Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKD.46243806.32106.30285

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKD.46243806.32106.30285 (renamed file extension from 30285 to exe)
Analysis ID:404310
MD5:cce6c363c0ff7ac663cd71c5906069a6
SHA1:98ad5e24bf99fbb4cf7bdcaa54b6d720064dc810
SHA256:b65eed317058df5ddd4247ec93ac2b555ae2c29b751ee455ceee3dd9b670ecad
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Creates an undocumented autostart registry key
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "bigazz@sixjan.xyzH^i?T2&gWQ({sixjan.xyz"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe PID: 1848JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe PID: 1848JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0.2.SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.428c788.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "bigazz@sixjan.xyzH^i?T2&gWQ({sixjan.xyz"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeReversingLabs: Detection: 40%
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exeReversingLabs: Detection: 40%
          Multi AV Scanner detection for submitted fileShow sources
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeVirustotal: Detection: 30%Perma Link
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeReversingLabs: Detection: 40%
          Source: 16.2.SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA4D92h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA5032h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA4D92h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA5032h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA4D92h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA4D92h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 4x nop then jmp 05FA5032h
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: http://mNVnNH.com
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://ocsp.digicert.com0A
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://ocsp.digicert.com0C
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://ocsp.digicert.com0H
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://ocsp.digicert.com0I
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: https://discord.com/
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: https://discord.com/2
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: https://discord.com/6
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: https://discord.com/:
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeString found in binary or memory: https://www.digicert.com/CPS0
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.341547950.00000000013EB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess Stats: CPU usage > 98%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F1DF98
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F195B0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F14F90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F181E8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F1ABE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F70CD0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F71432
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F7E7A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F7E540
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F7E536
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F7E797
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F72150
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA009E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA6458
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA1850
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA193C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA6448
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA1C08
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA37C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05FA37B0
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 16_2_02A34E40
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 16_2_02A3EA8A
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 16_2_02A34E32
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe B65EED317058DF5DDD4247EC93AC2B555AE2C29B751EE455CEEE3DD9B670ECAD
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe B65EED317058DF5DDD4247EC93AC2B555AE2C29B751EE455CEEE3DD9B670ECAD
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: invalid certificate
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.341547950.00000000013EB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.341092452.0000000000C70000.00000002.00020000.sdmpBinary or memory string: OriginalFilename44444.exe^ vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.345992042.0000000005C90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.346362509.0000000005F80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBtuucsui.dll" vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.341983354.00000000031C2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamehHjrmKPrlxwsmtWVgQPQZlucKNq.exe4 vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 0000000F.00000002.338937682.0000000000280000.00000002.00020000.sdmpBinary or memory string: OriginalFilename44444.exe^ vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.481465313.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamehHjrmKPrlxwsmtWVgQPQZlucKNq.exe4 vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000000.339515688.0000000000730000.00000002.00020000.sdmpBinary or memory string: OriginalFilename44444.exe^ vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.483591584.0000000000D3A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeBinary or memory string: OriginalFilename44444.exe^ vs SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: notpad.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal96.troj.evad.winEXE@5/5@0/0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpadJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeJump to behavior
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeVirustotal: Detection: 30%
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeReversingLabs: Detection: 40%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 0_2_05F1F66C pushad ; ret
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeCode function: 16_2_02A31BAB push es; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.96408240927
          Source: initial sampleStatic PE information: section name: .text entropy: 7.96408240927
          Source: initial sampleStatic PE information: section name: .text entropy: 7.96408240927
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exeJump to dropped file

          Boot Survival:

          barindex
          Creates an undocumented autostart registry key Show sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpadJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.346362509.0000000005F80000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWindow / User API: threadDelayed 800
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWindow / User API: threadDelayed 9009
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe TID: 4888Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe TID: 5812Thread sleep time: -20291418481080494s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe TID: 5848Thread sleep count: 800 > 30
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe TID: 5848Thread sleep count: 9009 > 30
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe TID: 5812Thread sleep count: 43 > 30
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeThread delayed: delay time: 922337203685477
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000000.00000002.346362509.0000000005F80000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 400000 value starts with: 4D5A
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 400000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 402000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 46C000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 46E000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeMemory written: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe base: 9EC008
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeProcess created: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484585171.0000000001580000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484585171.0000000001580000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484585171.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484585171.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe PID: 1848, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe PID: 1848, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe PID: 1848, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder11Process Injection212Masquerading1Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Disable or Modify Tools1LSASS MemorySecurity Software Discovery311Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information3LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing3Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe31%VirustotalBrowse
          SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe40%ReversingLabsByteCode-MSIL.Downloader.Seraph

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe40%ReversingLabsByteCode-MSIL.Downloader.Seraph
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe40%ReversingLabsByteCode-MSIL.Downloader.Seraph

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.2.SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.428c788.2.unpack100%AviraHEUR/AGEN.1110362Download File
          16.2.SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
          0.2.SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.432c7a8.3.unpack100%AviraHEUR/AGEN.1110362Download File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
          https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
          https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
          https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
          https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
          https://discord.com/20%Avira URL Cloudsafe
          http://DynDns.comDynDNS0%URL Reputationsafe
          http://DynDns.comDynDNS0%URL Reputationsafe
          http://DynDns.comDynDNS0%URL Reputationsafe
          http://DynDns.comDynDNS0%URL Reputationsafe
          https://discord.com/0%URL Reputationsafe
          https://discord.com/0%URL Reputationsafe
          https://discord.com/0%URL Reputationsafe
          https://discord.com/0%URL Reputationsafe
          https://discord.com/60%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
          http://mNVnNH.com0%Avira URL Cloudsafe
          https://discord.com/:0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          low
          https://api.ipify.org%GETMozilla/5.0SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          https://discord.com/2SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exefalse
          • Avira URL Cloud: safe
          unknown
          http://DynDns.comDynDNSSecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://discord.com/SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exefalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://discord.com/6SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exefalse
          • Avira URL Cloud: safe
          unknown
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://mNVnNH.comSecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe, 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://discord.com/:SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exefalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          No contacted IP infos

          General Information

          Joe Sandbox Version:32.0.0 Black Diamond
          Analysis ID:404310
          Start date:04.05.2021
          Start time:22:10:56
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 47s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:SecuriteInfo.com.Trojan.GenericKD.46243806.32106.30285 (renamed file extension from 30285 to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:27
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal96.troj.evad.winEXE@5/5@0/0
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.1% (good quality ratio 0.1%)
          • Quality average: 62.5%
          • Quality standard deviation: 14.5%
          HCA Information:
          • Successful, ratio: 96%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          Warnings:
          Show All
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          22:13:06API Interceptor359x Sleep call for process: SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exeIMG_05412_868_21.docxGet hashmaliciousBrowse
            C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exeIMG_05412_868_21.docxGet hashmaliciousBrowse

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.log
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):697
              Entropy (8bit):5.329165082425189
              Encrypted:false
              SSDEEP:12:Q3La/hzzAbDLI4M9tDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhat/DLI4M/DD:MLasXE4qpE4Ks2wKDE4KhK3VZ9pKhgLU
              MD5:0832DF9444C16D83CFAAE29AC72D03D6
              SHA1:AA245EF747FBA8996C83FC74147657D51467C058
              SHA-256:5039464C89038FB81B6DFF61330D29D31630C393AB578CDEC6628699E8906C76
              SHA-512:5C2F08CFC35E6579972E20C9241313B52B89D419B8EE0C51E248AFC094B3C816B09427E4806C5DDD0E050C3AC24ACB61CD2E8D78415BCEF01491F2D6FC8FFDD4
              Malicious:true
              Reputation:low
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.CSharp, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Dynamic, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
              C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):343352
              Entropy (8bit):7.841371992370745
              Encrypted:false
              SSDEEP:6144:FL4Qez8X+5KBrIxuNWUwJm4OdB17ZDs0s7xHAVkYifH4TWcwb8tFHQK:V4Qez+YSSjUAmdr17Zw0+geYqH41wb88
              MD5:CCE6C363C0FF7AC663CD71C5906069A6
              SHA1:98AD5E24BF99FBB4CF7BDCAA54B6D720064DC810
              SHA-256:B65EED317058DF5DDD4247EC93AC2B555AE2C29B751EE455CEEE3DD9B670ECAD
              SHA-512:C3E28465D1FB8673D4B203D3A985AF370255E1381EA8D9DB910F213EFFC4F5C3CA0214497FA783396A25C4316D5CDDE6F05A35BBF44581EF5BC4C2FCD4F8FA1B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 40%
              Joe Sandbox View:
              • Filename: IMG_05412_868_21.docx, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..`.....................J......^.... ........@.. ....................................@.....................................K.......,G..............8....`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc...,G.......H..................@..@.reloc.......`......................@..B................@.......H........J..$,...........w...y...........................................0...........:.........(/...8....&.....(...........s....o.... .>n.(5....:6...& .>n.(5.........%.(-.....:!...&& a>n.(5...('...&8....((...8....(*...8....*.................0..........(.........(....o.... ^>n.(5...(....o.....:....&8.....8....s.....:....&..o.....o....s.....9....&8.....8.....8....s.......s....s.........o...........o......o............o...........o.....(......o............9.....o.......*.4......
              C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):343352
              Entropy (8bit):7.841371992370745
              Encrypted:false
              SSDEEP:6144:FL4Qez8X+5KBrIxuNWUwJm4OdB17ZDs0s7xHAVkYifH4TWcwb8tFHQK:V4Qez+YSSjUAmdr17Zw0+geYqH41wb88
              MD5:CCE6C363C0FF7AC663CD71C5906069A6
              SHA1:98AD5E24BF99FBB4CF7BDCAA54B6D720064DC810
              SHA-256:B65EED317058DF5DDD4247EC93AC2B555AE2C29B751EE455CEEE3DD9B670ECAD
              SHA-512:C3E28465D1FB8673D4B203D3A985AF370255E1381EA8D9DB910F213EFFC4F5C3CA0214497FA783396A25C4316D5CDDE6F05A35BBF44581EF5BC4C2FCD4F8FA1B
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 40%
              Joe Sandbox View:
              • Filename: IMG_05412_868_21.docx, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..`.....................J......^.... ........@.. ....................................@.....................................K.......,G..............8....`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc...,G.......H..................@..@.reloc.......`......................@..B................@.......H........J..$,...........w...y...........................................0...........:.........(/...8....&.....(...........s....o.... .>n.(5....:6...& .>n.(5.........%.(-.....:!...&& a>n.(5...('...&8....((...8....(*...8....*.................0..........(.........(....o.... ^>n.(5...(....o.....:....&8.....8....s.....:....&..o.....o....s.....9....&8.....8.....8....s.......s....s.........o...........o......o............o...........o.....(......o............9.....o.......*.4......
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:false
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.841371992370745
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              • Win32 Executable (generic) a (10002005/4) 49.97%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              File size:343352
              MD5:cce6c363c0ff7ac663cd71c5906069a6
              SHA1:98ad5e24bf99fbb4cf7bdcaa54b6d720064dc810
              SHA256:b65eed317058df5ddd4247ec93ac2b555ae2c29b751ee455ceee3dd9b670ecad
              SHA512:c3e28465d1fb8673d4b203d3a985af370255e1381ea8d9db910f213effc4f5c3ca0214497fa783396a25c4316d5cdde6f05a35bbf44581ef5bc4c2fcd4f8fa1b
              SSDEEP:6144:FL4Qez8X+5KBrIxuNWUwJm4OdB17ZDs0s7xHAVkYifH4TWcwb8tFHQK:V4Qez+YSSjUAmdr17Zw0+geYqH41wb88
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..`.....................J......^.... ........@.. ....................................@................................

              File Icon

              Icon Hash:0378d8d6dad83047

              Static PE Info

              General

              Entrypoint:0x44f05e
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x60908048 [Mon May 3 22:59:20 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Authenticode Signature

              Signature Valid:false
              Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
              Signature Validation Error:The digital signature of the object did not verify
              Error Number:-2146869232
              Not Before, Not After
              • 3/13/2018 5:00:00 PM 2/18/2021 4:00:00 AM
              Subject Chain
              • CN=Discord Inc., O=Discord Inc., L=San Francisco, S=California, C=US, SERIALNUMBER=5128862, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
              Version:3
              Thumbprint MD5:831AE83D7C56E51AE513F0ED5D99DC4E
              Thumbprint SHA-1:1E6706B746A7409F4E9A39855C5DDE4155A13056
              Thumbprint SHA-256:584035E0344227FC32C92A7F3FD4D88594A26C2E953360543D613329E99122DD
              Serial:04F131322CC31D92C849FCA351D2F141

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x4f0100x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x472c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x51e000x1f38.rsrc
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x4d0640x4d200False0.96637902654data7.96408240927IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0x500000x472c0x4800False0.0664605034722data2.1900964107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x560000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0x501300x4028data
              RT_GROUP_ICON0x541580x14data
              RT_VERSION0x5416c0x40adata
              RT_MANIFEST0x545780x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightCopyright (c) 2020 Discord Inc. All rights reserved.
              Assembly Version0.0.52.0
              InternalName44444.exe
              FileVersion0.0.52.0
              CompanyNameDiscord Inc.
              LegalTrademarks
              CommentsDiscord - https://discord.com/
              ProductNameDiscord - https://discord.com/
              ProductVersion0.0.52.0
              FileDescriptionDiscord - https://discord.com/
              OriginalFilename44444.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:22:11:51
              Start date:04/05/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe'
              Imagebase:0xc20000
              File size:343352 bytes
              MD5 hash:CCE6C363C0FF7AC663CD71C5906069A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Reputation:low

              General

              Start time:22:12:48
              Start date:04/05/2021
              Path:C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Imagebase:0x230000
              File size:343352 bytes
              MD5 hash:CCE6C363C0FF7AC663CD71C5906069A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 40%, ReversingLabs
              Reputation:low

              General

              Start time:22:12:49
              Start date:04/05/2021
              Path:C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
              Imagebase:0x6e0000
              File size:343352 bytes
              MD5 hash:CCE6C363C0FF7AC663CD71C5906069A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.484888113.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >