Windows
Analysis Report
KgpiJLs58m.exe
Overview
General Information
Sample name: | KgpiJLs58m.exerenamed because original name is a hash value |
Original sample name: | 6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea.exe |
Analysis ID: | 1599696 |
MD5: | 998cd2e474751b5de344562b4ddb39e2 |
SHA1: | 70ee02a76510b0757e3b26ffd98834f0d259f9d4 |
SHA256: | 6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea |
Tags: | 155-138-149-77exeuser-JAMESWT_MHT |
Infos: | |
Detection
DarkGate, MailPassView
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected DarkGate
Yara detected MailPassView
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the product ID of Windows
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
KgpiJLs58m.exe (PID: 7348 cmdline:
"C:\Users\ user\Deskt op\KgpiJLs 58m.exe" MD5: 998CD2E474751B5DE344562B4DDB39E2) Autoit3.exe (PID: 7364 cmdline:
"c:\temp\t est\Autoit 3.exe" c:\ temp\test\ script.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD) cmd.exe (PID: 7420 cmdline:
"c:\window s\system32 \cmd.exe" /c wmic Co mputerSyst em get dom ain > C:\P rogramData \bdfkcgf\h cbhhfk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WMIC.exe (PID: 7468 cmdline:
wmic Compu terSystem get domain MD5: E2DE6500DE1148C7F6027AD50AC8B891)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DarkGate | First documented in 2018, DarkGate is a commodity loader with features that include the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. DarkGate makes use of legitimate AutoIt files and typically runs multiple AutoIt scripts. New versions of DarkGate have been advertised on a Russian language eCrime forum since May 2023. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkGate | Yara detected DarkGate | Joe Security | ||
JoeSecurity_MailPassView | Yara detected MailPassView | Joe Security | ||
JoeSecurity_MailPassView | Yara detected MailPassView | Joe Security | ||
JoeSecurity_DarkGate | Yara detected DarkGate | Joe Security | ||
JoeSecurity_MailPassView | Yara detected MailPassView | Joe Security | ||
Click to see the 3 entries |
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00E54005 | |
Source: | Code function: | 1_2_00E5C2FF | |
Source: | Code function: | 1_2_00E5494A | |
Source: | Code function: | 1_2_00E5CD9F | |
Source: | Code function: | 1_2_00E5CD14 | |
Source: | Code function: | 1_2_00E5F5D8 | |
Source: | Code function: | 1_2_00E5F735 | |
Source: | Code function: | 1_2_00E5FA36 | |
Source: | Code function: | 1_2_00E53CE2 | |
Source: | Code function: | 1_2_0103C65D | |
Source: | Code function: | 1_2_03B7A584 | |
Source: | Code function: | 1_2_03B28AFC | |
Source: | Code function: | 1_2_03B289F4 | |
Source: | Code function: | 1_2_03B731F8 | |
Source: | Code function: | 1_2_03B7BA70 | |
Source: | Code function: | 1_2_03B25974 | |
Source: | Code function: | 1_2_03B3BD8C | |
Source: | Code function: | 1_2_03B53D68 |
Source: | Code function: | 1_2_00E629BA |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 1_2_00E64632 |
Source: | Code function: | 1_2_00E64830 |
Source: | Code function: | 1_2_00E64632 |
Source: | Code function: | 1_2_03B5B188 |
Source: | Code function: | 1_2_00E50508 |
Source: | Code function: | 1_2_00E7D164 |
Source: | Code function: | 1_2_03B53A74 |
Source: | Code function: | 1_2_03B743EC | |
Source: | Code function: | 1_2_03B7476C | |
Source: | Code function: | 1_2_03B744C8 | |
Source: | Code function: | 1_2_03B74420 | |
Source: | Code function: | 1_2_03B74478 | |
Source: | Code function: | 1_2_03B4AF84 | |
Source: | Code function: | 1_2_03B52CF0 | |
Source: | Code function: | 1_2_03B4B2A4 |
Source: | Code function: | 1_2_00E542D5 |
Source: | Code function: | 1_2_00E48F2E |
Source: | Code function: | 1_2_00E55778 |
Source: | Code function: | 0_3_062C0672 | |
Source: | Code function: | 0_3_0626D7DD | |
Source: | Code function: | 0_3_062674FB | |
Source: | Code function: | 0_3_062785F7 | |
Source: | Code function: | 0_3_06272296 | |
Source: | Code function: | 0_3_062612EC | |
Source: | Code function: | 0_3_0626BC0E | |
Source: | Code function: | 0_3_06276C1E | |
Source: | Code function: | 0_3_062A8A7C | |
Source: | Code function: | 0_3_0626C989 | |
Source: | Code function: | 0_3_0629E9EA | |
Source: | Code function: | 0_3_062C0672 | |
Source: | Code function: | 0_3_0626D7DD | |
Source: | Code function: | 0_3_062674FB | |
Source: | Code function: | 0_3_062785F7 | |
Source: | Code function: | 0_3_06272296 | |
Source: | Code function: | 0_3_062612EC | |
Source: | Code function: | 1_2_00DFB020 | |
Source: | Code function: | 1_2_00DF1663 | |
Source: | Code function: | 1_2_00DF9C80 | |
Source: | Code function: | 1_2_00E123F5 | |
Source: | Code function: | 1_2_00E78400 | |
Source: | Code function: | 1_2_00E26502 | |
Source: | Code function: | 1_2_00DFE6F0 | |
Source: | Code function: | 1_2_00E2265E | |
Source: | Code function: | 1_2_00E1282A | |
Source: | Code function: | 1_2_00E289BF | |
Source: | Code function: | 1_2_00E26A74 | |
Source: | Code function: | 1_2_00E70A3A | |
Source: | Code function: | 1_2_00E00BE0 | |
Source: | Code function: | 1_2_00E4EDB2 | |
Source: | Code function: | 1_2_00E1CD51 | |
Source: | Code function: | 1_2_00E70EB7 | |
Source: | Code function: | 1_2_00E58E44 | |
Source: | Code function: | 1_2_00E26FE6 | |
Source: | Code function: | 1_2_00E133B7 | |
Source: | Code function: | 1_2_00DF94E0 | |
Source: | Code function: | 1_2_00E0D45D | |
Source: | Code function: | 1_2_00E1F409 | |
Source: | Code function: | 1_2_00E116B4 | |
Source: | Code function: | 1_2_00DFF6A0 | |
Source: | Code function: | 1_2_00E0F628 | |
Source: | Code function: | 1_2_00E178C3 | |
Source: | Code function: | 1_2_00E1DBA5 | |
Source: | Code function: | 1_2_00E11BA8 | |
Source: | Code function: | 1_2_00E29CE5 | |
Source: | Code function: | 1_2_00E0DD28 | |
Source: | Code function: | 1_2_00E11FC0 | |
Source: | Code function: | 1_2_00E1BFD6 | |
Source: | Code function: | 1_2_03B4A79C | |
Source: | Code function: | 1_2_03B46438 | |
Source: | Code function: | 1_2_03B5EC00 | |
Source: | Code function: | 1_2_03B6B1B8 | |
Source: | Code function: | 1_2_03B69BD0 |
Source: | Dropped File: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_00E5A6AD |
Source: | Code function: | 1_2_00E48DE9 | |
Source: | Code function: | 1_2_00E49399 |
Source: | Code function: | 1_2_00E5B976 |
Source: | Code function: | 1_2_00E54148 |
Source: | Code function: | 1_2_00E5C9DA |
Source: | Code function: | 1_2_00E5443D |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00E6C6D9 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_3_062687C0 | |
Source: | Code function: | 0_3_062448C5 | |
Source: | Code function: | 0_3_062448C5 | |
Source: | Code function: | 0_3_062687C0 | |
Source: | Code function: | 1_2_00E1E941 | |
Source: | Code function: | 1_2_00E58A4C | |
Source: | Code function: | 1_2_00E1EA5A | |
Source: | Code function: | 1_2_00E0CBF8 | |
Source: | Code function: | 1_2_00E18B88 | |
Source: | Code function: | 1_2_00E1EC35 | |
Source: | Code function: | 1_2_00E1ED1E | |
Source: | Code function: | 1_2_0103D06D | |
Source: | Code function: | 1_2_0103D325 | |
Source: | Code function: | 1_2_0103D325 | |
Source: | Code function: | 1_2_0103AD59 | |
Source: | Code function: | 1_2_01040729 | |
Source: | Code function: | 1_2_01040729 | |
Source: | Code function: | 1_2_0103CD02 | |
Source: | Code function: | 1_2_0103CF25 | |
Source: | Code function: | 1_2_0104079C | |
Source: | Code function: | 1_2_0104079C | |
Source: | Code function: | 1_2_0103CF5D | |
Source: | Code function: | 1_2_0103DFBA | |
Source: | Code function: | 1_2_01040EBF | |
Source: | Code function: | 1_2_03B743C8 | |
Source: | Code function: | 1_2_03B783C4 | |
Source: | Code function: | 1_2_03B3C3AC | |
Source: | Code function: | 1_2_03B3C3AC | |
Source: | Code function: | 1_2_03B783FC | |
Source: | Code function: | 1_2_03B78354 | |
Source: | Code function: | 1_2_03B7838C |
Source: | File created: | Jump to dropped file |
Source: | Code function: | 1_2_00E759B3 | |
Source: | Code function: | 1_2_00E05EDA |
Source: | Code function: | 1_2_00E133B7 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Code function: | 1_2_03B7C828 |
Source: | Binary or memory string: |
Source: | API coverage: |
Source: | Code function: | 1_2_03B7C828 |
Source: | WMI Queries: |
Source: | Code function: | 1_2_00E54005 | |
Source: | Code function: | 1_2_00E5C2FF | |
Source: | Code function: | 1_2_00E5494A | |
Source: | Code function: | 1_2_00E5CD9F | |
Source: | Code function: | 1_2_00E5CD14 | |
Source: | Code function: | 1_2_00E5F5D8 | |
Source: | Code function: | 1_2_00E5F735 | |
Source: | Code function: | 1_2_00E5FA36 | |
Source: | Code function: | 1_2_00E53CE2 | |
Source: | Code function: | 1_2_0103C65D | |
Source: | Code function: | 1_2_03B7A584 | |
Source: | Code function: | 1_2_03B28AFC | |
Source: | Code function: | 1_2_03B289F4 | |
Source: | Code function: | 1_2_03B731F8 | |
Source: | Code function: | 1_2_03B7BA70 | |
Source: | Code function: | 1_2_03B25974 | |
Source: | Code function: | 1_2_03B3BD8C | |
Source: | Code function: | 1_2_03B53D68 |
Source: | Code function: | 1_2_00E05D13 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_1-139153 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 1_2_00E645D5 |
Source: | Code function: | 1_2_00E05240 |
Source: | Code function: | 1_2_00E25CAC |
Source: | Code function: | 1_2_00E6C6D9 |
Source: | Code function: | 1_2_0104925E | |
Source: | Code function: | 1_2_03B480A4 | |
Source: | Code function: | 1_2_03B4A79C | |
Source: | Code function: | 1_2_03B4A79C |
Source: | Code function: | 1_2_00E488CD |
Source: | Code function: | 1_2_00E1A385 | |
Source: | Code function: | 1_2_00E1A354 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 1_2_03B4DCB8 |
Source: | Code function: | 1_2_03B4DCB8 |
Source: | Code function: | 1_2_00E49369 |
Source: | Code function: | 1_2_00E05240 |
Source: | Code function: | 1_2_00E51AC6 |
Source: | Code function: | 1_2_00E551E2 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 1_2_00E488CD |
Source: | Code function: | 1_2_00E54F1C |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_3_06268493 |
Source: | Code function: | 1_2_0103C835 | |
Source: | Code function: | 1_2_0103C93F | |
Source: | Code function: | 1_2_0103EB19 | |
Source: | Code function: | 1_2_0103EACD | |
Source: | Code function: | 1_2_0103CC45 | |
Source: | Code function: | 1_2_0103FC71 | |
Source: | Code function: | 1_2_03B25B4C | |
Source: | Code function: | 1_2_03B26470 | |
Source: | Code function: | 1_2_03B2CC88 | |
Source: | Code function: | 1_2_03B2B620 | |
Source: | Code function: | 1_2_03B2B66C | |
Source: | Code function: | 1_2_03B25C56 |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior | ||
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 1_2_00E30030 |
Source: | Code function: | 1_2_00E30722 |
Source: | Code function: | 1_2_00E2416A |
Source: | Code function: | 1_2_00E05D13 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 1_2_00E6696E | |
Source: | Code function: | 1_2_00E66E32 | |
Source: | Code function: | 1_2_03B3CCB4 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 2 Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 1 Disable or Modify Tools | 21 Input Capture | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 Create Account | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 1 Account Discovery | Remote Desktop Protocol | 1 Screen Capture | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 2 Command and Scripting Interpreter | 2 Valid Accounts | 2 Valid Accounts | 2 Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | 21 Input Capture | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 21 Access Token Manipulation | 1 DLL Side-Loading | NTDS | 55 System Information Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 212 Process Injection | 1 Masquerading | LSA Secrets | 261 Security Software Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Valid Accounts | Cached Domain Credentials | 1 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Virtualization/Sandbox Evasion | DCSync | 3 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 21 Access Token Manipulation | Proc Filesystem | 1 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 212 Process Injection | /etc/passwd and /etc/shadow | 1 System Owner/User Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
49% | Virustotal | Browse | ||
50% | ReversingLabs | Win32.Trojan.Darkgate |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs | |||
4% | Virustotal | Browse |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
⊘No contacted domains info
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
⊘No contacted IP infos
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1599696 |
Start date and time: | 2025-01-26 10:18:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | KgpiJLs58m.exerenamed because original name is a hash value |
Original Sample Name: | 6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea.exe |
Detection: | MAL |
Classification: | mal80.troj.spyw.evad.winEXE@8/4@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Execution Graph export aborted for target KgpiJLs58m.exe, PID 7348 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
- Report size exceeded maximum capacity and may have missing disassembly code.
Time | Type | Description |
---|---|---|
04:19:08 | API Interceptor |
⊘No context
⊘No context
⊘No context
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\temp\test\Autoit3.exe | Get hash | malicious | DarkGate, MailPassView | Browse | ||
Get hash | malicious | DarkGate, MailPassView | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | RedLine | Browse | |||
Get hash | malicious | RedLine | Browse | |||
Get hash | malicious | RedLine, SectopRAT | Browse | |||
Get hash | malicious | RedLine | Browse | |||
Get hash | malicious | RedLine, SectopRAT | Browse | |||
Get hash | malicious | DarkGate, MailPassView | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 42 |
Entropy (8bit): | 2.914979271060093 |
Encrypted: | false |
SSDEEP: | 3:Qh9eolFl+2KlFlFAn:Q7eY+hf2n |
MD5: | 6BCC3A71E109CE3BA3A86C0A4B64599A |
SHA1: | 6FCF197A0DE268743B76690EDA96F587ECEE4146 |
SHA-256: | A786F0AAC81205BA1BDC87A3EDC60E262D265A86FAF23B72F67AE52F94EBFCDC |
SHA-512: | 4CB16970C2FEE11D49467CE90210E646A46364BFD402923BE5FF1789421B12B1AA6890438C5819672DE95BA0BE6A6ACE03E5FD49E48A110B8D66DFFD5CBE8B4E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\temp\test\Autoit3.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32 |
Entropy (8bit): | 3.628928031846024 |
Encrypted: | false |
SSDEEP: | 3:9RkgiKkHzHlGtNGc:Pkn/HzF6NGc |
MD5: | 7FEE8C10F7D8EF4934CE62547CAA0E69 |
SHA1: | ECF8981CACA5F8A55451F4EFAA725CD8F6886DA1 |
SHA-256: | AA819018EA0524D5D4BE4E3DCA78449350E5765CE5DDB3C85D508557A6F0240F |
SHA-512: | 89690E055A2F9CF48F2643325E7F619BDA42FC5074DDC91B7D085C03C7B92673730CF08170B9D6B36D1FD58E04ADD66D1D042A80EAC8399CBB21B34F64F13897 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\KgpiJLs58m.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 893608 |
Entropy (8bit): | 6.620131693023677 |
Encrypted: | false |
SSDEEP: | 12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01 |
MD5: | C56B5F0201A3B3DE53E561FE76912BFD |
SHA1: | 2A4062E10A5DE813F5688221DBEB3F3FF33EB417 |
SHA-256: | 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D |
SHA-512: | 195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\KgpiJLs58m.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 598250 |
Entropy (8bit): | 6.847347226287514 |
Encrypted: | false |
SSDEEP: | 12288:hQxqgrQxqgjneQJAvPstG0WtFNXenxmM5yN059S2Ai6IwbLqNKG7tY:ercrjtGXY6enxHyG5uizOo7m |
MD5: | B94C5E38BBF4B6EF11E0442CE58C3131 |
SHA1: | 00B5A444BC5E52F7DD9753383317EB2497EC4B38 |
SHA-256: | 037E15B09413722B48802E6268848D0698B9ED468CD447B40E31EFA5CDB3C313 |
SHA-512: | 546C148FAFD8298F79BF0B02C707AB88F5E15B099903ED725D11DF6345F2A73121BB385E5E094A8EF2A165284A760C104CD03B25804CC55B11A6F22B64A90914 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.096895677278031 |
TrID: |
|
File name: | KgpiJLs58m.exe |
File size: | 4'256'256 bytes |
MD5: | 998cd2e474751b5de344562b4ddb39e2 |
SHA1: | 70ee02a76510b0757e3b26ffd98834f0d259f9d4 |
SHA256: | 6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea |
SHA512: | e69e703c79e9c151245cef8caaa18b30fc2992c72e98b2e197239eb439837ee3c5d446e99f117f4aec0dc56527fd943949e62bbaadd43e123d83d53ad09f43e7 |
SSDEEP: | 49152:gR/KpmZubPf2S8W2ILeWl+C1pNjWy5Snd0eigXNG/2KyT0aXgkKdOcUP6CVjyusJ:G/jtYLP16y5E04Za1UP6mod |
TLSH: | 54167D1BB744783FD4AA06338823C6705937BE21B9A2CC5B67F43E0C6F359906B39656 |
File Content Preview: | MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 162854445c542180 |
Entrypoint: | 0x65c4a4 |
Entrypoint Section: | .itext |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5EC61809 [Thu May 21 05:56:25 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 16c8c7a62c852018ed02e453e144c998 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
push esi |
push edi |
mov eax, 00651408h |
call 00007FD158407522h |
mov eax, dword ptr [00662788h] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000188h] |
push FFFFFFECh |
push eax |
call 00007FD15840B581h |
mov edx, dword ptr [00662788h] |
mov edx, dword ptr [edx] |
mov edx, dword ptr [edx+00000188h] |
and eax, FFFFFF7Fh |
push eax |
push FFFFFFECh |
push edx |
call 00007FD15840B56Dh |
xor eax, eax |
push ebp |
push 0065C528h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
push 00000001h |
call 00007FD15840A8D8h |
call 00007FD1586499B3h |
mov eax, dword ptr [00651030h] |
push eax |
push 006510C8h |
mov eax, dword ptr [00662788h] |
mov eax, dword ptr [eax] |
call 00007FD15859B758h |
call 00007FD158649A07h |
xor eax, eax |
pop edx |
pop ecx |
pop ecx |
mov dword ptr fs:[eax], edx |
jmp 00007FD158654D5Bh |
jmp 00007FD158400298h |
call 00007FD15864974Fh |
mov eax, 00000001h |
call 00007FD158400D81h |
call 00007FD1584006DCh |
mov eax, dword ptr [00662788h] |
mov eax, dword ptr [eax] |
mov edx, 0065C6BCh |
call 00007FD15859B22Fh |
push 00000005h |
mov eax, dword ptr [00662788h] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000188h] |
push eax |
call 00007FD15840B296h |
mov eax, dword ptr [00662788h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x270000 | 0x97 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x26b000 | 0x35d8 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x273000 | 0x1aa248 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x272000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x26b94c | 0x848 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x26f000 | 0x9ee | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2581fc | 0x258200 | 9ce38ee07dc8de6515f5e582039c012f | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x25a000 | 0x26c8 | 0x2800 | 367bc90dd8be7c6a1056ad2a82281084 | False | 0.503125 | data | 6.119631643767066 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x25d000 | 0x5a64 | 0x5c00 | c20c3606951695cd5626a53022531398 | False | 0.40281080163043476 | data | 5.055173307610014 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x263000 | 0x780c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x26b000 | 0x35d8 | 0x3600 | 6cbfeeac8d17ca3b356e9c16e6f19fc1 | False | 0.33622685185185186 | data | 5.280395234482991 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0x26f000 | 0x9ee | 0xa00 | 2726dff14c86e88d2aaa4303cf2dc681 | False | 0.36328125 | data | 4.360393246158077 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x270000 | 0x97 | 0x200 | 8c377a4128fcc7899b263e28899a337b | False | 0.251953125 | data | 1.7456444612923019 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x271000 | 0x44 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x272000 | 0x5d | 0x200 | be59fdae8b4a80179fdb6b9e7588da9e | False | 0.189453125 | data | 1.4090774709019303 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x273000 | 0x1aa248 | 0x1aa400 | 4f0490ef60b5eb8b64d8a251779511c0 | False | 0.7045408724340176 | data | 7.642057868934714 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
EKYXKPA62BJZH3QNRUC | 0x273dd8 | 0x177c08 | data | 0.7448005676269531 | ||
RT_CURSOR | 0x3eb9e0 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x3ebb14 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x3ebc48 | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x3ebd7c | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x3ebeb0 | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x3ebfe4 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x3ec118 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_BITMAP | 0x3ec24c | 0xd28 | Device independent bitmap graphic, 48 x 48 x 8, image size 0, resolution 3780 x 3780 px/m, 256 important colors | 0.16508313539192399 | ||
RT_BITMAP | 0x3ecf74 | 0x32a | Device independent bitmap graphic, 16 x 16 x 24, image size 770, resolution 3779 x 3779 px/m | 0.2074074074074074 | ||
RT_ICON | 0x3ed2a0 | 0x2a47 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9626720872216575 |
RT_ICON | 0x3efce8 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m | English | United States | 0.07821187743996215 |
RT_ICON | 0x400510 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 2835 x 2835 px/m | English | United States | 0.10350536052133698 |
RT_ICON | 0x4099b8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m | English | United States | 0.15653046764289089 |
RT_ICON | 0x40dbe0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m | English | United States | 0.21597510373443984 |
RT_ICON | 0x410188 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m | English | United States | 0.3219981238273921 |
RT_ICON | 0x411230 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/m | English | United States | 0.42745901639344264 |
RT_ICON | 0x411bb8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | English | United States | 0.5966312056737588 |
RT_STRING | 0x412020 | 0x6c | data | 0.6018518518518519 | ||
RT_STRING | 0x41208c | 0x250 | data | 0.46790540540540543 | ||
RT_STRING | 0x4122dc | 0x204 | data | 0.46705426356589147 | ||
RT_STRING | 0x4124e0 | 0x3ec | data | 0.3894422310756972 | ||
RT_STRING | 0x4128cc | 0x410 | data | 0.41634615384615387 | ||
RT_STRING | 0x412cdc | 0x160 | data | 0.59375 | ||
RT_STRING | 0x412e3c | 0xd0 | data | 0.6778846153846154 | ||
RT_STRING | 0x412f0c | 0x2f4 | data | 0.43253968253968256 | ||
RT_STRING | 0x413200 | 0x3fc | data | 0.37941176470588234 | ||
RT_STRING | 0x4135fc | 0x49c | data | 0.35338983050847456 | ||
RT_STRING | 0x413a98 | 0x29c | data | 0.31736526946107785 | ||
RT_STRING | 0x413d34 | 0x3f0 | data | 0.43154761904761907 | ||
RT_STRING | 0x414124 | 0x438 | data | 0.3731481481481482 | ||
RT_STRING | 0x41455c | 0x3ac | data | 0.3861702127659574 | ||
RT_STRING | 0x414908 | 0x404 | data | 0.3764591439688716 | ||
RT_STRING | 0x414d0c | 0x2ac | data | 0.38742690058479534 | ||
RT_STRING | 0x414fb8 | 0xb8 | data | 0.657608695652174 | ||
RT_STRING | 0x415070 | 0xd0 | data | 0.6201923076923077 | ||
RT_STRING | 0x415140 | 0x354 | data | 0.4284037558685446 | ||
RT_STRING | 0x415494 | 0x3ac | data | 0.3425531914893617 | ||
RT_STRING | 0x415840 | 0x354 | data | 0.3826291079812207 | ||
RT_STRING | 0x415b94 | 0x2c0 | data | 0.41051136363636365 | ||
RT_RCDATA | 0x415e54 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x415e64 | 0x1800 | PE32+ executable (console) x86-64, for MS Windows | English | United States | 0.3924153645833333 |
RT_RCDATA | 0x417664 | 0xac4 | data | 0.5446298984034833 | ||
RT_RCDATA | 0x418128 | 0x147 | Delphi compiled form 'TMainForm' | 0.746177370030581 | ||
RT_RCDATA | 0x418270 | 0x480 | Delphi compiled form 'TNewDiskForm' | 0.5034722222222222 | ||
RT_RCDATA | 0x4186f0 | 0x400 | Delphi compiled form 'TSelectFolderForm' | 0.5087890625 | ||
RT_RCDATA | 0x418af0 | 0x4b5 | Delphi compiled form 'TSelectLanguageForm' | 0.5004149377593361 | ||
RT_RCDATA | 0x418fa8 | 0x7ff | Delphi compiled form 'TUninstallProgressForm' | 0.4054714215925745 | ||
RT_RCDATA | 0x4197a8 | 0x55c | Delphi compiled form 'TUninstSharedFileForm' | 0.41690962099125367 | ||
RT_RCDATA | 0x419d04 | 0x2ac9 | Delphi compiled form 'TWizardForm' | 0.19811923673879303 | ||
RT_GROUP_CURSOR | 0x41c7d0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x41c7e4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x41c7f8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x41c80c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x41c820 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x41c834 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x41c848 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x41c85c | 0x76 | data | English | United States | 0.7457627118644068 |
RT_VERSION | 0x41c8d4 | 0x24c | data | English | United States | 0.47959183673469385 |
RT_MANIFEST | 0x41cb20 | 0x726 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4005464480874317 |
DLL | Import |
---|---|
mpr.dll | WNetEnumResourceW, WNetGetUniversalNameW, WNetGetConnectionW, WNetCloseEnum, WNetOpenEnumW |
comdlg32.dll | GetSaveFileNameW, GetOpenFileNameW |
comctl32.dll | FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, FlatSB_GetScrollInfo, ImageList_Write, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_Draw, ImageList_Remove |
shell32.dll | SHBrowseForFolderW, ExtractIconW, SHGetMalloc, SHGetFileInfoW, SHChangeNotify, Shell_NotifyIconW, ShellExecuteW, SHGetPathFromIDListW, ShellExecuteExW |
user32.dll | CopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, GetMessageW, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, ScrollWindowEx, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, OffsetRect, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, GetSystemMenu, WaitForInputIdle, ShowOwnedPopups, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, InflateRect, GetKeyboardLayoutList, OemToCharBuffA, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, SendNotifyMessageW, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, SetWindowLongW, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, ClientToScreen, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ExitWindowsEx, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, GetClassLongW, ActivateKeyboardLayout, GetParent, CharToOemBuffA, DrawTextW, SetScrollRange, InsertMenuItemW, PeekMessageA, GetPropW, SetClassLongW, MessageBoxW, MessageBeep, SetPropW, SetRectEmpty, UpdateWindow, RemovePropW, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, SendMessageTimeoutW, BringWindowToTop, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowPos, SetWindowRgn, GetMenuItemCount, RemoveMenu, AppendMenuW, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, DestroyCursor, ReplyMessage, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowLongW, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, FindWindowW, DeleteMenu, GetKeyboardLayout |
version.dll | GetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW |
oleaut32.dll | SafeArrayPutElement, LoadTypeLib, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, GetActiveObject, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopy, RegisterTypeLib, VariantChangeType, VariantCopyInd |
advapi32.dll | RegSetValueExW, RegEnumKeyExW, AdjustTokenPrivileges, OpenThreadToken, GetUserNameW, RegDeleteKeyW, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegQueryInfoKeyW, AllocateAndInitializeSid, FreeSid, EqualSid, RegDeleteValueW, RegFlushKey, RegQueryValueExW, RegEnumValueW, GetTokenInformation, InitializeSecurityDescriptor, RegCloseKey, RegCreateKeyExW, SetSecurityDescriptorDacl |
netapi32.dll | NetWkstaGetInfo, NetApiBufferFree |
kernel32.dll | SetFileAttributesW, SetFileTime, GetACP, GetExitCodeProcess, IsBadWritePtr, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, VirtualProtect, QueryPerformanceFrequency, FindNextFileW, GetFullPathNameW, VirtualFree, ExitProcess, HeapAlloc, WriteProfileStringW, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, FileTimeToLocalFileTime, GetModuleHandleW, FreeLibrary, HeapDestroy, CompareFileTime, ReadFile, CreateProcessW, TransactNamedPipe, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, OpenMutexW, CreateThread, CompareStringW, CopyFileW, CreateMutexW, LoadLibraryA, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, GetSystemTimeAsFileTime, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, GetCurrentThread, GetLogicalDrives, LocalFileTimeToFileTime, SetNamedPipeHandleState, LoadLibraryExW, TerminateProcess, LockResource, FileTimeToSystemTime, GetShortPathNameW, GetCurrentThreadId, UnhandledExceptionFilter, MoveFileExW, VirtualQuery, GlobalFindAtomW, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, ReleaseMutex, FlushFileBuffers, LoadResource, SuspendThread, GetTickCount, WritePrivateProfileStringW, GetFileSize, GetStartupInfoW, GlobalDeleteAtom, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, DeviceIoControl, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, lstrcmpW, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, CreateNamedPipeW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, IsValidLocale, TlsSetValue, CreateDirectoryW, GetOverlappedResult, GetSystemDefaultUILanguage, EnumCalendarInfoW, GetProfileStringW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, IsDBCSLeadByte, CreateEventW, GetPrivateProfileStringW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale |
ole32.dll | StgCreateDocfileOnILockBytes, CoCreateInstance, CLSIDFromString, CoUninitialize, IsEqualGUID, OleInitialize, CoFreeUnusedLibraries, CreateILockBytesOnHGlobal, CLSIDFromProgID, OleUninitialize, CoDisconnectObject, CoInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID |
gdi32.dll | Arc, Pie, SetBkMode, SelectPalette, CreateCompatibleBitmap, ExcludeClipRect, RectVisible, SetWindowOrgEx, MaskBlt, AngleArc, Chord, SetTextColor, StretchBlt, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, RemoveFontResourceW, GetWindowOrgEx, CreatePalette, CreateBrushIndirect, PatBlt, LineDDA, PolyBezierTo, GetStockObject, CreateSolidBrush, Polygon, Rectangle, MoveToEx, DeleteDC, SaveDC, BitBlt, Ellipse, FrameRgn, GetDeviceCaps, GetBitmapBits, GetTextExtentPoint32W, GetClipBox, Polyline, IntersectClipRect, GetSystemPaletteEntries, CreateBitmap, AddFontResourceW, CreateDIBitmap, GetStretchBltMode, CreateDIBSection, CreatePenIndirect, SetStretchBltMode, GetDIBits, CreateFontIndirectW, PolyBezier, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, DeleteObject, SelectObject, ExtFloodFill, UnrealizeObject, SetBkColor, CreateCompatibleDC, GetObjectW, GetBrushOrgEx, GetCurrentPositionEx, SetROP2, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, ArcTo, GdiFlush, SetPixel, EnumFontFamiliesExW, GetPaletteEntries |
Name | Ordinal | Address |
---|---|---|
TMethodImplementationIntercept | 3 | 0x4aefc0 |
__dbk_fcall_wrapper | 2 | 0x40eb68 |
dbkFCallWrapperAddr | 1 | 0x66663c |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
⊘No network behavior found
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:19:04 |
Start date: | 26/01/2025 |
Path: | C:\Users\user\Desktop\KgpiJLs58m.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 4'256'256 bytes |
MD5 hash: | 998CD2E474751B5DE344562B4DDB39E2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 04:19:05 |
Start date: | 26/01/2025 |
Path: | C:\temp\test\Autoit3.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdf0000 |
File size: | 893'608 bytes |
MD5 hash: | C56B5F0201A3B3DE53E561FE76912BFD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:19:07 |
Start date: | 26/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 04:19:07 |
Start date: | 26/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 04:19:07 |
Start date: | 26/01/2025 |
Path: | C:\Windows\SysWOW64\wbem\WMIC.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x890000 |
File size: | 427'008 bytes |
MD5 hash: | E2DE6500DE1148C7F6027AD50AC8B891 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |