 00771221
    • ??1QUrl@@QAE@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C,00000000), ref: 0077122D
    • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00772479,000000FF,?,0077105C), ref: 00771235
    • ??1QString@@QAE@XZ.QT5CORE(78DCBE09,?,000048D0,?,00000000,007724A0,000000FF), ref: 007712A5
    • ?dispose@QListData@@SAXPAUData@1@@Z.QT5CORE(?,78DCBE09,?,000048D0,?,00000000,007724A0,000000FF), ref: 007712B0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3236938989.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.3236927116.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236951064.0000000000773000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236962826.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236974561.0000000000776000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236985795.0000000000777000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_openurl.jbxd
    Similarity
    • API ID: String@@$File@@$Data@@Dir@@ListStream@@Text$?fromApplication@@ArrayAscii_helper@CoreData@FileFlags@Path@String@@@TypedUrl@@V0@@$?absolute?application?arguments@?at@?close@?dispose@?open?open@?read?remove@?size@All@Data@1@@DesktopDevice@@Device@@@Device@@@@@Flag@List@@MainModeMode@0@@OpenParsingQt@@@@@Services@@StringType@Url@Url@@@V0@$$V2@@Widget@@WindowWindow@@exit
    • String ID: $3w$openUrl
    • API String ID: 3295477953-4168426926
    • Opcode ID: 40d779734d8c8a7aaf4f1bcba6de1c4229e8b92ecab0e62fb844b2fd43fb73de
    • Instruction ID: 184b49e5ea8c5ac18671baea20e57210840c63bb0d6e85a8db1e8e7840eb325a
    • Opcode Fuzzy Hash: 40d779734d8c8a7aaf4f1bcba6de1c4229e8b92ecab0e62fb844b2fd43fb73de
    • Instruction Fuzzy Hash: CB716B71900109EFCF00CFA8EC48BEEBB79FB04355F108159E51AA3290DB38AB48DB65
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _initialize_onexit_table.API-MS-WIN-CRT-RUNTIME-L1-1-0(00776460), ref: 00771985
    • _initialize_onexit_table.API-MS-WIN-CRT-RUNTIME-L1-1-0(0077646C), ref: 00771994
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3236938989.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.3236927116.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236951064.0000000000773000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236962826.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236974561.0000000000776000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236985795.0000000000777000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_openurl.jbxd
    Similarity
    • API ID: _initialize_onexit_table
    • String ID: `dw$ldw
    • API String ID: 2450287516-1864409625
    • Opcode ID: 9a4337f41e6e3157c678892c98ed4e933ff77fb28ea7e87cc1120debe586da55
    • Instruction ID: 50a4d204b1c42148a82ddfa42d9efd1c3de8ff08642366b8ae8e8bcf38678646
    • Opcode Fuzzy Hash: 9a4337f41e6e3157c678892c98ed4e933ff77fb28ea7e87cc1120debe586da55
    • Instruction Fuzzy Hash: 4711E372E00A98AACF11DF6C98113DD77A49F42794F44C056ED2CEB285D27DAA468F60
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00772285
    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00772292
    • _CxxThrowException.VCRUNTIME140(?,00773B64), ref: 00772394
    • _CxxThrowException.VCRUNTIME140(?,00773BB8), ref: 007723B1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3236938989.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.3236927116.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236951064.0000000000773000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236962826.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236974561.0000000000776000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236985795.0000000000777000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_openurl.jbxd
    Similarity
    • API ID: ExceptionThrow$_callnewhmalloc
    • String ID: Unknown exception
    • API String ID: 4113974480-410509341
    • Opcode ID: f95b921485cd465e9606585f26493e709f2fe4fa81133810bb8ce766f40562d1
    • Instruction ID: 6dedc6d423be71e1167c2370b3aa8dad61732ce54c14045d43ec2d938b3944d6
    • Opcode Fuzzy Hash: f95b921485cd465e9606585f26493e709f2fe4fa81133810bb8ce766f40562d1
    • Instruction Fuzzy Hash: 80F0F42090430DF68F00B6A8E80A969736C6A007D0B60C274F87C964A3EFBCEA6785D1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCommandLineW.KERNEL32(00000001), ref: 00772161
    • CommandLineToArgvW.SHELL32(00000000), ref: 00772168
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00770000), ref: 007721D3
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 007721F3
    • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00770000,00000000,00000000,?,00773B28,00000014), ref: 00772225
    Memory Dump Source
    • Source File: 00000000.00000002.3236938989.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.3236927116.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236951064.0000000000773000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236962826.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236974561.0000000000776000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3236985795.0000000000777000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_openurl.jbxd
    Similarity
    • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
    • String ID:
    • API String ID: 4060259846-0
    • Opcode ID: e40df4d31ca87db6c4d8f65fb673c4e237ac41b8c5090815b0d0c5b17935f1b5
    • Instruction ID: 0f43cf7d01cbf0123058c76762ca963f48b2000ba706920b84b86a2836f2c357
    • Opcode Fuzzy Hash: e40df4d31ca87db6c4d8f65fb673c4e237ac41b8c5090815b0d0c5b17935f1b5
    • Instruction Fuzzy Hash: 9031E470604305ABDB10EF589C45B1B7794FF84750F11892CFA6E9B2C2D738ED098B66
    Uniqueness

    Uniqueness Score: -1.00%