Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
Analysis ID:356835
MD5:bb663ffdda23f4277af1d261ac43a88e
SHA1:8f4e7653ba71af974226415ed512f44a6168abcc
SHA256:145539dcc07505d1a41913332a55d78398f93c35d7332346e6a58c2006a79714
Infos:

Most interesting Screenshot:

Detection

Raccoon
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Contains functionality to steal Internet Explorer form passwords
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 488JoeSecurity_RaccoonYara detected Raccoon StealerJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for domain / URLShow sources
    Source: yearofthepig.topVirustotal: Detection: 7%Perma Link
    Source: telete.inVirustotal: Detection: 8%Perma Link
    Multi AV Scanner detection for submitted fileShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeVirustotal: Detection: 74%Perma Link
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMetadefender: Detection: 29%Perma Link
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeReversingLabs: Detection: 89%
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 488, type: MEMORY
    Machine Learning detection for sampleShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A1F6 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,LocalAlloc,BCryptDecrypt,BCryptCloseAlgorithmProvider,BCryptDestroyKey,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004245C3 CryptAcquireContextA,CryptCreateHash,lstrlenW,CryptHashData,CryptGetHashParam,wsprintfW,lstrcatW,wsprintfW,lstrcatW,CryptDestroyHash,CryptReleaseContext,lstrlenW,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00424796 lstrlenW,lstrlenW,lstrlenW,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A7BA GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040C9A1 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040AEC3 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,LocalFree,

    Compliance:

    barindex
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack
    Uses 32bit PE filesShow sources
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    Uses new MSVCR DllsShow sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Uses secure TLS version for HTTPS connectionsShow sources
    Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.5:49697 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.5:49699 version: TLS 1.2
    Binary contains paths to debug symbolsShow sources
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb|? source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: shcore.pdbb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wmswsock.pdbJ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wUxTheme.pdbP source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdbV source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdbn source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdbt source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb\ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: webio.pdbD source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb> source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: dnsapi.pdbj? source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: combase.pdbh source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbz source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00434FF1 GetLogicalDriveStringsA,
    Source: Joe Sandbox ViewIP Address: 195.201.225.248 195.201.225.248
    Source: Joe Sandbox ViewIP Address: 172.67.199.58 172.67.199.58
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
    Source: unknownDNS traffic detected: queries for: telete.in
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0Y
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://telete.in/jojmalbec
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260838180.0000000002520000.00000004.00000001.sdmpString found in binary or memory: https://telete.in/jojmalbecW
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://telete.in/org/img/t_logo.png
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://yearofthepig.top/
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://yearofthepig.top/A=
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://yearofthepig.top/error.php
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpString found in binary or memory: https://yearofthepig.top/x
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
    Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
    Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.5:49697 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.199.58:443 -> 192.168.2.5:49699 version: TLS 1.2
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004266C0 GdiplusStartup,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,_mbstowcs,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,

    E-Banking Fraud:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 488, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042693B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00414B7F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045A249
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0044824A
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0044A210
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045A369
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0041A4E6
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004644EB
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004144A8
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042865E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004187C0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A7BA
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00412930
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043C990
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040C9A1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00436ACF
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00442BF0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045CD9E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040AEC3
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0041AE8D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00419003
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 004102CD appears 56 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 0044EE89 appears 50 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 00440070 appears 32 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 0043FC0D appears 56 times
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: String function: 004677E0 appears 94 times
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 728
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261979576.0000000004020000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261967442.0000000004010000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261922673.0000000004000000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal88.troj.spyw.evad.winEXE@2/4@2/2
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00438121 CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,OpenProcessToken,DuplicateTokenEx,CloseHandle,GetModuleFileNameA,_strlen,_mbstowcs,CreateProcessWithTokenW,CloseHandle,Process32NextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043483A CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMutant created: \Sessions\1\BaseNamedObjects\uiabfqwfuuser
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess488
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER6833.tmpJump to behavior
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeVirustotal: Detection: 74%
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeMetadefender: Detection: 29%
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeReversingLabs: Detection: 89%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe'
    Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 728
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: winnsi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: mskeyprotect.pdb_ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcr100.i386.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: schannel.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb|? source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: shcore.pdbb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wmswsock.pdbJ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: userenv.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wUxTheme.pdbP source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ntasn1.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ktmw32.pdbV source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: shlwapi.pdbn source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: webio.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdbt source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ncryptsslp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: shell32.pdb\ source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: webio.pdbD source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: sechost.pdbk source: WerFault.exe, 00000004.00000003.245687051.0000000005232000.00000004.00000040.sdmp
    Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.245750481.0000000005230000.00000004.00000040.sdmp
    Source: Binary string: ws2_32.pdb> source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: ncrypt.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: dpapi.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.245714031.0000000005091000.00000004.00000001.sdmp
    Source: Binary string: dnsapi.pdbj? source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: combase.pdbh source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: fltLib.pdbz source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp
    Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.245759878.0000000005239000.00000004.00000040.sdmp

    Data Obfuscation:

    barindex
    Detected unpacking (changes PE section rights)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeUnpacked PE file: 0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004400B4 push ecx; ret
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76039382624
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0041AE8D SetCurrentDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe TID: 2336Thread sleep time: -30000s >= -30000s
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E217 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0043E387 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00434FF1 GetLogicalDriveStringsA,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00436ACF _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: WerFault.exe, 00000004.00000002.257640769.0000000004E90000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260838180.0000000002520000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW\
    Source: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260882651.000000000252F000.00000004.00000001.sdmp, WerFault.exe, 00000004.00000002.257609596.0000000004CAF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
    Source: WerFault.exe, 00000004.00000002.257640769.0000000004E90000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: WerFault.exe, 00000004.00000002.257640769.0000000004E90000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: WerFault.exe, 00000004.00000002.257640769.0000000004E90000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0045C2E6 IsDebuggerPresent,OutputDebugStringW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00446991 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0040A3FB GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004402A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004463B5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00440406 SetUnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004405C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004400C8 cpuid
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: _strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_00440470 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042693B CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,GetUserNameA,_strlen,_strlen,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_004364C1 GetTimeZoneInformation,std::ios_base::_Ios_base_dtor,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: 0_2_0042495F GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 488, type: MEMORY
    Contains functionality to steal Internet Explorer form passwordsShow sources
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeCode function: Software\Microsoft\Internet Explorer\IntelliForms\Storage2

    Remote Access Functionality:

    barindex
    Yara detected Raccoon StealerShow sources
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe PID: 488, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsNative API1Application Shimming1Process Injection1Virtualization/Sandbox Evasion1OS Credential Dumping1System Time Discovery2Remote ServicesScreen Capture1Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsApplication Shimming1Process Injection1Credentials In Files1Security Software Discovery21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing22LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery25Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe75%VirustotalBrowse
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe32%MetadefenderBrowse
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe90%ReversingLabsWin32.Trojan.Azorult
    SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe100%Joe Sandbox ML

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    0.2.SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe.400000.0.unpack100%AviraHEUR/AGEN.1137972Download File
    4.2.WerFault.exe.5180000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File

    Domains

    SourceDetectionScannerLabelLink
    yearofthepig.top7%VirustotalBrowse
    telete.in8%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://r3.o.lencr.org00%URL Reputationsafe
    http://r3.o.lencr.org00%URL Reputationsafe
    http://r3.o.lencr.org00%URL Reputationsafe
    http://r3.o.lencr.org00%URL Reputationsafe
    https://yearofthepig.top/A=0%Avira URL Cloudsafe
    https://telete.in/jojmalbecW0%Avira URL Cloudsafe
    https://telete.in/org/img/t_logo.png0%URL Reputationsafe
    https://telete.in/org/img/t_logo.png0%URL Reputationsafe
    https://telete.in/org/img/t_logo.png0%URL Reputationsafe
    https://yearofthepig.top/x0%Avira URL Cloudsafe
    http://cps.letsencrypt.org00%URL Reputationsafe
    http://cps.letsencrypt.org00%URL Reputationsafe
    http://cps.letsencrypt.org00%URL Reputationsafe
    https://yearofthepig.top/0%Avira URL Cloudsafe
    https://telete.in/jojmalbec0%Avira URL Cloudsafe
    http://r3.i.lencr.org/0Y0%Avira URL Cloudsafe
    https://yearofthepig.top/error.php0%Avira URL Cloudsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    yearofthepig.top
    172.67.199.58
    truetrueunknown
    telete.in
    195.201.225.248
    truefalseunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://r3.o.lencr.org0SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://yearofthepig.top/A=SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://telete.in/jojmalbecWSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260838180.0000000002520000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://telete.in/org/img/t_logo.pngSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://yearofthepig.top/xSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://cps.letsencrypt.org0SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://yearofthepig.top/SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://telete.in/jojmalbecSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://r3.i.lencr.org/0YSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://yearofthepig.top/error.phpSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.261006956.000000000254F000.00000004.00000001.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://cps.root-x1.letsencrypt.org0SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe, 00000000.00000002.260697668.0000000002512000.00000004.00000001.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    195.201.225.248
    unknownGermany
    24940HETZNER-ASDEfalse
    172.67.199.58
    unknownUnited States
    13335CLOUDFLARENETUStrue

    General Information

    Joe Sandbox Version:31.0.0 Emerald
    Analysis ID:356835
    Start date:23.02.2021
    Start time:17:42:54
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 35s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal88.troj.spyw.evad.winEXE@2/4@2/2
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 104.42.151.234, 131.253.33.200, 13.107.22.200, 93.184.220.29, 40.88.32.150, 13.64.90.137, 52.147.198.201, 184.30.20.56, 93.184.221.240
    • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, skypedataprdcoleus15.cloudapp.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, wu.ec.azureedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    195.201.225.248http://telete.inGet hashmaliciousBrowse
    • telete.in/
    172.67.199.58SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeGet hashmaliciousBrowse
      1vuet1S3tI.exeGet hashmaliciousBrowse
        SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
          SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
            SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              yearofthepig.top1vuet1S3tI.exeGet hashmaliciousBrowse
              • 172.67.199.58
              seed.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 172.67.199.58
              SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 104.21.50.15
              SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
              • 104.21.50.15
              telete.inSecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeGet hashmaliciousBrowse
              • 195.201.225.248
              seed.exeGet hashmaliciousBrowse
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 195.201.225.248
              SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
              • 195.201.225.248
              A6Qom7We0l.exeGet hashmaliciousBrowse
              • 195.201.225.248
              BHuuI8LETf.exeGet hashmaliciousBrowse
              • 195.201.225.248
              m1hholPLan.exeGet hashmaliciousBrowse
              • 195.201.225.248
              nyDyMJGKWD.exeGet hashmaliciousBrowse
              • 195.201.225.248
              HA2a7FagC6.exeGet hashmaliciousBrowse
              • 195.201.225.248
              MakYpSHZKE.exeGet hashmaliciousBrowse
              • 195.201.225.248
              HDMInstaller.exeGet hashmaliciousBrowse
              • 195.201.225.248
              helper.exeGet hashmaliciousBrowse
              • 195.201.225.248
              tyxCV1ouryr7.exeGet hashmaliciousBrowse
              • 195.201.225.248
              e7zQwqIDCO.exeGet hashmaliciousBrowse
              • 195.201.225.248
              RddH6rLRfH.exeGet hashmaliciousBrowse
              • 195.201.225.248
              4PDNbYK5fj.exeGet hashmaliciousBrowse
              • 195.201.225.248
              pmTdQ57tvM.exeGet hashmaliciousBrowse
              • 195.201.225.248
              7BtV39hziI.exeGet hashmaliciousBrowse
              • 195.201.225.248
              dc4AaqW6Aa.exeGet hashmaliciousBrowse
              • 195.201.225.248

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              HETZNER-ASDESecuriteInfo.com.Trojan.GenericKD.45754886.17334.exeGet hashmaliciousBrowse
              • 88.99.193.240
              SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeGet hashmaliciousBrowse
              • 195.201.225.248
              SecuriteInfo.com.Trojan.Siggen12.2497.1023.exeGet hashmaliciousBrowse
              • 88.99.66.31
              1vuet1S3tI.exeGet hashmaliciousBrowse
              • 88.99.66.31
              MV9tCJw8Xr.exeGet hashmaliciousBrowse
              • 195.201.56.70
              seed.exeGet hashmaliciousBrowse
              • 88.99.66.31
              SecuriteInfo.com.Variant.Zusy.368685.25375.exeGet hashmaliciousBrowse
              • 88.99.66.31
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 95.216.186.40
              SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              • 88.99.66.31
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 195.201.225.248
              SecuriteInfo.com.Variant.Zusy.368685.25618.exeGet hashmaliciousBrowse
              • 88.99.66.31
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 95.216.186.40
              SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              • 95.216.186.40
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 195.201.225.248
              8WjU4jrBIr.exeGet hashmaliciousBrowse
              • 94.130.165.85
              Quotation-Project at Hor Al Anz CAIRO_012245666.pdf.exeGet hashmaliciousBrowse
              • 188.40.67.173
              8TD8GfTtaW.exeGet hashmaliciousBrowse
              • 88.99.66.31
              Order_20180218001.exeGet hashmaliciousBrowse
              • 135.181.57.206
              unmapped_executable_of_polyglot_duke.dllGet hashmaliciousBrowse
              • 5.9.110.84
              DHL eInvoice_Pdf.exeGet hashmaliciousBrowse
              • 195.201.179.80
              CLOUDFLARENETUSPO202100046.exeGet hashmaliciousBrowse
              • 172.67.188.154
              SecuriteInfo.com.Trojan.GenericKD.45754886.17334.exeGet hashmaliciousBrowse
              • 172.67.213.210
              SSGLPOJ6212202.exeGet hashmaliciousBrowse
              • 172.67.188.154
              ST_PLC URGENT ORDER 0223308737,pdf.exeGet hashmaliciousBrowse
              • 104.21.19.200
              SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeGet hashmaliciousBrowse
              • 172.67.199.58
              SecuriteInfo.com.Trojan.Siggen12.2497.1023.exeGet hashmaliciousBrowse
              • 104.23.98.190
              1vuet1S3tI.exeGet hashmaliciousBrowse
              • 172.67.199.58
              P00760000.exeGet hashmaliciousBrowse
              • 104.21.19.200
              Order.docGet hashmaliciousBrowse
              • 104.21.19.200
              QUOTE.docGet hashmaliciousBrowse
              • 104.21.19.200
              Shipment Notification 6368638172.pdf.exeGet hashmaliciousBrowse
              • 172.67.188.154
              2070121_SN-WS.exeGet hashmaliciousBrowse
              • 104.21.71.230
              purchase order.exeGet hashmaliciousBrowse
              • 104.21.19.200
              9073782912,pdf.exeGet hashmaliciousBrowse
              • 104.21.19.200
              payment_advice.docGet hashmaliciousBrowse
              • 172.67.172.17
              IMG_57109_Scanned.docGet hashmaliciousBrowse
              • 172.67.188.154
              Purchase Order.exeGet hashmaliciousBrowse
              • 104.21.19.200
              dot crypted.exeGet hashmaliciousBrowse
              • 104.21.19.200
              New Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
              • 172.67.172.17
              CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
              • 172.67.172.17

              JA3 Fingerprints

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SHIPPING-DOCUMENT.docxGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              svhost.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKDZ.73124.19170.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKDZ.73123.31244.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.Trojan.GenericKD.36273230.25906.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              proposal.xlsmGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              rieuro.dllGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              ydQ0ICWj5v.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              r4yGYPyWb7.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              aif9fEvN5g.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              bZ9avvcHvE.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              proposal.xlsmGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              CmJ6qDTzvM.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              124992436.docxGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              RRLrVfeAXb.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              m3eJIFyc68.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248
              SecuriteInfo.com.W32.AIDetectGBM.malware.02.16429.exeGet hashmaliciousBrowse
              • 172.67.199.58
              • 195.201.225.248

              Dropped Files

              No context

              Created / dropped Files

              C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_SecuriteInfo.com_fa89342e16e181a3dbd56be6cbf2ebfd3176a8_1217e092_1727835c\Report.wer
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
              Category:dropped
              Size (bytes):13634
              Entropy (8bit):3.7731201501163407
              Encrypted:false
              SSDEEP:192:jqpHp4aVHnmHHnh+sjIgKUzn/u7sAS274ItoPO:UVHInh+sjz/u7sAX4ItoPO
              MD5:99037075BEB319D10F670488F4FF7DC9
              SHA1:7EAAC43D2C1DD92019BCC8C0A593037736D927B4
              SHA-256:771F416683A9EA5E8F153C64F61968B5A5F2582AD2933E9F5998E19FAA1C78A5
              SHA-512:2871A7B96FFC96A123894BB10D6A5ED5BD20BCEC90CEA6979EC49DBBF2693E75F0DE4B9F5D5FF812D0F26EDCBE839F45C562D428AEA1ACF2D38D6665A04DA2EF
              Malicious:false
              Reputation:low
              Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.8.6.0.4.6.3.1.5.2.5.8.9.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.8.6.0.4.6.3.6.9.1.6.5.1.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.5.4.5.0.b.0.a.-.6.b.e.a.-.4.6.1.f.-.9.9.b.2.-.b.c.2.3.a.9.b.3.b.d.a.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.c.a.5.c.3.a.c.-.3.4.a.3.-.4.a.f.7.-.b.8.7.1.-.3.e.4.a.5.e.1.8.5.a.d.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D...4.5.6.9.5.5.9.3...9.1.9.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.e.8.-.0.0.0.1.-.0.0.1.6.-.5.8.5.2.-.b.3.7.d.4.e.0.a.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.c.5.f.c.b.1.b.a.f.0.5.8.f.4.3.2.9.f.e.2.0.1.0.c.d.d.0.9.1.b.7.0.0.0.0.0.9.0.4.!.0.0.0.0.8.f.4.e.7.6.5.3.b.a.7.1.a.f.9.7.4.2.2.6.4.1.5.e.d.5.
              C:\ProgramData\Microsoft\Windows\WER\Temp\WER6833.tmp.dmp
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 15 streams, Wed Feb 24 01:43:53 2021, 0x1205a4 type
              Category:dropped
              Size (bytes):93450
              Entropy (8bit):2.228276903413082
              Encrypted:false
              SSDEEP:384:T7BqcE4LtzQRPoXrtcE6zXYBjMWGr6WtiWOuh/5LOC4+BFWZBD66d0U:TUmvszXYuWGr6WtfOuh/RTBFy0U
              MD5:E9E58DBD9A3E7F71D500E9D911D117C0
              SHA1:51F6682EE663B5D8D429DFBF31EA620D373D7783
              SHA-256:F8EF271AD3EDC79553BDB21F954762E5319886580AD6E8C0C27EF7DA012A9B11
              SHA-512:AA75DBC087D394D9BD22A3790F3D1043A685DD59BF5D00AD4ADAB28C42D12F95995C2C725688F756A7AD2A9413F45BC2E806E21FDD7999AE9089C34D03839869
              Malicious:false
              Reputation:low
              Preview: MDMP....... .......Y.5`...................U...........B......,#......GenuineIntelW...........T...........R.5`.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
              C:\ProgramData\Microsoft\Windows\WER\Temp\WER70BF.tmp.WERInternalMetadata.xml
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
              Category:dropped
              Size (bytes):8462
              Entropy (8bit):3.7072991451174664
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNiGL6LSJ96YItSUSpgmfs4N8SsCpDR89bH3sfb2Nm:RrlsNiq6LSJ96YCSUSpgmfs4ySyH8fR
              MD5:D0ACE7357AE16F1D8221D4A8246D4E87
              SHA1:234569E2919FA5639D603D03CD78A7836A43D99C
              SHA-256:DADE94C0123E37C5EDABE6714FD309C632FEDD9CE4925DF47626C02FFE61EFD7
              SHA-512:AF8CFEDD4540442A143A5C9E7E3FCD983B656B0C508303FB2C0055198D9CF92B57DC85AD175A51BD957A2D06382E395CA1597EA235C70E00030A74010EE32637
              Malicious:false
              Reputation:low
              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.8.<./.P.i.d.>.........
              C:\ProgramData\Microsoft\Windows\WER\Temp\WER7285.tmp.xml
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4759
              Entropy (8bit):4.563389011822276
              Encrypted:false
              SSDEEP:48:cvIwSD8zs9JgtWI9J9WSC8BQ8fm8M4J3CIPFP/p8+q8axlHUt7y1YrYHd:uITfXiMSNHJnx8H0tyq8Hd
              MD5:1AF9DBFB1A8E815F0616856A89EA8CFF
              SHA1:8DBDCE9D1A7E36416CE28F8B431DACA10FB50402
              SHA-256:D7A8B8EFA38A4EE5D3222CA83BFCF2B89E660F595FC8B00E0D180407D05A72B7
              SHA-512:5C3D1605DB63390CAFB22673D8ACEA6F896E3D8F556C27714F0BC949CE95AD1178705F877B3EEA45FACE7232C7ABC058E7DF0E79AD890B6E150177FD872611FF
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="874734" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.5802607551094
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
              File size:536576
              MD5:bb663ffdda23f4277af1d261ac43a88e
              SHA1:8f4e7653ba71af974226415ed512f44a6168abcc
              SHA256:145539dcc07505d1a41913332a55d78398f93c35d7332346e6a58c2006a79714
              SHA512:65ddb7db4a0a2b6c37a56cc292113573d111088ba6919a6f70976f00fd23ba95fbf46fd146a6ddb9cc874075446c63cfdf43338ca2ff238514df9ca38a6e3867
              SSDEEP:12288:QQn7dXPlGbOW3se6+Aq9XnHgVRGwwoYtrKXf1gxF7Alq:QQ7HGbP3s63DV/tUgxelq
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................U.......`.......a.......X...............d.......P.......Q.......V.....Rich............................PE..L..

              File Icon

              Icon Hash:96b0c444ecbae2e6

              Static PE Info

              General

              Entrypoint:0x403ad0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
              DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
              Time Stamp:0x5D580EA3 [Sat Aug 17 14:26:43 2019 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:a6e2c959b82a7e7f36f0071d2cdb1c19

              Entrypoint Preview

              Instruction
              mov edi, edi
              push ebp
              mov ebp, esp
              call 00007F2C2095F73Bh
              call 00007F2C20957186h
              pop ebp
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              mov edi, edi
              push ebp
              mov ebp, esp
              push FFFFFFFEh
              push 0047DF70h
              push 00407040h
              mov eax, dword ptr fs:[00000000h]
              push eax
              add esp, FFFFFF98h
              push ebx
              push esi
              push edi
              mov eax, dword ptr [00480090h]
              xor dword ptr [ebp-08h], eax
              xor eax, ebp
              push eax
              lea eax, dword ptr [ebp-10h]
              mov dword ptr fs:[00000000h], eax
              mov dword ptr [ebp-18h], esp
              mov dword ptr [ebp-70h], 00000000h
              lea eax, dword ptr [ebp-60h]
              push eax
              call dword ptr [004760ACh]
              cmp dword ptr [0227076Ch], 00000000h
              jne 00007F2C20957180h
              push 00000000h
              push 00000000h
              push 00000001h
              push 00000000h
              call dword ptr [004760A8h]
              call 00007F2C20957303h
              mov dword ptr [ebp-6Ch], eax
              call 00007F2C2096136Bh
              test eax, eax
              jne 00007F2C2095717Ch
              push 0000001Ch
              call 00007F2C209572C0h
              add esp, 04h
              call 00007F2C20960CC8h
              test eax, eax
              jne 00007F2C2095717Ch
              push 00000010h
              call 00007F2C209572ADh
              add esp, 04h
              push 00000001h
              call 00007F2C2095E753h
              add esp, 04h
              call 00007F2C20960BDBh
              mov dword ptr [ebp-04h], 00000000h
              call 00007F2C209607BFh
              test eax, eax

              Rich Headers

              Programming Language:
              • [LNK] VS2010 build 30319
              • [ASM] VS2010 build 30319
              • [ C ] VS2010 build 30319
              • [C++] VS2010 build 30319
              • [EXP] VS2010 build 30319
              • [RES] VS2010 build 30319
              • [IMP] VS2008 SP1 build 30729

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x7f3700x53.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x7e9a80x50.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e720000x1fa8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7dbb80x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x760000x1a4.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x74db10x74e00False0.833246991979data7.76039382624IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x760000x93c30x9400False0.2763671875data4.51893730397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x800000x1df17700x2a00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x1e720000x1fa80x2000False0.73779296875data6.40095282491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              LUBECIYIKORUPEHELIDATINAJ0x1e732300xbf7ASCII text, with very long lines, with no line terminatorsUzbekCyrillic
              RT_ICON0x1e721700x10a8dataVietnameseVietnam
              RT_GROUP_ICON0x1e732180x14dataVietnameseVietnam
              RT_VERSION0x1e73e280x180dataUzbekCyrillic

              Imports

              DLLImport
              KERNEL32.dllGetModuleHandleExA, FindResourceExW, FindResourceW, MapUserPhysicalPages, FreeLibrary, LoadResource, SetConsoleTextAttribute, GetCurrentProcess, ScrollConsoleScreenBufferW, SetEnvironmentVariableW, SetHandleInformation, GetTimeFormatA, GetTickCount, FindNextVolumeMountPointA, GetLocaleInfoW, SetSystemTimeAdjustment, lstrlenA, GetExitCodeProcess, ExitThread, GetConsoleAliasesW, BeginUpdateResourceW, EnumDateFormatsExA, CreateTimerQueueTimer, LocalAlloc, GetProfileStringA, SetProcessWorkingSetSize, SetConsoleCursorInfo, VirtualProtect, GetFileAttributesExW, ReleaseMutex, lstrcpyW, HeapCreate, GlobalFix, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetModuleFileNameW, RaiseException, EncodePointer, DecodePointer, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, HeapValidate, IsBadReadPtr, QueryPerformanceCounter, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, GetProcAddress, GetModuleHandleW, ExitProcess, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetLastError, WriteFile, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, LoadLibraryW, SetFilePointer, GetConsoleCP, GetConsoleMode, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, RtlUnwind, MultiByteToWideChar, HeapAlloc, HeapReAlloc, HeapSize, HeapQueryInformation, HeapFree, SetStdHandle, GetStringTypeW, LCMapStringW, FlushFileBuffers, ReadFile, CreateFileW, CloseHandle
              USER32.dllGetDesktopWindow
              ADVAPI32.dllOpenSCManagerA

              Exports

              NameOrdinalAddress
              Gun10x475380
              Smoke20x475390

              Version Infos

              DescriptionData
              FileVersions7.0.0.15
              LegalCopyrightsWsegd
              ProductVersions67.0.20.5
              Translation0x0409 0x086f

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              UzbekCyrillic
              VietnameseVietnam

              Network Behavior

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Feb 23, 2021 17:43:47.096528053 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.166680098 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.167145967 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.175015926 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.245294094 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.247045040 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.247086048 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.247102022 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.247189045 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.255155087 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.326184988 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.377515078 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.401434898 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.513885021 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.519330025 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.519382000 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.519401073 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.519419909 CET44349697195.201.225.248192.168.2.5
              Feb 23, 2021 17:43:47.519465923 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.519532919 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:43:47.604994059 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.657738924 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.657882929 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.658885002 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.711656094 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.716690063 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.716730118 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.716744900 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.716820002 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.732220888 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.784956932 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.784982920 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.812361002 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.812434912 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:43:47.865122080 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:47.865140915 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:48.380816936 CET44349699172.67.199.58192.168.2.5
              Feb 23, 2021 17:43:48.424156904 CET49699443192.168.2.5172.67.199.58
              Feb 23, 2021 17:44:02.043821096 CET49697443192.168.2.5195.201.225.248
              Feb 23, 2021 17:44:02.044039965 CET49699443192.168.2.5172.67.199.58

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Feb 23, 2021 17:43:39.545032978 CET5758753192.168.2.58.8.8.8
              Feb 23, 2021 17:43:39.593924046 CET53575878.8.8.8192.168.2.5
              Feb 23, 2021 17:43:39.741851091 CET5543253192.168.2.58.8.8.8
              Feb 23, 2021 17:43:39.817522049 CET53554328.8.8.8192.168.2.5
              Feb 23, 2021 17:43:39.949947119 CET6493653192.168.2.58.8.8.8
              Feb 23, 2021 17:43:40.010180950 CET53649368.8.8.8192.168.2.5
              Feb 23, 2021 17:43:40.844026089 CET5270453192.168.2.58.8.8.8
              Feb 23, 2021 17:43:40.895570993 CET53527048.8.8.8192.168.2.5
              Feb 23, 2021 17:43:41.653755903 CET5221253192.168.2.58.8.8.8
              Feb 23, 2021 17:43:41.705499887 CET53522128.8.8.8192.168.2.5
              Feb 23, 2021 17:43:42.802611113 CET5430253192.168.2.58.8.8.8
              Feb 23, 2021 17:43:42.851502895 CET53543028.8.8.8192.168.2.5
              Feb 23, 2021 17:43:43.957406998 CET5378453192.168.2.58.8.8.8
              Feb 23, 2021 17:43:44.014424086 CET53537848.8.8.8192.168.2.5
              Feb 23, 2021 17:43:45.131680965 CET6530753192.168.2.58.8.8.8
              Feb 23, 2021 17:43:45.183253050 CET53653078.8.8.8192.168.2.5
              Feb 23, 2021 17:43:46.424844027 CET6434453192.168.2.58.8.8.8
              Feb 23, 2021 17:43:46.473357916 CET53643448.8.8.8192.168.2.5
              Feb 23, 2021 17:43:47.035346031 CET6206053192.168.2.58.8.8.8
              Feb 23, 2021 17:43:47.084202051 CET53620608.8.8.8192.168.2.5
              Feb 23, 2021 17:43:47.350696087 CET6180553192.168.2.58.8.8.8
              Feb 23, 2021 17:43:47.399502993 CET53618058.8.8.8192.168.2.5
              Feb 23, 2021 17:43:47.529699087 CET5479553192.168.2.58.8.8.8
              Feb 23, 2021 17:43:47.603262901 CET53547958.8.8.8192.168.2.5
              Feb 23, 2021 17:43:56.947071075 CET4955753192.168.2.58.8.8.8
              Feb 23, 2021 17:43:56.995910883 CET53495578.8.8.8192.168.2.5
              Feb 23, 2021 17:44:02.365581989 CET6173353192.168.2.58.8.8.8
              Feb 23, 2021 17:44:02.424283981 CET53617338.8.8.8192.168.2.5
              Feb 23, 2021 17:44:35.697489977 CET6544753192.168.2.58.8.8.8
              Feb 23, 2021 17:44:35.757320881 CET53654478.8.8.8192.168.2.5

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Feb 23, 2021 17:43:47.035346031 CET192.168.2.58.8.8.80xeff3Standard query (0)telete.inA (IP address)IN (0x0001)
              Feb 23, 2021 17:43:47.529699087 CET192.168.2.58.8.8.80x963dStandard query (0)yearofthepig.topA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Feb 23, 2021 17:43:47.084202051 CET8.8.8.8192.168.2.50xeff3No error (0)telete.in195.201.225.248A (IP address)IN (0x0001)
              Feb 23, 2021 17:43:47.603262901 CET8.8.8.8192.168.2.50x963dNo error (0)yearofthepig.top172.67.199.58A (IP address)IN (0x0001)
              Feb 23, 2021 17:43:47.603262901 CET8.8.8.8192.168.2.50x963dNo error (0)yearofthepig.top104.21.50.15A (IP address)IN (0x0001)

              HTTPS Packets

              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
              Feb 23, 2021 17:43:47.247086048 CET195.201.225.248443192.168.2.549697CN=telecut.in CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Wed Feb 17 11:17:19 CET 2021 Wed Oct 07 21:21:40 CEST 2020Tue May 18 12:17:19 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
              CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
              Feb 23, 2021 17:43:47.716730118 CET172.67.199.58443192.168.2.549699CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=California, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Feb 11 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Feb 11 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:17:43:46
              Start date:23/02/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.45695593.9197.exe'
              Imagebase:0x400000
              File size:536576 bytes
              MD5 hash:BB663FFDDA23F4277AF1D261AC43A88E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:17:43:49
              Start date:23/02/2021
              Path:C:\Windows\SysWOW64\WerFault.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 728
              Imagebase:0x12d0000
              File size:434592 bytes
              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >