Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKD.45695593.9197.12080

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.12080 (renamed file extension from 12080 to exe)
Analysis ID:356835
MD5:bb663ffdda23f4277af1d261ac43a88e
SHA1:8f4e7653ba71af974226415ed512f44a6168abcc
SHA256:145539dcc07505d1a41913332a55d78398f93c35d7332346e6a58c2006a79714
Infos:

Most interesting Screenshot:

Detection

Raccoon
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 472JoeSecurity_RaccoonYara detected Raccoon StealerJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMetadefender: Detection: 29%Perma Link
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeReversingLabs: Detection: 89%
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 472, type: MEMORY
    Machine Learning detection for sampleShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A1F6 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,LocalAlloc,BCryptDecrypt,BCryptCloseAlgorithmProvider,BCryptDestroyKey,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004245C3 CryptAcquireContextA,CryptCreateHash,lstrlenW,CryptHashData,CryptGetHashParam,wsprintfW,lstrcatW,wsprintfW,lstrcatW,CryptDestroyHash,CryptReleaseContext,lstrlenW,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00424796 lstrlenW,lstrlenW,lstrlenW,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A7BA GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040C9A1 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,

    Compliance:

    barindex
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack
    Uses 32bit PE filesShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    Uses new MSVCR DllsShow sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Uses secure TLS version for HTTPS connectionsShow sources
    Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.4:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.4:49728 version: TLS 1.2
    Binary contains paths to debug symbolsShow sources
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdb~p source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdbN source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdbbp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb2 source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: schannel.pdb, source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb4 source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbdp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbhp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdbpp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: Joe Sandbox ViewIP Address: 195.201.225.248 195.201.225.248
    Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
    Source: unknownDNS traffic detected: queries for: telete.in
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.4:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.4:49728 version: TLS 1.2
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004266C0 GdiplusStartup,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,_mbstowcs,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,

    E-Banking Fraud:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 472, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042693B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00414B7F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045A249
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0044824A
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0044A210
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045A369
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0041A4E6
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004644EB
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004144A8
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042865E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004187C0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A7BA
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00412930
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043C990
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040C9A1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00436ACF
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00442BF0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 004102CD appears 47 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 0043FC0D appears 47 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 0044EE89 appears 33 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 004677E0 appears 74 times
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 684
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.675310906.0000000004170000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.675301791.0000000004160000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.675152667.00000000040A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal76.troj.evad.winEXE@2/4@2/3
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00438121 CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,OpenProcessToken,DuplicateTokenEx,CloseHandle,GetModuleFileNameA,_strlen,_mbstowcs,CreateProcessWithTokenW,CloseHandle,Process32NextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043483A CoCreateInstance,
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess472
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMutant created: \Sessions\1\BaseNamedObjects\uiabfqwfuuser
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER4564.tmpJump to behavior
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMetadefender: Detection: 29%
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeReversingLabs: Detection: 89%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe'
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 684
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdb~p source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdbN source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdbbp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: winnsi.pdb2 source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: schannel.pdb, source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb4 source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdbdp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbhp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: bcrypt.pdbpp source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000005.00000003.660730906.00000000055D2000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.660800358.00000000055D0000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.660759508.0000000005441000.00000004.00000001.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000005.00000003.660811839.00000000055D9000.00000004.00000040.sdmp

    Data Obfuscation:

    barindex
    Detected unpacking (changes PE section rights)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004400B4 push ecx; ret
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76039382624
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe TID: 3436Thread sleep time: -30000s >= -30000s
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00436ACF _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: WerFault.exe, 00000005.00000002.672972673.0000000005240000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: WerFault.exe, 00000005.00000002.672718308.0000000004F40000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
    Source: WerFault.exe, 00000005.00000002.672972673.0000000005240000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: WerFault.exe, 00000005.00000002.672972673.0000000005240000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: WerFault.exe, 00000005.00000002.672972673.0000000005240000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045C2E6 IsDebuggerPresent,OutputDebugStringW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00446991 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A3FB GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004402A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004463B5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00440406 SetUnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004405C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004400C8 cpuid
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00440470 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042693B CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004364C1 GetTimeZoneInformation,std::ios_base::_Ios_base_dtor,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 472, type: MEMORY

    Remote Access Functionality:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 472, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsNative API1Path InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSystem Time Discovery2Remote ServicesScreen Capture1Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing22LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery25Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe32%MetadefenderBrowse
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe90%ReversingLabsWin32.Trojan.Azorult
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe100%Joe Sandbox ML

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack100%AviraHEUR/AGEN.1137972Download File
    5.2.WerFault.exe.5530000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    yearofthepig.top
    172.67.199.58
    truefalse
      unknown
      telete.in
      195.201.225.248
      truefalse
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        195.201.225.248
        unknownGermany
        24940HETZNER-ASDEfalse
        172.67.199.58
        unknownUnited States
        13335CLOUDFLARENETUSfalse

        Private

        IP
        192.168.2.1

        General Information

        Joe Sandbox Version:31.0.0 Emerald
        Analysis ID:356835
        Start date:23.02.2021
        Start time:17:35:11
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 42s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.12080 (renamed file extension from 12080 to exe)
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@2/4@2/3
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 51.104.139.180, 104.42.151.234, 204.79.197.200, 13.107.21.200, 40.88.32.150, 13.64.90.137, 23.211.6.115, 104.43.193.48, 168.61.161.212, 52.255.188.83, 52.155.217.156, 20.54.26.129, 8.253.207.120, 8.248.97.254, 8.238.85.126, 8.241.80.126, 8.248.115.254, 67.26.75.254, 8.248.117.254, 8.248.145.254, 8.248.139.254, 8.248.125.254, 51.11.168.160, 92.122.213.194, 92.122.213.247
        • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/356835/sample/SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe

        Simulations

        Behavior and APIs

        TimeTypeDescription
        17:36:00API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe modified
        17:36:10API Interceptor1x Sleep call for process: WerFault.exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        195.201.225.248http://telete.inGet hashmaliciousBrowse
        • telete.in/
        172.67.199.581vuet1S3tI.exeGet hashmaliciousBrowse
          SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
            SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                yearofthepig.top1vuet1S3tI.exeGet hashmaliciousBrowse
                • 172.67.199.58
                seed.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 172.67.199.58
                SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 104.21.50.15
                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                • 104.21.50.15
                telete.inseed.exeGet hashmaliciousBrowse
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 195.201.225.248
                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                • 195.201.225.248
                A6Qom7We0l.exeGet hashmaliciousBrowse
                • 195.201.225.248
                BHuuI8LETf.exeGet hashmaliciousBrowse
                • 195.201.225.248
                m1hholPLan.exeGet hashmaliciousBrowse
                • 195.201.225.248
                nyDyMJGKWD.exeGet hashmaliciousBrowse
                • 195.201.225.248
                HA2a7FagC6.exeGet hashmaliciousBrowse
                • 195.201.225.248
                MakYpSHZKE.exeGet hashmaliciousBrowse
                • 195.201.225.248
                HDMInstaller.exeGet hashmaliciousBrowse
                • 195.201.225.248
                helper.exeGet hashmaliciousBrowse
                • 195.201.225.248
                tyxCV1ouryr7.exeGet hashmaliciousBrowse
                • 195.201.225.248
                e7zQwqIDCO.exeGet hashmaliciousBrowse
                • 195.201.225.248
                RddH6rLRfH.exeGet hashmaliciousBrowse
                • 195.201.225.248
                4PDNbYK5fj.exeGet hashmaliciousBrowse
                • 195.201.225.248
                pmTdQ57tvM.exeGet hashmaliciousBrowse
                • 195.201.225.248
                7BtV39hziI.exeGet hashmaliciousBrowse
                • 195.201.225.248
                dc4AaqW6Aa.exeGet hashmaliciousBrowse
                • 195.201.225.248
                lAy87VNPiL.exeGet hashmaliciousBrowse
                • 195.201.225.248

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                HETZNER-ASDESecuriteInfo.com.Trojan.Siggen12.2497.1023.exeGet hashmaliciousBrowse
                • 88.99.66.31
                1vuet1S3tI.exeGet hashmaliciousBrowse
                • 88.99.66.31
                MV9tCJw8Xr.exeGet hashmaliciousBrowse
                • 195.201.56.70
                seed.exeGet hashmaliciousBrowse
                • 88.99.66.31
                SecuriteInfo.com.Variant.Zusy.368685.25375.exeGet hashmaliciousBrowse
                • 88.99.66.31
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 95.216.186.40
                SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
                • 88.99.66.31
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 195.201.225.248
                SecuriteInfo.com.Variant.Zusy.368685.25618.exeGet hashmaliciousBrowse
                • 88.99.66.31
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 95.216.186.40
                SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
                • 95.216.186.40
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 195.201.225.248
                8WjU4jrBIr.exeGet hashmaliciousBrowse
                • 94.130.165.85
                Quotation-Project at Hor Al Anz CAIRO_012245666.pdf.exeGet hashmaliciousBrowse
                • 188.40.67.173
                8TD8GfTtaW.exeGet hashmaliciousBrowse
                • 88.99.66.31
                Order_20180218001.exeGet hashmaliciousBrowse
                • 135.181.57.206
                unmapped_executable_of_polyglot_duke.dllGet hashmaliciousBrowse
                • 5.9.110.84
                DHL eInvoice_Pdf.exeGet hashmaliciousBrowse
                • 195.201.179.80
                Subconract 504.xlsmGet hashmaliciousBrowse
                • 95.216.245.130
                ydQ0ICWj5v.exeGet hashmaliciousBrowse
                • 88.99.66.31
                CLOUDFLARENETUSSecuriteInfo.com.Trojan.Siggen12.2497.1023.exeGet hashmaliciousBrowse
                • 104.23.98.190
                1vuet1S3tI.exeGet hashmaliciousBrowse
                • 172.67.199.58
                P00760000.exeGet hashmaliciousBrowse
                • 104.21.19.200
                Order.docGet hashmaliciousBrowse
                • 104.21.19.200
                QUOTE.docGet hashmaliciousBrowse
                • 104.21.19.200
                Shipment Notification 6368638172.pdf.exeGet hashmaliciousBrowse
                • 172.67.188.154
                2070121_SN-WS.exeGet hashmaliciousBrowse
                • 104.21.71.230
                purchase order.exeGet hashmaliciousBrowse
                • 104.21.19.200
                9073782912,pdf.exeGet hashmaliciousBrowse
                • 104.21.19.200
                payment_advice.docGet hashmaliciousBrowse
                • 172.67.172.17
                IMG_57109_Scanned.docGet hashmaliciousBrowse
                • 172.67.188.154
                Purchase Order.exeGet hashmaliciousBrowse
                • 104.21.19.200
                dot crypted.exeGet hashmaliciousBrowse
                • 104.21.19.200
                New Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
                • 172.67.172.17
                CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                • 172.67.172.17
                Purchase Order list.exeGet hashmaliciousBrowse
                • 104.21.23.61
                RkoKlvuLh6.exeGet hashmaliciousBrowse
                • 162.159.136.232
                i0fOtOV8v0.exeGet hashmaliciousBrowse
                • 104.23.99.190
                P3knxzE7wN.exeGet hashmaliciousBrowse
                • 162.159.128.233
                zLyXzE7WZi.exeGet hashmaliciousBrowse
                • 162.159.138.232

                JA3 Fingerprints

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                ce5f3254611a8c095a3d821d44539877SHIPPING-DOCUMENT.docxGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                svhost.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                proposal.xlsmGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                rieuro.dllGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                ydQ0ICWj5v.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                r4yGYPyWb7.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                aif9fEvN5g.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                bZ9avvcHvE.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                proposal.xlsmGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                CmJ6qDTzvM.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                124992436.docxGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                RRLrVfeAXb.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                m3eJIFyc68.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248
                AswpCUetE0.docGet hashmaliciousBrowse
                • 172.67.199.58
                • 195.201.225.248

                Dropped Files

                No context

                Created / dropped Files

                C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_SecuriteInfo.com_fa89342e16e181a3dbd56be6cbf2ebfd3176a8_1217e092_1aaf5f93\Report.wer
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                Category:dropped
                Size (bytes):13626
                Entropy (8bit):3.7756019665944156
                Encrypted:false
                SSDEEP:192:ETk4aVDnmHHnh+MjIgKUzn/u7sdS274ItUPi:q+V7Inh+Mjz/u7sdX4ItUPi
                MD5:F5D14946B3EE1D39197F25B5A8B38B27
                SHA1:35C0A2ECFFE2A055BB32B394E9AE17525D9D4DBD
                SHA-256:FBFAEA42F92E97D98F30244D2221A2D86D4BB494B10E96BA3ED485ECC9F3ED75
                SHA-512:C0C544E2CA8757D7A5D235C9211AD358E86AA955387AAFCE1E89028E4D1BEC9FA818E905BF2A22CA028584C211C666BC9EE6D095C17850396671C34B90549EEC
                Malicious:false
                Reputation:low
                Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.5.7.1.7.6.3.8.8.1.5.7.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.8.5.7.1.7.6.8.8.8.1.5.5.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.c.6.9.7.7.4.6.-.1.0.7.8.-.4.6.5.7.-.a.6.5.4.-.8.6.6.7.3.e.e.7.0.e.1.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.b.6.b.a.6.6.-.0.5.1.2.-.4.b.3.1.-.8.8.e.5.-.3.0.3.e.0.3.8.5.8.8.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D...4.5.6.9.5.5.9.3...9.1.9.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.d.8.-.0.0.0.1.-.0.0.1.b.-.f.3.2.5.-.a.e.f.6.0.1.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.c.5.f.c.b.1.b.a.f.0.5.8.f.4.3.2.9.f.e.2.0.1.0.c.d.d.0.9.1.b.7.0.0.0.0.0.9.0.4.!.0.0.0.0.8.f.4.e.7.6.5.3.b.a.7.1.a.f.9.7.4.2.2.6.4.1.5.e.d.5.
                C:\ProgramData\Microsoft\Windows\WER\Temp\WER4564.tmp.dmp
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Tue Feb 23 16:36:05 2021, 0x1205a4 type
                Category:dropped
                Size (bytes):99638
                Entropy (8bit):2.2152406060018883
                Encrypted:false
                SSDEEP:384:+1bBpyQl5ozXTfPFmiiHFwU2W8wIDzPrETbXPEztsLH+JXMRwBocodfXY7Hcts+r:+tl5ozXTkiiHKU2W8BzP07fg7H2rr
                MD5:25B92DC24BC6C96C0883762252AE46BA
                SHA1:34C67117971A84920E753455B78309E764C8BDFA
                SHA-256:6C340216EAED6E06362B5CC108A4EC98318EB39BDCA4724B988F05F2C70AAEC7
                SHA-512:78E92EBD8C00033AAFD7EDBADCC81A4E148B9EADE97E2F670ED4658116E8F5A32C26DC74714467B1202D64125C8E08B82457BF984E5A2E0F34337F79C9FBF8F1
                Malicious:false
                Reputation:low
                Preview: MDMP....... .........5`...................U...........B......\#......GenuineIntelW...........T.............5`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D35.tmp.WERInternalMetadata.xml
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                Category:dropped
                Size (bytes):8468
                Entropy (8bit):3.7053421713288905
                Encrypted:false
                SSDEEP:192:Rrl7r3GLNibi6nTS6YrJSUUObtgDgGgmfs4N8Sk+pD989bMBSOsf1Em:RrlsNiu6nm6YFSUUObQgmfs4ySaMWfj
                MD5:A22EA84E8A89107C7B24C32B98F15AE7
                SHA1:B40042CAB99EE07F1CA3D3953A06894DBDBB61F2
                SHA-256:CB1831E0435F4570F68455571D762741C3D93FDAA1387BC20BA40C8AF9355D52
                SHA-512:DD8D7716410E1DB608FB57D1481337536E3C24613DEBAE7460A449901B4F08EAA269FBF1F8D5D1107794553544DCC1EDB1CF816EEF65712DEAB66710531C6728
                Malicious:false
                Reputation:low
                Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.2.<./.P.i.d.>.........
                C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F2A.tmp.xml
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4759
                Entropy (8bit):4.566463537716662
                Encrypted:false
                SSDEEP:48:cvIwSD8zs+JgtWI9ykjWSC8Bv8fm8M4J3CIPFn+q8axSUt7y1YrYsd:uITf0MSSNSJ/rtyq8sd
                MD5:B37EEB0EDF38004D8731941C057742B8
                SHA1:A299CD2EDCBA078D97F0D7BA0C0419EAE29EE070
                SHA-256:6D3DCD2EB90FC9591A2527F3A15B86921CAB5FC7EEA966587AD0A63F4F6F2DB2
                SHA-512:5346D0ACB8883CFAC3B079550D806802CC1F00DE068A10D1B1BCD6AFB8E6F7E87A478AA415480BA1B7493EF2EFC79E694E127FE392EAB0D43B8BD133A7A74D34
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.5802607551094
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
                File size:536576
                MD5:bb663ffdda23f4277af1d261ac43a88e
                SHA1:8f4e7653ba71af974226415ed512f44a6168abcc
                SHA256:145539dcc07505d1a41913332a55d78398f93c35d7332346e6a58c2006a79714
                SHA512:65ddb7db4a0a2b6c37a56cc292113573d111088ba6919a6f70976f00fd23ba95fbf46fd146a6ddb9cc874075446c63cfdf43338ca2ff238514df9ca38a6e3867
                SSDEEP:12288:QQn7dXPlGbOW3se6+Aq9XnHgVRGwwoYtrKXf1gxF7Alq:QQ7HGbP3s63DV/tUgxelq
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................U.......`.......a.......X...............d.......P.......Q.......V.....Rich............................PE..L..

                File Icon

                Icon Hash:96b0c444ecbae2e6

                Static PE Info

                General

                Entrypoint:0x403ad0
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                Time Stamp:0x5D580EA3 [Sat Aug 17 14:26:43 2019 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:a6e2c959b82a7e7f36f0071d2cdb1c19

                Entrypoint Preview

                Instruction
                mov edi, edi
                push ebp
                mov ebp, esp
                call 00007F7184EA9F4Bh
                call 00007F7184EA1996h
                pop ebp
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                mov edi, edi
                push ebp
                mov ebp, esp
                push FFFFFFFEh
                push 0047DF70h
                push 00407040h
                mov eax, dword ptr fs:[00000000h]
                push eax
                add esp, FFFFFF98h
                push ebx
                push esi
                push edi
                mov eax, dword ptr [00480090h]
                xor dword ptr [ebp-08h], eax
                xor eax, ebp
                push eax
                lea eax, dword ptr [ebp-10h]
                mov dword ptr fs:[00000000h], eax
                mov dword ptr [ebp-18h], esp
                mov dword ptr [ebp-70h], 00000000h
                lea eax, dword ptr [ebp-60h]
                push eax
                call dword ptr [004760ACh]
                cmp dword ptr [0227076Ch], 00000000h
                jne 00007F7184EA1990h
                push 00000000h
                push 00000000h
                push 00000001h
                push 00000000h
                call dword ptr [004760A8h]
                call 00007F7184EA1B13h
                mov dword ptr [ebp-6Ch], eax
                call 00007F7184EABB7Bh
                test eax, eax
                jne 00007F7184EA198Ch
                push 0000001Ch
                call 00007F7184EA1AD0h
                add esp, 04h
                call 00007F7184EAB4D8h
                test eax, eax
                jne 00007F7184EA198Ch
                push 00000010h
                call 00007F7184EA1ABDh
                add esp, 04h
                push 00000001h
                call 00007F7184EA8F63h
                add esp, 04h
                call 00007F7184EAB3EBh
                mov dword ptr [ebp-04h], 00000000h
                call 00007F7184EAAFCFh
                test eax, eax

                Rich Headers

                Programming Language:
                • [LNK] VS2010 build 30319
                • [ASM] VS2010 build 30319
                • [ C ] VS2010 build 30319
                • [C++] VS2010 build 30319
                • [EXP] VS2010 build 30319
                • [RES] VS2010 build 30319
                • [IMP] VS2008 SP1 build 30729

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x7f3700x53.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x7e9a80x50.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e720000x1fa8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7dbb80x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x760000x1a4.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x74db10x74e00False0.833246991979data7.76039382624IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x760000x93c30x9400False0.2763671875data4.51893730397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x800000x1df17700x2a00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x1e720000x1fa80x2000False0.73779296875data6.40095282491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                LUBECIYIKORUPEHELIDATINAJ0x1e732300xbf7ASCII text, with very long lines, with no line terminatorsUzbekCyrillic
                RT_ICON0x1e721700x10a8dataVietnameseVietnam
                RT_GROUP_ICON0x1e732180x14dataVietnameseVietnam
                RT_VERSION0x1e73e280x180dataUzbekCyrillic

                Imports

                DLLImport
                KERNEL32.dllGetModuleHandleExA, FindResourceExW, FindResourceW, MapUserPhysicalPages, FreeLibrary, LoadResource, SetConsoleTextAttribute, GetCurrentProcess, ScrollConsoleScreenBufferW, SetEnvironmentVariableW, SetHandleInformation, GetTimeFormatA, GetTickCount, FindNextVolumeMountPointA, GetLocaleInfoW, SetSystemTimeAdjustment, lstrlenA, GetExitCodeProcess, ExitThread, GetConsoleAliasesW, BeginUpdateResourceW, EnumDateFormatsExA, CreateTimerQueueTimer, LocalAlloc, GetProfileStringA, SetProcessWorkingSetSize, SetConsoleCursorInfo, VirtualProtect, GetFileAttributesExW, ReleaseMutex, lstrcpyW, HeapCreate, GlobalFix, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetModuleFileNameW, RaiseException, EncodePointer, DecodePointer, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, HeapValidate, IsBadReadPtr, QueryPerformanceCounter, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, GetProcAddress, GetModuleHandleW, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetLastError, WriteFile, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, LoadLibraryW, SetFilePointer, GetConsoleCP, GetConsoleMode, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, RtlUnwind, MultiByteToWideChar, HeapAlloc, HeapReAlloc, HeapSize, HeapQueryInformation, HeapFree, SetStdHandle, GetStringTypeW, LCMapStringW, FlushFileBuffers, ReadFile, CreateFileW, CloseHandle
                USER32.dllGetDesktopWindow
                ADVAPI32.dllOpenSCManagerA

                Exports

                NameOrdinalAddress
                Gun10x475380
                Smoke20x475390

                Version Infos

                DescriptionData
                FileVersions7.0.0.15
                LegalCopyrightsWsegd
                ProductVersions67.0.20.5
                Translation0x0409 0x086f

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                UzbekCyrillic
                VietnameseVietnam

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Feb 23, 2021 17:35:59.152193069 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.219677925 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.219785929 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.222937107 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.290201902 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.294521093 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.294572115 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.294594049 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.294688940 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.300297022 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.368562937 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.433873892 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.543055058 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.545188904 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.545228958 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.545254946 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.545278072 CET44349727195.201.225.248192.168.2.4
                Feb 23, 2021 17:35:59.545331001 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.545384884 CET49727443192.168.2.4195.201.225.248
                Feb 23, 2021 17:35:59.731317997 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.793131113 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.793287992 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.793965101 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.855645895 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.860349894 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.860382080 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.860399008 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.860470057 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.868735075 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.933478117 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.933506966 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:35:59.939737082 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:35:59.939795017 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:36:00.001507998 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:36:00.001533031 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:36:00.540595055 CET44349728172.67.199.58192.168.2.4
                Feb 23, 2021 17:36:00.681730986 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:36:14.428153038 CET49728443192.168.2.4172.67.199.58
                Feb 23, 2021 17:36:14.428603888 CET49727443192.168.2.4195.201.225.248

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Feb 23, 2021 17:35:50.142370939 CET5372353192.168.2.48.8.8.8
                Feb 23, 2021 17:35:50.191144943 CET53537238.8.8.8192.168.2.4
                Feb 23, 2021 17:35:50.193095922 CET6464653192.168.2.48.8.8.8
                Feb 23, 2021 17:35:50.241734982 CET53646468.8.8.8192.168.2.4
                Feb 23, 2021 17:35:50.254102945 CET6529853192.168.2.48.8.8.8
                Feb 23, 2021 17:35:50.303050041 CET53652988.8.8.8192.168.2.4
                Feb 23, 2021 17:35:51.417978048 CET5912353192.168.2.48.8.8.8
                Feb 23, 2021 17:35:51.466639042 CET53591238.8.8.8192.168.2.4
                Feb 23, 2021 17:35:52.583728075 CET5453153192.168.2.48.8.8.8
                Feb 23, 2021 17:35:52.635212898 CET53545318.8.8.8192.168.2.4
                Feb 23, 2021 17:35:53.555807114 CET4971453192.168.2.48.8.8.8
                Feb 23, 2021 17:35:53.604379892 CET53497148.8.8.8192.168.2.4
                Feb 23, 2021 17:35:54.248496056 CET5802853192.168.2.48.8.8.8
                Feb 23, 2021 17:35:54.306917906 CET53580288.8.8.8192.168.2.4
                Feb 23, 2021 17:35:55.265141964 CET5309753192.168.2.48.8.8.8
                Feb 23, 2021 17:35:55.330346107 CET53530978.8.8.8192.168.2.4
                Feb 23, 2021 17:35:56.529586077 CET4925753192.168.2.48.8.8.8
                Feb 23, 2021 17:35:56.578253031 CET53492578.8.8.8192.168.2.4
                Feb 23, 2021 17:35:57.824987888 CET6238953192.168.2.48.8.8.8
                Feb 23, 2021 17:35:57.876635075 CET53623898.8.8.8192.168.2.4
                Feb 23, 2021 17:35:58.922497034 CET4991053192.168.2.48.8.8.8
                Feb 23, 2021 17:35:58.971787930 CET53499108.8.8.8192.168.2.4
                Feb 23, 2021 17:35:59.081043959 CET5585453192.168.2.48.8.8.8
                Feb 23, 2021 17:35:59.141963005 CET53558548.8.8.8192.168.2.4
                Feb 23, 2021 17:35:59.569375992 CET6454953192.168.2.48.8.8.8
                Feb 23, 2021 17:35:59.729662895 CET53645498.8.8.8192.168.2.4
                Feb 23, 2021 17:36:00.167732954 CET6315353192.168.2.48.8.8.8
                Feb 23, 2021 17:36:00.230173111 CET53631538.8.8.8192.168.2.4
                Feb 23, 2021 17:36:01.217159986 CET5299153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:01.267622948 CET53529918.8.8.8192.168.2.4
                Feb 23, 2021 17:36:02.294167995 CET5370053192.168.2.48.8.8.8
                Feb 23, 2021 17:36:02.345812082 CET53537008.8.8.8192.168.2.4
                Feb 23, 2021 17:36:03.297039032 CET5172653192.168.2.48.8.8.8
                Feb 23, 2021 17:36:03.359441042 CET53517268.8.8.8192.168.2.4
                Feb 23, 2021 17:36:04.700814962 CET5679453192.168.2.48.8.8.8
                Feb 23, 2021 17:36:04.751020908 CET53567948.8.8.8192.168.2.4
                Feb 23, 2021 17:36:05.930583000 CET5653453192.168.2.48.8.8.8
                Feb 23, 2021 17:36:05.980983019 CET53565348.8.8.8192.168.2.4
                Feb 23, 2021 17:36:06.987103939 CET5662753192.168.2.48.8.8.8
                Feb 23, 2021 17:36:07.039613008 CET53566278.8.8.8192.168.2.4
                Feb 23, 2021 17:36:07.953614950 CET5662153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:08.002338886 CET53566218.8.8.8192.168.2.4
                Feb 23, 2021 17:36:09.216990948 CET6311653192.168.2.48.8.8.8
                Feb 23, 2021 17:36:09.265636921 CET53631168.8.8.8192.168.2.4
                Feb 23, 2021 17:36:09.464217901 CET6407853192.168.2.48.8.8.8
                Feb 23, 2021 17:36:09.515743971 CET53640788.8.8.8192.168.2.4
                Feb 23, 2021 17:36:10.029354095 CET6480153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:10.077980042 CET53648018.8.8.8192.168.2.4
                Feb 23, 2021 17:36:10.838110924 CET6172153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:10.886897087 CET53617218.8.8.8192.168.2.4
                Feb 23, 2021 17:36:11.831538916 CET5125553192.168.2.48.8.8.8
                Feb 23, 2021 17:36:11.882992029 CET53512558.8.8.8192.168.2.4
                Feb 23, 2021 17:36:24.557053089 CET6152253192.168.2.48.8.8.8
                Feb 23, 2021 17:36:24.608747005 CET53615228.8.8.8192.168.2.4
                Feb 23, 2021 17:36:43.502980947 CET5233753192.168.2.48.8.8.8
                Feb 23, 2021 17:36:43.563374043 CET53523378.8.8.8192.168.2.4
                Feb 23, 2021 17:36:44.194610119 CET5504653192.168.2.48.8.8.8
                Feb 23, 2021 17:36:44.251579046 CET53550468.8.8.8192.168.2.4
                Feb 23, 2021 17:36:44.846225977 CET4961253192.168.2.48.8.8.8
                Feb 23, 2021 17:36:44.894910097 CET53496128.8.8.8192.168.2.4
                Feb 23, 2021 17:36:45.288297892 CET4928553192.168.2.48.8.8.8
                Feb 23, 2021 17:36:45.329940081 CET5060153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:45.363141060 CET53492858.8.8.8192.168.2.4
                Feb 23, 2021 17:36:45.378593922 CET53506018.8.8.8192.168.2.4
                Feb 23, 2021 17:36:45.909044981 CET6087553192.168.2.48.8.8.8
                Feb 23, 2021 17:36:45.957825899 CET53608758.8.8.8192.168.2.4
                Feb 23, 2021 17:36:46.003303051 CET5644853192.168.2.48.8.8.8
                Feb 23, 2021 17:36:46.063088894 CET53564488.8.8.8192.168.2.4
                Feb 23, 2021 17:36:46.165009022 CET5917253192.168.2.48.8.8.8
                Feb 23, 2021 17:36:46.214962006 CET53591728.8.8.8192.168.2.4
                Feb 23, 2021 17:36:46.514513016 CET6242053192.168.2.48.8.8.8
                Feb 23, 2021 17:36:46.573153973 CET53624208.8.8.8192.168.2.4
                Feb 23, 2021 17:36:47.273731947 CET6057953192.168.2.48.8.8.8
                Feb 23, 2021 17:36:47.330841064 CET53605798.8.8.8192.168.2.4
                Feb 23, 2021 17:36:48.483212948 CET5018353192.168.2.48.8.8.8
                Feb 23, 2021 17:36:48.533288956 CET53501838.8.8.8192.168.2.4
                Feb 23, 2021 17:36:49.931404114 CET6153153192.168.2.48.8.8.8
                Feb 23, 2021 17:36:50.008192062 CET53615318.8.8.8192.168.2.4
                Feb 23, 2021 17:36:50.556224108 CET4922853192.168.2.48.8.8.8
                Feb 23, 2021 17:36:50.613634109 CET53492288.8.8.8192.168.2.4
                Feb 23, 2021 17:36:59.146141052 CET5979453192.168.2.48.8.8.8
                Feb 23, 2021 17:36:59.196616888 CET53597948.8.8.8192.168.2.4
                Feb 23, 2021 17:36:59.360702991 CET5591653192.168.2.48.8.8.8
                Feb 23, 2021 17:36:59.427586079 CET53559168.8.8.8192.168.2.4
                Feb 23, 2021 17:37:04.820287943 CET5275253192.168.2.48.8.8.8
                Feb 23, 2021 17:37:04.890420914 CET53527528.8.8.8192.168.2.4
                Feb 23, 2021 17:37:33.320606947 CET6054253192.168.2.48.8.8.8
                Feb 23, 2021 17:37:33.370970964 CET53605428.8.8.8192.168.2.4
                Feb 23, 2021 17:37:35.547257900 CET6068953192.168.2.48.8.8.8
                Feb 23, 2021 17:37:35.609510899 CET53606898.8.8.8192.168.2.4

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Feb 23, 2021 17:35:59.081043959 CET192.168.2.48.8.8.80x2d73Standard query (0)telete.inA (IP address)IN (0x0001)
                Feb 23, 2021 17:35:59.569375992 CET192.168.2.48.8.8.80x6527Standard query (0)yearofthepig.topA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Feb 23, 2021 17:35:59.141963005 CET8.8.8.8192.168.2.40x2d73No error (0)telete.in195.201.225.248A (IP address)IN (0x0001)
                Feb 23, 2021 17:35:59.729662895 CET8.8.8.8192.168.2.40x6527No error (0)yearofthepig.top172.67.199.58A (IP address)IN (0x0001)
                Feb 23, 2021 17:35:59.729662895 CET8.8.8.8192.168.2.40x6527No error (0)yearofthepig.top104.21.50.15A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Feb 23, 2021 17:35:59.294572115 CET195.201.225.248443192.168.2.449727CN=telecut.in CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Wed Feb 17 11:17:19 CET 2021 Wed Oct 07 21:21:40 CEST 2020Tue May 18 12:17:19 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                Feb 23, 2021 17:35:59.860382080 CET172.67.199.58443192.168.2.449728CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Feb 11 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Feb 11 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:17:35:58
                Start date:23/02/2021
                Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe'
                Imagebase:0x400000
                File size:536576 bytes
                MD5 hash:BB663FFDDA23F4277AF1D261AC43A88E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:17:36:02
                Start date:23/02/2021
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 684
                Imagebase:0x3f0000
                File size:434592 bytes
                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >