Loading ...

Play interactive tourEdit tour

Analysis Report eUTopTYPuc

Overview

General Information

Sample Name:eUTopTYPuc (renamed file extension from none to exe)
Analysis ID:349662
MD5:09580ec10df3398ce68c176121fbba66
SHA1:d86cc8b0439b75ffecf6df985161c81f028a6fe2
SHA256:06a0b2c3fc763506f6340dc4f582f7980378f7ededfb807541afeeca0499d8cd
Tags:uncategorized

Most interesting Screenshot:

Detection

ZeusVM
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected ZeusVM e-Banking Trojan
Multi AV Scanner detection for submitted file
Contains VNC / remote desktop functionality (version string found)
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
May initialize a security null descriptor
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • eUTopTYPuc.exe (PID: 632 cmdline: 'C:\Users\user\Desktop\eUTopTYPuc.exe' MD5: 09580EC10DF3398CE68C176121FBBA66)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: eUTopTYPuc.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: eUTopTYPuc.exeVirustotal: Detection: 91%Perma Link
Source: eUTopTYPuc.exeMetadefender: Detection: 78%Perma Link
Source: eUTopTYPuc.exeReversingLabs: Detection: 96%
Machine Learning detection for sampleShow sources
Source: eUTopTYPuc.exeJoe Sandbox ML: detected
Source: 0.0.eUTopTYPuc.exe.400000.0.unpackAvira: Label: TR/Spy.Zbot.aoqb.5
Source: 0.2.eUTopTYPuc.exe.400000.0.unpackAvira: Label: TR/Spy.Zbot.aoqb.5
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00417429 CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040812A CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: eUTopTYPuc.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041628F GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040C4F3 FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040C5AE FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00408C27 WaitForSingleObject,InternetReadFile,
Source: eUTopTYPuc.exeString found in binary or memory: http://www.google.com/webhp
Source: eUTopTYPuc.exeString found in binary or memory: http://www.google.com/webhpbcSeShutdownPrivilegeRFB
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00404D18 GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,OpenInputDesktop,SwitchDesktop,DefWindowProcW,DefWindowProcA,DefDlgProcW,DefDlgProcA,DefFrameProcW,DefFrameProcA,DefMDIChildProcW,DefMDIChildProcA,CallWindowProcW,CallWindowProcA,RegisterClassW,RegisterClassA,RegisterClassExW,RegisterClassExA,BeginPaint,EndPaint,GetDCEx,GetDC,GetWindowDC,ReleaseDC,GetUpdateRect,GetUpdateRgn,GetMessagePos,GetCursorPos,SetCursorPos,SetCapture,ReleaseCapture,GetCapture,GetMessageW,GetMessageA,PeekMessageW,PeekMessageA,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00405CE7 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,

E-Banking Fraud:

barindex
Detected ZeusVM e-Banking TrojanShow sources
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041D132 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040EF1F OpenWindowStationW,CreateWindowStationW,GetProcessWindowStation,OpenDesktopW,CreateDesktopW,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004087A7 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040F429 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004136AC CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00402823
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00408036
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004117CB
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00409BD8
Source: eUTopTYPuc.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: classification engineClassification label: mal72.bank.troj.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041A581 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041A6F6 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00408551 GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004084FA CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00417185 CoCreateInstance,
Source: eUTopTYPuc.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\eUTopTYPuc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: eUTopTYPuc.exeVirustotal: Detection: 91%
Source: eUTopTYPuc.exeMetadefender: Detection: 78%
Source: eUTopTYPuc.exeReversingLabs: Detection: 96%
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004178F9 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00403143 push cs; ret
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00403179 push cs; iretd
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00402AAD push es; iretd
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00411FB9 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040C4F3 FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040C5AE FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_004178F9 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00412738 mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00412A7D GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040A474 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041AC79 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetLocalTime,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0041A525 GetUserNameExW,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00406FAF GetTimeZoneInformation,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00413002 GetComputerNameW,GetVersionExW,RegOpenKeyExW,
Source: eUTopTYPuc.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)

Remote Access Functionality:

barindex
Contains VNC / remote desktop functionality (version string found)Show sources
Source: eUTopTYPuc.exeString found in binary or memory: RFB 003.003
Source: eUTopTYPuc.exeString found in binary or memory: RFB 003.003
Source: eUTopTYPuc.exe, 00000000.00000000.203019463.0000000000401000.00000020.00020000.sdmpString found in binary or memory: scriptnbsp;Basic tmp%s%08x.%s%s%08x*SysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXME.tmphttp://www.google.com/webhpbcSeShutdownPrivilegeRFB 003.003
Source: eUTopTYPuc.exeString found in binary or memory: RFB 003.003
Source: eUTopTYPuc.exeString found in binary or memory: scriptnbsp;Basic tmp%s%08x.%s%s%08x*SysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXME.tmphttp://www.google.com/webhpbcSeShutdownPrivilegeRFB 003.003
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_0040A2A5 socket,bind,closesocket,
Source: C:\Users\user\Desktop\eUTopTYPuc.exeCode function: 0_2_00409FC7 socket,bind,listen,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Create Account1Valid Accounts1Valid Accounts1Input Capture11Network Share Discovery1Remote Desktop Protocol1Input Capture11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobValid Accounts1Access Token Manipulation11Access Token Manipulation11LSASS MemorySystem Time Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Application Shimming1Application Shimming1Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Install Root Certificate1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
eUTopTYPuc.exe92%VirustotalBrowse
eUTopTYPuc.exe83%MetadefenderBrowse
eUTopTYPuc.exe96%ReversingLabsWin32.Trojan.Zeus
eUTopTYPuc.exe100%AviraTR/Spy.Zbot.aoqb.5
eUTopTYPuc.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.0.eUTopTYPuc.exe.400000.0.unpack100%AviraTR/Spy.Zbot.aoqb.5Download File
0.2.eUTopTYPuc.exe.400000.0.unpack100%AviraTR/Spy.Zbot.aoqb.5Download File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:349662
Start date:07.02.2021
Start time:15:10:11
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 11s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:eUTopTYPuc (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal72.bank.troj.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 99.9% (good quality ratio 91%)
  • Quality average: 80%
  • Quality standard deviation: 31.7%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:MS-DOS executable
Entropy (8bit):6.695252019797953
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.94%
  • DOS Executable Borland Pascal 7.0x (2037/25) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
File name:eUTopTYPuc.exe
File size:141824
MD5:09580ec10df3398ce68c176121fbba66
SHA1:d86cc8b0439b75ffecf6df985161c81f028a6fe2
SHA256:06a0b2c3fc763506f6340dc4f582f7980378f7ededfb807541afeeca0499d8cd
SHA512:f5c48d2393ed7663016c09dc0f4549cddc1f9fe9f243db74e89de7f14f745ab836657e2f224ac4d70c0c23587a736c508a43c16f4cb4a394d6722844bf047330
SSDEEP:3072:/SV0AxFxYlFZR3v4iNGMHRHaFtC7qQZkGUGTVpAXhS5qsFwDFox63KruM:/Y0AKlFZR3v4icKHaFGxUsAXhSYsupUb
File Content Preview:MZ......................................................................................................................................................................................................................PE..L...V..N.....................:.....

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x4139f2
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
Time Stamp:0x4EAF1E56 [Mon Oct 31 22:16:54 2011 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:0b998d2a10b9f3bb78c6703e634f1aff

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
sub esp, 10h
push ebx
push 00000000h
xor bl, bl
call 00007FB00CDDF4A0h
test al, al
je 00007FB00CDE04FAh
push 00008007h
mov byte ptr [ebp-10h], bl
mov byte ptr [ebp-0Ch], 00000001h
mov byte ptr [ebp-01h], bl
call dword ptr [00401178h]
lea eax, dword ptr [ebp-08h]
push eax
call dword ptr [00401174h]
push eax
call dword ptr [004012CCh]
test eax, eax
je 00007FB00CDE04A7h
xor edx, edx
cmp dword ptr [ebp-08h], edx
jle 00007FB00CDE0461h
mov ecx, dword ptr [eax+edx*4]
test ecx, ecx
je 00007FB00CDE0454h
cmp word ptr [ecx], 002Dh
jne 00007FB00CDE044Eh
movzx ecx, word ptr [ecx+02h]
cmp ecx, 66h
je 00007FB00CDE0441h
cmp ecx, 69h
je 00007FB00CDE0438h
cmp ecx, 6Eh
je 00007FB00CDE042Dh
cmp ecx, 76h
jne 00007FB00CDE0436h
mov byte ptr [ebp-01h], 00000001h
jmp 00007FB00CDE0430h
mov byte ptr [ebp-0Ch], 00000000h
jmp 00007FB00CDE042Ah
mov bl, 01h
jmp 00007FB00CDE0426h
mov byte ptr [ebp-10h], 00000001h
inc edx
cmp edx, dword ptr [ebp-08h]
jl 00007FB00CDE03E3h
push eax
call dword ptr [00401130h]
test bl, bl
je 00007FB00CDE0429h
call 00007FB00CDDFE55h
jmp 00007FB00CDE0456h
cmp byte ptr [ebp-01h], 00000000h
je 00007FB00CDE0445h
call 00007FB00CDDA34Bh
call 00007FB00CDD2176h
test byte ptr [00423968h], 00000004h
mov bl, al
je 00007FB00CDE043Dh
push 00000000h
mov eax, 004231B8h
call 00007FB00CDDA1A8h
jmp 00007FB00CDE042Fh

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1f7540x118.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x250000x11a4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x5a0.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x206340x20800False0.640144230769data6.71836960756IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x220000x204c0x400False0.2099609375data1.62977361771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.reloc0x250000x16640x1800False0.626302083333data5.62270089865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.dllFlushFileBuffers, GetTempPathW, GetFileSizeEx, OpenMutexW, GetLastError, SetLastError, VirtualAlloc, VirtualProtectEx, VirtualAllocEx, FindClose, LoadLibraryA, RemoveDirectoryW, WaitForMultipleObjects, FindNextFileW, VirtualProtect, GetFileTime, ReleaseMutex, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, DeleteFileW, GetFileInformationByHandle, LocalFree, GetSystemTime, WriteProcessMemory, SetFileAttributesW, CreateThread, ExpandEnvironmentStringsW, SystemTimeToFileTime, UnmapViewOfFile, MultiByteToWideChar, CreateEventW, GetCurrentThreadId, TlsAlloc, TlsFree, MoveFileExW, GetModuleFileNameW, GetUserDefaultUILanguage, ExitProcess, GetCommandLineW, SetErrorMode, GetComputerNameW, GetVersionExW, OpenEventW, DuplicateHandle, GetCurrentProcessId, GetNativeSystemInfo, GetThreadContext, SetThreadContext, GetProcessId, GetPrivateProfileStringW, GetPrivateProfileIntW, lstrcmpiA, WTSGetActiveConsoleSessionId, GetLocalTime, HeapAlloc, CreateProcessW, CreateFileW, GetTimeZoneInformation, ReadFile, Thread32Next, GetFileAttributesW, HeapCreate, HeapDestroy, FreeLibrary, SetEndOfFile, ReadProcessMemory, Sleep, LoadLibraryW, WideCharToMultiByte, Thread32First, WriteFile, VirtualQueryEx, SetFileTime, IsBadReadPtr, GetProcessHeap, VirtualFree, CreateDirectoryW, HeapFree, CreateFileMappingW, SetFilePointerEx, FindFirstFileW, CreateMutexW, HeapReAlloc, GetTempFileNameW, FileTimeToDosDateTime, GetEnvironmentVariableW, CloseHandle, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualFreeEx, OpenProcess, CreateRemoteThread, EnterCriticalSection, GlobalUnlock, LeaveCriticalSection, InitializeCriticalSection, GetTickCount, GlobalLock, ResetEvent, SetThreadPriority, TerminateProcess, TlsSetValue, GetCurrentThread, SetEvent, WaitForSingleObject, TlsGetValue, GetFileAttributesExW, lstrcmpiW, GetProcAddress, MapViewOfFile, GetModuleHandleW
USER32.dllLoadImageW, MsgWaitForMultipleObjects, WindowFromPoint, CharToOemW, GetWindowLongW, CharLowerA, CharUpperW, SetWindowLongW, SendMessageTimeoutW, GetWindow, DispatchMessageW, GetKeyboardState, ToUnicode, FillRect, PostMessageW, GetWindowInfo, GetTopWindow, IntersectRect, PostThreadMessageW, EqualRect, PrintWindow, SendMessageW, IsRectEmpty, EndPaint, GetMenuItemID, GetUpdateRgn, GetMessageW, RegisterClassExA, GetWindowDC, SetCapture, CharLowerBuffA, CharLowerW, GetThreadDesktop, MapVirtualKeyW, DrawIcon, GetIconInfo, GetSystemMetrics, GetWindowRect, GetParent, GetClassLongW, GetAncestor, SetWindowPos, IsWindow, MapWindowPoints, ExitWindowsEx, CreateDesktopW, SetProcessWindowStation, CloseWindowStation, CreateWindowStationW, GetProcessWindowStation, CloseDesktop, SetThreadDesktop, OpenWindowStationW, SetKeyboardState, GetSubMenu, GetShellWindow, OpenDesktopW, RegisterWindowMessageW, DrawEdge, MenuItemFromPoint, GetMenuItemRect, TrackPopupMenuEx, RegisterClassA, DefFrameProcW, SystemParametersInfoW, GetClassNameW, GetMenuState, GetMenuItemCount, DefDlgProcW, DefFrameProcA, OpenInputDesktop, BeginPaint, GetUpdateRect, GetDC, GetCapture, TranslateMessage, RegisterClassExW, SetCursorPos, GetClipboardData, PeekMessageW, GetDCEx, PeekMessageA, ReleaseDC, DefWindowProcA, GetCursorPos, DefMDIChildProcW, HiliteMenuItem, GetUserObjectInformationW, EndMenu, GetWindowThreadProcessId, GetMessageA, GetMessagePos, DefWindowProcW, CallWindowProcW, CallWindowProcA, RegisterClassW, ReleaseCapture, DefMDIChildProcA, DefDlgProcA, SwitchDesktop, GetMenu
ADVAPI32.dllGetLengthSid, CryptGetHashParam, OpenProcessToken, GetSidSubAuthority, CryptAcquireContextW, OpenThreadToken, GetSidSubAuthorityCount, GetTokenInformation, RegCreateKeyExW, CryptReleaseContext, RegQueryValueExW, CreateProcessAsUserW, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetNamedSecurityInfoW, LookupPrivilegeValueW, CryptCreateHash, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegOpenKeyExW, GetSecurityDescriptorSacl, SetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, RegCloseKey, RegSetValueExW, CryptHashData, InitiateSystemShutdownExW, IsWellKnownSid, ConvertSidToStringSidW, EqualSid, RegEnumKeyExW
SHLWAPI.dllwvnsprintfW, StrStrIW, StrStrIA, StrCmpNIW, PathQuoteSpacesW, PathIsURLW, PathRenameExtensionW, wvnsprintfA, StrCmpNIA, PathMatchSpecW, PathRemoveBackslashW, PathUnquoteSpacesW, PathAddExtensionW, PathCombineW, SHDeleteKeyW, PathSkipRootW, SHDeleteValueW, PathAddBackslashW, PathRemoveFileSpecW, PathFindFileNameW, PathIsDirectoryW, UrlUnescapeA
SHELL32.dllShellExecuteW, SHGetFolderPathW, CommandLineToArgvW
Secur32.dllGetUserNameExW
ole32.dllStringFromGUID2, CLSIDFromString, CoUninitialize, CoCreateInstance, CoInitializeEx
GDI32.dllCreateCompatibleBitmap, GetDIBits, CreateDIBSection, SetViewportOrgEx, DeleteDC, GdiFlush, DeleteObject, SelectObject, SetRectRgn, CreateCompatibleDC, GetDeviceCaps, RestoreDC, SaveDC
WS2_32.dllsendto, getsockname, select, getaddrinfo, recvfrom, getpeername, accept, listen, WSAEventSelect, WSAIoctl, connect, WSAAddressToStringW, WSAStartup, WSAGetLastError, shutdown, setsockopt, bind, socket, recv, freeaddrinfo, WSASend, closesocket, send, WSASetLastError
CRYPT32.dllCertDuplicateCertificateContext, CertEnumCertificatesInStore, CertCloseStore, CertOpenSystemStoreW, CertDeleteCertificateFromStore, CryptUnprotectData, PFXImportCertStore, PFXExportCertStoreEx
WININET.dllHttpAddRequestHeadersW, InternetSetStatusCallbackW, GetUrlCacheEntryInfoW, HttpAddRequestHeadersA, InternetQueryOptionA, InternetOpenA, HttpOpenRequestA, InternetSetOptionA, InternetCrackUrlA, InternetQueryOptionW, InternetConnectA, InternetCloseHandle, HttpSendRequestA, HttpSendRequestW, InternetReadFile, InternetReadFileExA, InternetQueryDataAvailable, HttpSendRequestExW, HttpQueryInfoA, HttpSendRequestExA
OLEAUT32.dllVariantInit, SysAllocString, VariantClear, SysFreeString
NETAPI32.dllNetApiBufferFree, NetUserEnum, NetUserGetInfo

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:15:10:58
Start date:07/02/2021
Path:C:\Users\user\Desktop\eUTopTYPuc.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\eUTopTYPuc.exe'
Imagebase:0x400000
File size:141824 bytes
MD5 hash:09580EC10DF3398CE68C176121FBBA66
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >