Loading ...

Play interactive tourEdit tour

Analysis Report factura.exe

Overview

General Information

Sample Name:factura.exe
Analysis ID:384277
MD5:5950cbe94b3b5dedbf7b75fa1b95ac84
SHA1:797bb1231483bb11279f6e63fbb5d675bda58f2a
SHA256:73f2aa87dad06704e8bbd41fb7449a987dc089160a12ba5e13d7d7f6f4196a4f
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Potential malicious icon found
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • factura.exe (PID: 5932 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 5950CBE94B3B5DEDBF7B75FA1B95AC84)
    • RegAsm.exe (PID: 4404 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 5344 cmdline: 'C:\Users\user\Desktop\factura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 68 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: factura.exeMetadefender: Detection: 27%Perma Link
Source: factura.exeReversingLabs: Detection: 45%
Source: factura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D036A8 InternetReadFile,
Source: RegAsm.exe, 0000001B.00000002.747456441.0000000000CFA000.00000004.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=10SUfaVtm3h4B1EK

System Summary:

barindex
Potential malicious icon foundShow sources
Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
Source: C:\Users\user\Desktop\factura.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_0040169C
Source: factura.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: factura.exe, 00000001.00000002.649560165.00000000021D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs factura.exe
Source: factura.exe, 00000001.00000002.649247945.000000000040E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exe vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsCollutions vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutions5>@ vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsd?3 vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsW8 vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutions vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutions(: vs factura.exe
Source: factura.exe, 00000001.00000002.650059978.0000000002A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekvalifikationen.exeFE2XCollutionsJ$ vs factura.exe
Source: factura.exeBinary or memory string: OriginalFilenamekvalifikationen.exe vs factura.exe
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
Source: factura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal76.rans.evad.winEXE@4/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:68:120:WilError_01
Source: factura.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\factura.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: C:\Users\user\Desktop\factura.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: factura.exeMetadefender: Detection: 27%
Source: factura.exeReversingLabs: Detection: 45%
Source: unknownProcess created: C:\Users\user\Desktop\factura.exe 'C:\Users\user\Desktop\factura.exe'
Source: C:\Users\user\Desktop\factura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\factura.exe'
Source: C:\Users\user\Desktop\factura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\factura.exe'
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00403542 push ebx; ret
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_0040657D push FFFFFFC2h; iretd
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_004065AB push FFFFFFC2h; iretd
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00403E6A pushad ; ret
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00401E38 push esp; retf 0040h
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00403ED0 push esp; retf
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00403E90 push esp; retf
Source: C:\Users\user\Desktop\factura.exeCode function: 1_2_00403F18 push esp; retf
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D01E0F push es; iretd
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D0062C push 00000039h; retn 1F0Eh
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D02FE2 push cs; iretd
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D01082 push ecx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D009B2 push D01F0600h; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D030B3 push ebx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D02174 push esp; retf
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D01266 push ecx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D02F00 push ebx; ret
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 27_2_00D03032 push ebx; ret
Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\factura.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000551A41 second address: 0000000000551A41 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FE76CA6A8B8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007FE76CA6A8A1h 0x00000026 cmp ah, dh 0x00000028 push ecx 0x00000029 call 00007FE76CA6A8C9h 0x0000002e call 00007FE76CA6A8C8h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
Tries to detect Any.runShow sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000552C6A second address: 0000000000552C0B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b retn 0004h 0x0000000e cmp edx, dword ptr [esp+04h] 0x00000012 jne 00007FE76CA6A884h 0x00000014 cmp edx, edx 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 lfence 0x0000001c rdtsc
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000552B18 second address: 0000000000552A79 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+14h] 0x0000000e add esi, dword ptr [ebp+04h] 0x00000011 mov esi, dword ptr [esi+eax*4] 0x00000014 add esi, dword ptr [ebp+04h] 0x00000017 mov dword ptr [ebp+08h], esi 0x0000001a retn 0004h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000551A41 second address: 0000000000551A41 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FE76CA6A8B8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007FE76CA6A8A1h 0x00000026 cmp ah, dh 0x00000028 push ecx 0x00000029 call 00007FE76CA6A8C9h 0x0000002e call 00007FE76CA6A8C8h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000551B03 second address: 0000000000551B03 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FE76CB8BDFAh 0x0000001d popad 0x0000001e call 00007FE76CB8AB5Bh 0x00000023 lfence 0x00000026 rdtsc
Source: C:\Users\user\Desktop\factura.exeRDTSC instruction interceptor: First address: 0000000000552BA9 second address: 0000000000552BA9 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push dword ptr [eax+ecx] 0x0000000e pop dword ptr [ebx+ecx] 0x00000011 cmp bx, ax 0x00000014 test cx, 1B46h 0x00000019 inc ecx 0x0000001a inc ecx 0x0000001b inc ecx 0x0000001c inc ecx 0x0000001d cmp dl, bl 0x0000001f cmp ecx, 18h 0x00000022 jne 00007FE76CA6A888h 0x00000024 cmp edx, edx 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D02C6A second address: 0000000000D02C0B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b retn 0004h 0x0000000e cmp edx, dword ptr [esp+04h] 0x00000012 jne 00007FE76CB8AB14h 0x00000014 cmp edx, edx 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 lfence 0x0000001c rdtsc
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D02B18 second address: 0000000000D02A79 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+14h] 0x0000000e add esi, dword ptr [ebp+04h] 0x00000011 mov esi, dword ptr [esi+eax*4] 0x00000014 add esi, dword ptr [ebp+04h] 0x00000017 mov dword ptr [ebp+08h], esi 0x0000001a retn 0004h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D01B03 second address: 0000000000D01B03 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FE76CB8BDFAh 0x0000001d popad 0x0000001e call 00007FE76CB8AB5Bh 0x00000023 lfence 0x00000026 rdtsc
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3260Thread sleep time: -3490000s >= -30000s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess Stats: CPU usage > 90% for more than 60s
Hides threads from debuggersShow sources
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: RegAsm.exe, 0000001B.00000002.749330639.0000000001600000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
Source: RegAsm.exe, 0000001B.00000002.749330639.0000000001600000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: RegAsm.exe, 0000001B.00000002.749330639.0000000001600000.00000002.00000001.sdmpBinary or memory string: Progman
Source: RegAsm.exe, 0000001B.00000002.749330639.0000000001600000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection2Virtualization/Sandbox Evasion321OS Credential DumpingSecurity Software Discovery51Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection2LSASS MemoryVirtualization/Sandbox Evasion321Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)DLL Side-Loading1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Information Discovery21Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
factura.exe30%MetadefenderBrowse
factura.exe46%ReversingLabsWin32.Trojan.GuLoader

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:384277
Start date:08.04.2021
Start time:20:35:18
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 36s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:factura.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:31
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.rans.evad.winEXE@4/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 95.3% (good quality ratio 66.4%)
  • Quality average: 41.3%
  • Quality standard deviation: 34.2%
HCA Information:
  • Successful, ratio: 58%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 104.42.151.234, 13.64.90.137, 23.54.113.53, 40.88.32.150, 168.61.161.212, 104.43.139.144, 95.100.54.203, 205.185.216.10, 205.185.216.42, 20.50.102.62, 23.10.249.26, 23.10.249.43, 52.155.217.156, 20.54.26.129, 172.217.168.14
  • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/384277/sample/factura.exe

Simulations

Behavior and APIs

TimeTypeDescription
20:38:30API Interceptor350x Sleep call for process: RegAsm.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.437166061311082
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.15%
  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:factura.exe
File size:57344
MD5:5950cbe94b3b5dedbf7b75fa1b95ac84
SHA1:797bb1231483bb11279f6e63fbb5d675bda58f2a
SHA256:73f2aa87dad06704e8bbd41fb7449a987dc089160a12ba5e13d7d7f6f4196a4f
SHA512:6e1f38b5f3d257a2d7926213a4ec6947882b6f38bbac8f42e9d0b3a92762494eeec21920e9ef6cf8440e7298aa2fe1eb73c51ce1c8ec1bc4abae14b2d32b1811
SSDEEP:768:1hk5+yYZnkRUpyncqBRccge9kk1nA36yY1SoqOiiy:1a5+yk/AnbBTbkmA33RoqOe
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....-l`.....................0....................@................

File Icon

Icon Hash:20047c7c70f0e004

Static PE Info

General

Entrypoint:0x40169c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x606C2D85 [Tue Apr 6 09:44:37 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:b983fc96c0bd34be8388eeea33042759

Entrypoint Preview

Instruction
push 0040192Ch
call 00007FE76CA428C5h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
inc eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [esi], bl
mov word ptr [edi], cs
mov eax, 4C003ABAh
lahf
js 00007FE76CA42868h
push es
stosd
or dh, byte ptr [ecx]
add dword ptr [eax], 00000000h
add byte ptr [ecx], al
add byte ptr [eax], al
add byte ptr [ecx+00h], al
xchg byte ptr [eax-7Eh], dl
add dword ptr [ebx+4Bh], edx
inc ebp
dec ebp
inc ecx
inc esi
dec edi
push edx
dec ebp
inc ebp
push edx
add byte ptr [ecx+ebp+00000312h], al
add byte ptr [eax], al
dec esp
xor dword ptr [eax], eax
add eax, 02836AD0h
fmul qword ptr [ecx-66h]
dec edi
cdq
mov seg?, word ptr [esi]
call far B4BBh : 29F2388Ch
mov al, E7h
in al, 5Eh
dec esp
cdq
xchg eax, ebx
push ebx
push eax
fcmovu st(0), st(6)
jp 00007FE76CA42887h
cmp cl, byte ptr [edi-53h]
xor ebx, dword ptr [ecx-48EE309Ah]
or al, 00h
stosb
add byte ptr [eax-2Dh], ah
xchg eax, ebx
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [eax], eax
add byte ptr [ebx+00h], cl
add byte ptr [eax], al
add byte ptr [ecx], cl
add byte ptr [ecx+ebp*2+73h], al
insd
imul ebp, dword ptr [esi+69h], 0D006E6Fh
add dword ptr [edx], ecx
add byte ptr [eax+61h], dh
imul esi, dword ptr [edx+70h], 00000069h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xada40x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x9f0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xa3b80xb000False0.535866477273data6.30476552767IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0xc0000x11b40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0xe0000x9f00x1000False0.181884765625data2.17356537605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0xe8c00x130data
RT_ICON0xe5d80x2e8data
RT_ICON0xe4b00x128GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0xe4800x30data
RT_VERSION0xe1500x330dataEnglishUnited States

Imports

DLLImport
MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaAryMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaI2Str, __vbaFPException, __vbaStrVarVal, __vbaDateVar, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaVar2Vec, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaLateMemCall, __vbaInStrB, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

Version Infos

DescriptionData
Translation0x0409 0x04b0
LegalCopyrightCollutions
InternalNamekvalifikationen
FileVersion1.00
CompanyNameCollutions
LegalTrademarksCollutions
CommentsCollutions
ProductNameCollutions
ProductVersion1.00
FileDescriptionCreepy Collutions
OriginalFilenamekvalifikationen.exe

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Apr 8, 2021 20:35:58.124605894 CEST5782053192.168.2.78.8.8.8
Apr 8, 2021 20:35:58.138807058 CEST53578208.8.8.8192.168.2.7
Apr 8, 2021 20:35:59.861176014 CEST5084853192.168.2.78.8.8.8
Apr 8, 2021 20:35:59.874805927 CEST53508488.8.8.8192.168.2.7
Apr 8, 2021 20:36:00.442557096 CEST6124253192.168.2.78.8.8.8
Apr 8, 2021 20:36:00.462649107 CEST53612428.8.8.8192.168.2.7
Apr 8, 2021 20:36:01.041596889 CEST5856253192.168.2.78.8.8.8
Apr 8, 2021 20:36:01.054368973 CEST53585628.8.8.8192.168.2.7
Apr 8, 2021 20:36:02.216945887 CEST5659053192.168.2.78.8.8.8
Apr 8, 2021 20:36:02.229949951 CEST53565908.8.8.8192.168.2.7
Apr 8, 2021 20:36:03.330651999 CEST6050153192.168.2.78.8.8.8
Apr 8, 2021 20:36:03.343095064 CEST53605018.8.8.8192.168.2.7
Apr 8, 2021 20:36:04.365504026 CEST5377553192.168.2.78.8.8.8
Apr 8, 2021 20:36:04.379268885 CEST53537758.8.8.8192.168.2.7
Apr 8, 2021 20:36:05.174426079 CEST5183753192.168.2.78.8.8.8
Apr 8, 2021 20:36:05.187256098 CEST53518378.8.8.8192.168.2.7
Apr 8, 2021 20:36:06.344958067 CEST5541153192.168.2.78.8.8.8
Apr 8, 2021 20:36:06.358233929 CEST53554118.8.8.8192.168.2.7
Apr 8, 2021 20:36:07.345694065 CEST6366853192.168.2.78.8.8.8
Apr 8, 2021 20:36:07.357342005 CEST53636688.8.8.8192.168.2.7
Apr 8, 2021 20:36:09.270503998 CEST5464053192.168.2.78.8.8.8
Apr 8, 2021 20:36:09.283051968 CEST53546408.8.8.8192.168.2.7
Apr 8, 2021 20:36:10.129003048 CEST5873953192.168.2.78.8.8.8
Apr 8, 2021 20:36:10.143260956 CEST53587398.8.8.8192.168.2.7
Apr 8, 2021 20:36:11.852381945 CEST6033853192.168.2.78.8.8.8
Apr 8, 2021 20:36:11.865338087 CEST53603388.8.8.8192.168.2.7
Apr 8, 2021 20:36:12.845262051 CEST5871753192.168.2.78.8.8.8
Apr 8, 2021 20:36:12.857690096 CEST53587178.8.8.8192.168.2.7
Apr 8, 2021 20:36:13.845660925 CEST5976253192.168.2.78.8.8.8
Apr 8, 2021 20:36:13.860131979 CEST53597628.8.8.8192.168.2.7
Apr 8, 2021 20:36:14.864547968 CEST5432953192.168.2.78.8.8.8
Apr 8, 2021 20:36:14.878345966 CEST53543298.8.8.8192.168.2.7
Apr 8, 2021 20:36:18.225589991 CEST5805253192.168.2.78.8.8.8
Apr 8, 2021 20:36:18.238105059 CEST53580528.8.8.8192.168.2.7
Apr 8, 2021 20:36:19.297374010 CEST5400853192.168.2.78.8.8.8
Apr 8, 2021 20:36:19.309941053 CEST53540088.8.8.8192.168.2.7
Apr 8, 2021 20:36:20.350488901 CEST5945153192.168.2.78.8.8.8
Apr 8, 2021 20:36:20.362494946 CEST53594518.8.8.8192.168.2.7
Apr 8, 2021 20:36:24.112349033 CEST5291453192.168.2.78.8.8.8
Apr 8, 2021 20:36:24.124360085 CEST53529148.8.8.8192.168.2.7
Apr 8, 2021 20:36:24.996092081 CEST6456953192.168.2.78.8.8.8
Apr 8, 2021 20:36:25.024862051 CEST53645698.8.8.8192.168.2.7
Apr 8, 2021 20:36:26.457660913 CEST5281653192.168.2.78.8.8.8
Apr 8, 2021 20:36:26.477552891 CEST53528168.8.8.8192.168.2.7
Apr 8, 2021 20:36:26.722604036 CEST5078153192.168.2.78.8.8.8
Apr 8, 2021 20:36:26.735862017 CEST53507818.8.8.8192.168.2.7
Apr 8, 2021 20:36:52.940856934 CEST5423053192.168.2.78.8.8.8
Apr 8, 2021 20:36:52.954406023 CEST53542308.8.8.8192.168.2.7
Apr 8, 2021 20:36:53.004709959 CEST5491153192.168.2.78.8.8.8
Apr 8, 2021 20:36:53.018409014 CEST53549118.8.8.8192.168.2.7
Apr 8, 2021 20:36:59.098500967 CEST4995853192.168.2.78.8.8.8
Apr 8, 2021 20:36:59.111011982 CEST53499588.8.8.8192.168.2.7
Apr 8, 2021 20:37:14.608776093 CEST5086053192.168.2.78.8.8.8
Apr 8, 2021 20:37:14.624608994 CEST53508608.8.8.8192.168.2.7
Apr 8, 2021 20:37:24.458585978 CEST5045253192.168.2.78.8.8.8
Apr 8, 2021 20:37:24.472449064 CEST53504528.8.8.8192.168.2.7
Apr 8, 2021 20:37:54.713227034 CEST5973053192.168.2.78.8.8.8
Apr 8, 2021 20:37:54.726056099 CEST53597308.8.8.8192.168.2.7
Apr 8, 2021 20:38:19.167885065 CEST5931053192.168.2.78.8.8.8
Apr 8, 2021 20:38:19.181062937 CEST53593108.8.8.8192.168.2.7
Apr 8, 2021 20:38:19.822521925 CEST5191953192.168.2.78.8.8.8
Apr 8, 2021 20:38:19.837526083 CEST53519198.8.8.8192.168.2.7
Apr 8, 2021 20:38:20.359267950 CEST6429653192.168.2.78.8.8.8
Apr 8, 2021 20:38:20.472702026 CEST53642968.8.8.8192.168.2.7
Apr 8, 2021 20:38:21.086715937 CEST5668053192.168.2.78.8.8.8
Apr 8, 2021 20:38:21.101727009 CEST53566808.8.8.8192.168.2.7
Apr 8, 2021 20:38:21.528199911 CEST5882053192.168.2.78.8.8.8
Apr 8, 2021 20:38:21.541776896 CEST53588208.8.8.8192.168.2.7
Apr 8, 2021 20:38:21.716824055 CEST6098353192.168.2.78.8.8.8
Apr 8, 2021 20:38:21.744277954 CEST53609838.8.8.8192.168.2.7
Apr 8, 2021 20:38:22.060075045 CEST4924753192.168.2.78.8.8.8
Apr 8, 2021 20:38:22.073153973 CEST53492478.8.8.8192.168.2.7
Apr 8, 2021 20:38:22.459789038 CEST5228653192.168.2.78.8.8.8
Apr 8, 2021 20:38:22.473186970 CEST53522868.8.8.8192.168.2.7
Apr 8, 2021 20:38:23.178003073 CEST5606453192.168.2.78.8.8.8
Apr 8, 2021 20:38:23.191903114 CEST53560648.8.8.8192.168.2.7
Apr 8, 2021 20:38:24.355834961 CEST6374453192.168.2.78.8.8.8
Apr 8, 2021 20:38:24.371221066 CEST53637448.8.8.8192.168.2.7
Apr 8, 2021 20:38:24.683099031 CEST6145753192.168.2.78.8.8.8
Apr 8, 2021 20:38:24.695868015 CEST53614578.8.8.8192.168.2.7
Apr 8, 2021 20:38:30.105998993 CEST5836753192.168.2.78.8.8.8
Apr 8, 2021 20:38:30.132018089 CEST53583678.8.8.8192.168.2.7

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:20:36:05
Start date:08/04/2021
Path:C:\Users\user\Desktop\factura.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\factura.exe'
Imagebase:0x400000
File size:57344 bytes
MD5 hash:5950CBE94B3B5DEDBF7B75FA1B95AC84
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

General

Start time:20:38:18
Start date:08/04/2021
Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\factura.exe'
Imagebase:0x130000
File size:53248 bytes
MD5 hash:529695608EAFBED00ACA9E61EF333A7C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:20:38:18
Start date:08/04/2021
Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\factura.exe'
Imagebase:0x8a0000
File size:53248 bytes
MD5 hash:529695608EAFBED00ACA9E61EF333A7C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:20:38:19
Start date:08/04/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff774ee0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >