Loading ...

Play interactive tourEdit tour

Analysis Report executable.4080.exe

Overview

General Information

Sample Name:executable.4080.exe
Analysis ID:358585
MD5:9b6886089b69bc227e48accb63231096
SHA1:3794deb61672f08dcd4997b18780d3a0b81340fb
SHA256:f7c242fef888f7129e510c5a2c2a9a3ada69891304017e93a235cd3148d0dde4
Infos:

Most interesting Screenshot:

Detection

Citadel
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Citadel
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May initialize a security null descriptor
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • executable.4080.exe (PID: 5424 cmdline: 'C:\Users\user\Desktop\executable.4080.exe' MD5: 9B6886089B69BC227E48ACCB63231096)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
executable.4080.exeJoeSecurity_CitadelYara detected CitadelJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.198011061.0000000000401000.00000020.00020000.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
      00000000.00000000.197550286.0000000000401000.00000020.00020000.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
        Process Memory Space: executable.4080.exe PID: 5424JoeSecurity_CitadelYara detected CitadelJoe Security
          Process Memory Space: executable.4080.exe PID: 5424citadel13xyCitadel 1.5.x.y trojan bankerJean-Philippe Teissier / @Jipe_
          • 0x1b8a:$f: bc_remove
          • 0x8786:$f: bc_remove
          • 0x10a3b:$f: bc_remove
          • 0x2298:$g: bc_add
          • 0x8793:$g: bc_add
          • 0x10a48:$g: bc_add
          • 0x2987:$ggurl: http://www.google.com/webhp
          • 0x4b85:$ggurl: http://www.google.com/webhp
          • 0x7ed0:$ggurl: http://www.google.com/webhp
          • 0x8022:$ggurl: http://www.google.com/webhp
          • 0x10185:$ggurl: http://www.google.com/webhp
          • 0x102d7:$ggurl: http://www.google.com/webhp

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          0.2.executable.4080.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
            0.0.executable.4080.exe.400000.0.unpackJoeSecurity_CitadelYara detected CitadelJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus / Scanner detection for submitted sampleShow sources
              Source: executable.4080.exeAvira: detected
              Multi AV Scanner detection for submitted fileShow sources
              Source: executable.4080.exeVirustotal: Detection: 84%Perma Link
              Source: executable.4080.exeReversingLabs: Detection: 82%
              Machine Learning detection for sampleShow sources
              Source: executable.4080.exeJoe Sandbox ML: detected
              Source: 0.1.executable.4080.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
              Source: 0.2.executable.4080.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
              Source: 0.0.executable.4080.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B74D CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

              Compliance:

              barindex
              Uses 32bit PE filesShow sources
              Source: executable.4080.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00408C33 GetFileAttributesExW,LoadLibraryA,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,ReadProcessMemory,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B41D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B4D8 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040AC31 CreateFileW,HeapAlloc,WaitForSingleObject,InternetReadFile,WriteFile,FlushFileBuffers,CloseHandle,
              Source: executable.4080.exeString found in binary or memory: http://www.google.com/webhp
              Source: executable.4080.exeString found in binary or memory: http://www.google.com/webhpbccerts

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Yara detected CitadelShow sources
              Source: Yara matchFile source: executable.4080.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000002.198011061.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.197550286.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: executable.4080.exe PID: 5424, type: MEMORY
              Source: Yara matchFile source: 0.2.executable.4080.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.executable.4080.exe.400000.0.unpack, type: UNPACKEDPE
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00412C03 GetClipboardData,GlobalLock,EnterCriticalSection,LeaveCriticalSection,GlobalUnlock,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00412AC1 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,

              E-Banking Fraud:

              barindex
              Yara detected CitadelShow sources
              Source: Yara matchFile source: executable.4080.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000002.198011061.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.197550286.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: executable.4080.exe PID: 5424, type: MEMORY
              Source: Yara matchFile source: 0.2.executable.4080.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.executable.4080.exe.400000.0.unpack, type: UNPACKEDPE

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: Process Memory Space: executable.4080.exe PID: 5424, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040344C NtQueryInformationProcess,CloseHandle,NtCreateThread,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00404CCE NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_004034F6 NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040F61D LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00415300 InitiateSystemShutdownExW,ExitWindowsEx,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040C570
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B65A
              Source: executable.4080.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: Process Memory Space: executable.4080.exe PID: 5424, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
              Source: classification engineClassification label: mal80.bank.evad.winEXE@1/0@0/0
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0041267A CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_004127BF CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040F3C3 GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040F36F CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0041000E CoCreateInstance,
              Source: executable.4080.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\executable.4080.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: executable.4080.exeVirustotal: Detection: 84%
              Source: executable.4080.exeReversingLabs: Detection: 82%
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00411408 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00408610 push ss; ret
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00405841 HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,StrStrIW,StrStrIW,StrStrIW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040540A HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileStringW,GetPrivateProfileStringW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00411408 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,

              Malware Analysis System Evasion:

              barindex
              Found evasive API chain (may stop execution after checking mutex)Show sources
              Source: C:\Users\user\Desktop\executable.4080.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
              Source: C:\Users\user\Desktop\executable.4080.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
              Source: C:\Users\user\Desktop\executable.4080.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
              Source: C:\Users\user\Desktop\executable.4080.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Users\user\Desktop\executable.4080.exeAPI coverage: 2.1 %
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B41D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040B4D8 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00404CCE NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00404ACF VirtualProtectEx 000000FF,0774C084,0000001E,00407798,00407798
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00411408 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040EBCB mov edx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040779B HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,GetLengthSid,GetCurrentProcessId,
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040DB47 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0041280F PFXImportCertStore,GetSystemTime,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00411A9D GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_00409921 GetTimeZoneInformation,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040F810 GetVersionExW,GetNativeSystemInfo,
              Source: executable.4080.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040CC51 HeapAlloc,socket,bind,closesocket,
              Source: C:\Users\user\Desktop\executable.4080.exeCode function: 0_2_0040C961 socket,bind,listen,closesocket,

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1Native API13Valid Accounts1Valid Accounts1Valid Accounts1Input Capture11Network Share Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsScheduled Task/JobApplication Shimming1Access Token Manipulation11Disable or Modify Tools1LSASS MemorySystem Time Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Application Shimming1Access Token Manipulation11Security Account ManagerSecurity Software Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptInstall Root Certificate1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              executable.4080.exe84%VirustotalBrowse
              executable.4080.exe82%ReversingLabsWin32.Trojan.Zeus
              executable.4080.exe100%AviraTR/Spy.Gen
              executable.4080.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              0.1.executable.4080.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
              0.2.executable.4080.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
              0.0.executable.4080.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File

              Domains

              No Antivirus matches

              URLs

              No Antivirus matches

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:358585
              Start date:25.02.2021
              Start time:21:50:45
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 2m 31s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:executable.4080.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:2
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.bank.evad.winEXE@1/0@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 99.8% (good quality ratio 95.5%)
              • Quality average: 86.7%
              • Quality standard deviation: 24.9%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): svchost.exe

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:MS-DOS executable
              Entropy (8bit):6.281631730900597
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • DOS Executable Borland Pascal 7.0x (2037/25) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • VXD Driver (31/22) 0.00%
              File name:executable.4080.exe
              File size:118784
              MD5:9b6886089b69bc227e48accb63231096
              SHA1:3794deb61672f08dcd4997b18780d3a0b81340fb
              SHA256:f7c242fef888f7129e510c5a2c2a9a3ada69891304017e93a235cd3148d0dde4
              SHA512:7aec380c70624cd5336f23421aa2e2899d75b9b2098deb1dc8045ad27411919c032173662ccea468c68aa0702d8f9f373030eb821fea9e50e17759e8a9df9e7e
              SSDEEP:1536:D1fuot6xHoU2Qw6bQLsUPJEqz6ohfUOcgrZi0NwuMoVEcO9fipsdtAe1zIq3/VzD:hLIxHZRbMsZ/oh8/wlNhidtA8I8VzD
              File Content Preview:MZ..............................................................................................................................................................................................................................PE..L......K.................~.

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x407f7f
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
              Time Stamp:0x4BDF10B5 [Mon May 3 18:06:45 2010 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:b14de3ce0d2ae45019008e4128864503

              Entrypoint Preview

              Instruction
              push ebp
              lea ebp, dword ptr [esp-78h]
              sub esp, 00000298h
              push ebx
              xor ebx, ebx
              push ebx
              mov byte ptr [ebp+77h], bl
              call 00007F0D3CB9271Ah
              test al, al
              je 00007F0D3CB93247h
              push 00008007h
              mov byte ptr [ebp+5Ch], bl
              mov byte ptr [ebp+76h], 00000001h
              call dword ptr [004011D4h]
              lea eax, dword ptr [ebp+6Ch]
              push eax
              call dword ptr [004011D8h]
              push eax
              call dword ptr [00401260h]
              cmp eax, ebx
              je 00007F0D3CB92F4Ah
              xor edx, edx
              cmp dword ptr [ebp+6Ch], ebx
              jle 00007F0D3CB92F3Ch
              mov ecx, dword ptr [eax+edx*4]
              cmp ecx, ebx
              je 00007F0D3CB92F2Fh
              cmp word ptr [ecx], 002Dh
              jne 00007F0D3CB92F29h
              movzx ecx, word ptr [ecx+02h]
              cmp ecx, 66h
              je 00007F0D3CB92F1Ch
              cmp ecx, 6Eh
              jne 00007F0D3CB92F1Bh
              mov byte ptr [ebp+76h], bl
              jmp 00007F0D3CB92F16h
              mov byte ptr [ebp+5Ch], 00000001h
              inc edx
              cmp edx, dword ptr [ebp+6Ch]
              jl 00007F0D3CB92EE8h
              push eax
              call dword ptr [004011ACh]
              push esi
              push edi
              push dword ptr [0041932Ch]
              xor eax, eax
              lea esi, dword ptr [ebp+60h]
              call 00007F0D3CB95F4Ch
              test al, al
              je 00007F0D3CB92F2Ch
              mov ecx, dword ptr [ebp+60h]
              lea eax, dword ptr [ebp+70h]
              push eax
              lea eax, dword ptr [ebp+6Ch]
              push eax
              mov eax, dword ptr [ebp+64h]
              call 00007F0D3CB92BF3h
              mov eax, esi
              call 00007F0D3CB95FD6h
              cmp dword ptr [ebp+70h], 000001E6h
              jne 00007F0D3CB92FAEh
              push dword ptr [ebp+6Ch]
              call 00007F0D3CB93776h
              test al, al
              je 00007F0D3CB92F75h

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x177c40x104.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b0000xd5c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x3e8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x180000x18000False0.610392252604data6.56580621678IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x190000x20000x2000False0.568969726562data5.33094975112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .reloc0x1b0000x20000x2000False0.363159179688data3.6749722075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Imports

              DLLImport
              KERNEL32.dlllstrcmpiA, LoadLibraryA, WTSGetActiveConsoleSessionId, SetFileAttributesW, GetCurrentThread, SetThreadPriority, GetEnvironmentVariableW, FileTimeToDosDateTime, GetTempFileNameW, HeapReAlloc, CreateMutexW, FindFirstFileW, GetNativeSystemInfo, SetEndOfFile, CreateProcessW, HeapAlloc, SystemTimeToFileTime, SetFilePointerEx, HeapFree, GetComputerNameW, GetTickCount, GetProcessHeap, IsBadReadPtr, SetFileTime, VirtualQueryEx, WriteFile, OpenProcess, Thread32First, WideCharToMultiByte, ReadProcessMemory, GetVersionExW, CreateFileW, OpenEventW, Thread32Next, ReadFile, GetTimeZoneInformation, MultiByteToWideChar, FlushFileBuffers, GetTempPathW, GetFileSizeEx, OpenMutexW, GetLastError, SetLastError, VirtualProtectEx, VirtualAllocEx, FindClose, RemoveDirectoryW, FindNextFileW, VirtualProtect, CreateToolhelp32Snapshot, GetFileTime, ReleaseMutex, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, DeleteFileW, GetFileInformationByHandle, MoveFileExW, GetUserDefaultUILanguage, GlobalLock, GlobalUnlock, CreateRemoteThread, Process32FirstW, Process32NextW, GetFileAttributesW, CreateDirectoryW, FreeLibrary, WriteProcessMemory, LocalFree, GetCurrentProcessId, HeapDestroy, DuplicateHandle, WaitForMultipleObjects, CreateEventW, GetModuleFileNameW, Sleep, VirtualFree, WaitForSingleObject, SetErrorMode, GetCommandLineW, ExitProcess, ExpandEnvironmentStringsW, GetPrivateProfileIntW, GetPrivateProfileStringW, lstrcmpiW, GetThreadContext, ResetEvent, GetProcAddress, GetModuleHandleW, SetEvent, CreateThread, GetSystemTime, GetLocalTime, CloseHandle, GetFileAttributesExW, GetProcessId, EnterCriticalSection, VirtualAlloc, LeaveCriticalSection, VirtualFreeEx, InitializeCriticalSection, SetThreadContext, HeapCreate
              USER32.dllGetCursorPos, GetIconInfo, DrawIcon, LoadImageW, CharLowerW, ToUnicode, GetKeyboardState, ExitWindowsEx, MsgWaitForMultipleObjects, GetClipboardData, TranslateMessage, CharToOemW, CharLowerBuffA, DispatchMessageW, CharUpperW, PeekMessageW, CharLowerA
              ADVAPI32.dllGetLengthSid, LookupPrivilegeValueW, SetNamedSecurityInfoW, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CreateProcessAsUserW, RegQueryValueExW, CryptReleaseContext, RegCreateKeyExW, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, CryptAcquireContextW, GetSidSubAuthority, OpenProcessToken, CryptGetHashParam, EqualSid, IsWellKnownSid, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorSacl, SetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, ConvertSidToStringSidW, RegSetValueExW, CryptHashData, InitiateSystemShutdownExW, CryptCreateHash
              SHLWAPI.dllwvnsprintfW, PathIsDirectoryW, PathFindFileNameW, PathAddBackslashW, SHDeleteValueW, PathSkipRootW, SHDeleteKeyW, PathRemoveFileSpecW, UrlUnescapeA, StrStrIA, PathMatchSpecW, StrCmpNIA, wvnsprintfA, PathUnquoteSpacesW, PathIsURLW, PathQuoteSpacesW, StrCmpNIW, PathRemoveBackslashW, PathAddExtensionW, StrStrIW, PathCombineW, PathRenameExtensionW
              SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, ShellExecuteW
              Secur32.dllGetUserNameExW
              ole32.dllStringFromGUID2, CLSIDFromString, CoUninitialize, CoCreateInstance, CoInitializeEx
              WS2_32.dllaccept, listen, WSASend, WSASetLastError, socket, recv, bind, WSAEventSelect, WSAIoctl, connect, WSAAddressToStringW, WSAStartup, recvfrom, getaddrinfo, select, WSAGetLastError, getsockname, shutdown, setsockopt, sendto, getpeername, closesocket, send, freeaddrinfo
              CRYPT32.dllPFXImportCertStore, CertOpenSystemStoreW, CertCloseStore, CertEnumCertificatesInStore, CertDuplicateCertificateContext, PFXExportCertStoreEx, CertDeleteCertificateFromStore
              WININET.dllInternetCrackUrlA, HttpAddRequestHeadersW, InternetSetStatusCallbackW, GetUrlCacheEntryInfoW, InternetQueryOptionA, InternetSetOptionA, HttpSendRequestW, InternetReadFile, InternetReadFileExA, InternetQueryDataAvailable, HttpSendRequestExW, HttpSendRequestExA, InternetCloseHandle, InternetOpenA, HttpSendRequestA, HttpAddRequestHeadersA, HttpOpenRequestA, InternetConnectA, HttpQueryInfoA
              OLEAUT32.dllVariantInit, VariantClear, SysAllocString, SysFreeString
              NETAPI32.dllNetUserEnum, NetApiBufferFree, NetUserGetInfo

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              System Behavior

              General

              Start time:21:51:29
              Start date:25/02/2021
              Path:C:\Users\user\Desktop\executable.4080.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\executable.4080.exe'
              Imagebase:0x400000
              File size:118784 bytes
              MD5 hash:9B6886089B69BC227E48ACCB63231096
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000002.198011061.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Citadel, Description: Yara detected Citadel, Source: 00000000.00000000.197550286.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >