Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe

Overview

General Information

Sample name:Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe
renamed because original name is a hash value
Original sample name:Odcinek wypaty_0.2.3.4._795.xlsx.exe
Analysis ID:1432082
MD5:15e68670447dd65b34ff7affab74fe70
SHA1:517979db65d2152552f65e9544c502a54c3031e3
SHA256:cd64dff47ed47daec98a2083274c717139ce76776f3f8c6e33b969c6d145a6cb
Errors
  • Unable to connect to analysis machine: w10x64, esxi07-W10x64_Office_01, timeout exceeded, no analysis of the sample was performed
  • No process behavior to analyse as no analysis process or sample was found

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
PE file does not import any functions
Sample file is different than original file name gathered from version info

Classification

No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeReversingLabs: Detection: 75%
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeVirustotal: Detection: 49%Perma Link
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeJoe Sandbox ML: detected
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic PE information: No import functions for PE file found
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeBinary or memory string: OriginalFilenameIvumapumuwipulupL vs Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe, GetBindOptionsUnorderedTrueSignaling.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engineClassification label: mal52.winEXE@0/0@0/0
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeReversingLabs: Detection: 75%
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeVirustotal: Detection: 49%
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Deobfuscate/Decode Files or Information
OS Credential DumpingSystem Service DiscoveryRemote Services1
Archive Collected Data
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe75%ReversingLabsByteCode-MSIL.Trojan.Leonem
Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe49%VirustotalBrowse
Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1432082
Start date and time:2024-04-26 12:17:19 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 35s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:0
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Sample name:Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe
renamed because original name is a hash value
Original Sample Name:Odcinek wypaty_0.2.3.4._795.xlsx.exe
Detection:MAL
Classification:mal52.winEXE@0/0@0/0
  • Unable to connect to analysis machine: w10x64, esxi07-W10x64_Office_01, timeout exceeded, no analysis of the sample was performed
  • No process behavior to analyse as no analysis process or sample was found
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.983764933523991
TrID:
  • Win64 Executable Console Net Framework (206006/5) 48.58%
  • Win64 Executable Console (202006/5) 47.64%
  • Win64 Executable (generic) (12005/4) 2.83%
  • Generic Win/DOS Executable (2004/3) 0.47%
  • DOS Executable Generic (2002/1) 0.47%
File name:Odcinek wyp#U0142aty_0.2.3.4._795.xlsx.exe
File size:627'984 bytes
MD5:15e68670447dd65b34ff7affab74fe70
SHA1:517979db65d2152552f65e9544c502a54c3031e3
SHA256:cd64dff47ed47daec98a2083274c717139ce76776f3f8c6e33b969c6d145a6cb
SHA512:d2a3d0ea093e9fb28102546f65b1281618a22f0f39e20e039241b4178dda57333e8f8ac1a8513648f35c66e23eecbac9bd04a3fceccdb9cd7055cdcdfefa98e2
SSDEEP:12288:OmfEA72h2BA6pPMkwVjhbzbnLG+DXkHwzCgFxdUM19XrT247+JptAX3AjTmLN:Om2266CkmbHL9DTzTBU69H76tHjTm
TLSH:C7D42329AB849F6EC77B67B1A422E70653B4FA16026FBB9CAD47D41C10D3B074153BB0
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...x.%f.........."...0..f............... ....@...... ....................................`................................
Entrypoint:0x400000
Entrypoint Section:
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x66258778 [Sun Apr 21 21:39:04 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000xb24.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x66c20x68006903f2518101d8d8b2a8b3e432db122dFalse0.5129957932692307data5.881175224516216IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0xa0000xb240xc001131569baa42bfaf2d79660c4e9decbdFalse0.2864583333333333data4.2896434131708805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0xa0b80x440data0.4834558823529412
RT_VERSION0xa4f80x440dataEnglishUnited States0.484375
RT_MANIFEST0xa9380x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
No statistics
No system behavior
No disassembly