Loading ...

Play interactive tourEdit tour

Analysis Report ImmunityDebugger_1_85_setup.exe

Overview

General Information

Sample Name:ImmunityDebugger_1_85_setup.exe
Analysis ID:415756
MD5:b94ff046f678a5e89d06007ea24c57ec
SHA1:e01a72a487ac0e2ec02ddfc20fd2994919ef1e9a
SHA256:9c15cd47d018ccd99a6c8865baba20134c67061ae0e19232c32ecd0139ccfd42
Infos:

Most interesting Screenshot:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\Immunity Inc\Immunity Debugger\ImmunityDebugger.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    There are no malicious signatures, click here to show all signatures.

    Source: Updater.pem.0.drBinary or memory string: -----BEGIN PUBLIC KEY-----
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeWindow detected: &Next >CancelNullsoft Install System v2.46Please review the license agreement before installing Immunity Debugger. If you accept all terms of the agreement click the check box below. Click Next to continue.Last Updated: February 11 2009IMMUNITY INC.SOFTWARE LICENSE AGREEMENTTHIS LICENSE AGREEMENT (with the schedules annexed hereto the "Agreement") is made as of the day when registered on the download server between "Licensee" the user of the software whether corporate entity or individual and Immunity Inc "Licensor" a New York State based company with primary offices at 1130 Washington Avenue Floor 8 Miami Beach FL 33139. If the Licensee does not agree to the terms described within this document the Licensee is not authorized to install copy or otherwise use the Software.W I T N E S S E T H:WHEREAS Licensor is in the business among other things of licensing the proprietary software more particularly described in Schedule "A" attached hereto and made a part hereof which together with the object code registration key documentation and other materials are collectively referred to herein as the "Software"; andWHEREAS Licensor owns or has the license to all of the intellectual and other proprietary rights (including copyrights and trademarks) associated with the Software; andWHEREAS Licensee wishes to obtain a license to use the Software for the purpose of facilitating Licensee's business; andWHEREAS Licensor is willing to grant a non-exclusive license to Licensee to use the Software pursuant to the terms conditions and limitations hereinafter set forth.NOW THEREFORE in consideration of the mutual promises and obligations hereinafter contained the parties have agreed as follows:1. Grant of License Term1.1 Subject to the terms and conditions of this Agreement Licensor hereby grants to Licensee a limited non-exclusive non-transferable non-assignable right and license (the "License") to access download install and use the Software on the licensed number of computers (identified in Schedule "A") solely for the uses as set forth in Section 2 of this Agreement.1.2 The term of the License granted herein shall be in perpetuity ("Term") unless otherwise terminated pursuant with this Agreement.1.3 Licensor shall deliver to Licensee the Software within 5 business days of the Effective Date.2. Scope and Use of License2.1 Licensee agrees that the License granted hereunder is limited to use the Software internally and only in connection with Licensee's business in accordance with the terms of this Agreement.2.2 Licensee shall not decompile reverse compile disassemble decode or otherwise reverse engineer the Software. Licensee shall not modify or translate the Software or create any derivative works based on the Software. Except as otherwise set forth in this Agreement Licensee shall not publish distribute market rent lease sublicense or assign all or any portion of the Software. Porting the Software to another framework or product is a violation of this licen
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\LICENSE.txtJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407A42 FindFirstFileA,FindClose,0_2_00407A42
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407E0E DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00407E0E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040334A FindFirstFileA,0_2_0040334A
    Source: Changelog.txt.0.drString found in binary or memory: http://PEiD.info/BobSoft/)
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://auth.immunityinc.com/ImmunityDebugger/ID_getads.py
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://auth.immunityinc.com/ImmunityDebugger/ID_getads.pyImmunity
    Source: Changelog.txt.0.dr, Credits.txt.0.drString found in binary or memory: http://code.google.com/p/pefile/)
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/ID_adref.py?referer=
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/ID_adref.py?referer=%s%sSoftware
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/ID_checkupdate.py
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/ID_checkupdate.pyhttp://debugger.immunityinc.com/update/ImmunityDebu
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/update/ImmunityDebugger.exe
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/update/ImmunityDebugger.exeSignature
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://debugger.immunityinc.com/update/ImmunityDebugger.sig
    Source: Libs.libheap.Win7LFHeap-class.html.0.drString found in binary or memory: http://epydoc.sourceforge.net
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://forum.immunityinc.com/
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=137.0)
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=138.0)
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=140.0)
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=157.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=158.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=159.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=162
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=163.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=34
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=49.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=63.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=74.0
    Source: Changelog.txt.0.drString found in binary or memory: http://forum.immunityinc.com/index.php?topic=84.0
    Source: ImmunityDebugger_1_85_setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: ImmunityDebugger_1_85_setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Changelog.txt.0.drString found in binary or memory: http://peid.info/BobSoft/Downloads.html)
    Source: activex.py.0.drString found in binary or memory: http://sourceforge.net/projects/comtypes/
    Source: UserDB.TXT.0.drString found in binary or memory: http://wibu.com/us/
    Source: pelib.py.0.drString found in binary or memory: http://win32assembly.online.fr/files/pe1.zip
    Source: hidedebug.py.0.drString found in binary or memory: http://www.PEiD.info/BobSoft/
    Source: scanpe.py.0.drString found in binary or memory: http://www.SecretAsHell.com/BobSoft/
    Source: horse.py.0.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: funsniff.py.0.dr, ImmunityDebugger.exe.0.dr, Libs.librecognition-module.html.0.dr, Libs.immlib-module.html.0.dr, pelib.py.0.dr, stackvars.py.0.dr, libheap.py.0.dr, graphclass.py.0.dr, libstackanalyze.py.0.drString found in binary or memory: http://www.immunityinc.com
    Source: Libs.libevent-pysrc.html.0.dr, Libs.immvcglib-pysrc.html.0.dr, Libs.debugtypes-pysrc.html.0.dr, Libs.immutils-pysrc.html.0.dr, Libs.libanalyze-pysrc.html.0.dr, Libs.graphclass-pysrc.html.0.drString found in binary or memory: http://www.immunityinc.com>
    Source: pelib.py.0.dr, Libs.pelib-module.html.0.drString found in binary or memory: http://www.immunityinc.com/CANVAS/
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://www.immunityinc.comDVarFileInfo$
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://www.immunityinc.comopen
    Source: syscall.py.0.drString found in binary or memory: http://www.openrce.org/blog/view/1077/Digging_up_system_call_ordinals
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://www.openssl.org/support/faq.html
    Source: ImmunityDebugger.exe.0.drString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
    Source: UserDB.TXT.0.drString found in binary or memory: http://www.oreans.com
    Source: Libs.immvcglib-pysrc.html.0.dr, immvcglib.py.0.drString found in binary or memory: http://www.penguin-soft.com/penguin/man/1/vcg.html
    Source: Credits.txt.0.drString found in binary or memory: http://www.secretashell.com/BobSoft/
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00406B9F GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00406B9F
    Source: Yara matchFile source: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\ImmunityDebugger.exe, type: DROPPED
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F EntryPoint,InitCommonControls,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,DeleteFileA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,OleUninitialize,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040407F
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0041F0350_2_0041F035
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0042655E0_2_0042655E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0041D96E0_2_0041D96E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0041EE340_2_0041EE34
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00424E970_2_00424E97
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0042635D0_2_0042635D
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.503771718.00000000027A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs ImmunityDebugger_1_85_setup.exe
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DEBUG_STRIPPED, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: ImmunityDebugger.exe.0.drBinary string: iphlpapi.dllAllocateAndGetTcpExTableFromStackAllocateAndGetUdpExTableFromStackkernel32.dll%d.%d.%d.%dFailed to snapshot TCP EndpointFailed to snapshot UDP EndpointFailed to take process SnapshotRtlInitUnicodeStringZwOpenSectionInitializeObjectAttributesZwOpenFile\Device\PhysicalMemory\Device\Tcp\Device\UdpCould not map TCPCould not map UDPCould not open HandlesError accesing memoryDebugActiveProcessStopSymCleanup%s s,s,sSearching in %sSearch Done.Unable to allocate %li bytes of memorySearching for callsk(k,i,k)(k,i,i,k)k[k,k,k,k,i,s,s,s]w+zzz.txt%i%s
    Source: classification engineClassification label: clean4.winEXE@1/278@0/0
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004053A4 GetDlgItem,SetWindowTextA,SHAutoComplete,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,MulDiv,0_2_004053A4
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004028AD CoCreateInstance,MultiByteToWideChar,0_2_004028AD
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity IncJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Users\Public\Desktop\Immunity Debugger.lnkJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsqAA72.tmpJump to behavior
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: Section: .text IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile read: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile written: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\ImmunityDebugger.iniJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAutomated click: I accept
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAutomated click: Next >
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAutomated click: Install
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAutomated click: Install
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeWindow detected: &Next >CancelNullsoft Install System v2.46Please review the license agreement before installing Immunity Debugger. If you accept all terms of the agreement click the check box below. Click Next to continue.Last Updated: February 11 2009IMMUNITY INC.SOFTWARE LICENSE AGREEMENTTHIS LICENSE AGREEMENT (with the schedules annexed hereto the "Agreement") is made as of the day when registered on the download server between "Licensee" the user of the software whether corporate entity or individual and Immunity Inc "Licensor" a New York State based company with primary offices at 1130 Washington Avenue Floor 8 Miami Beach FL 33139. If the Licensee does not agree to the terms described within this document the Licensee is not authorized to install copy or otherwise use the Software.W I T N E S S E T H:WHEREAS Licensor is in the business among other things of licensing the proprietary software more particularly described in Schedule "A" attached hereto and made a part hereof which together with the object code registration key documentation and other materials are collectively referred to herein as the "Software"; andWHEREAS Licensor owns or has the license to all of the intellectual and other proprietary rights (including copyrights and trademarks) associated with the Software; andWHEREAS Licensee wishes to obtain a license to use the Software for the purpose of facilitating Licensee's business; andWHEREAS Licensor is willing to grant a non-exclusive license to Licensee to use the Software pursuant to the terms conditions and limitations hereinafter set forth.NOW THEREFORE in consideration of the mutual promises and obligations hereinafter contained the parties have agreed as follows:1. Grant of License Term1.1 Subject to the terms and conditions of this Agreement Licensor hereby grants to Licensee a limited non-exclusive non-transferable non-assignable right and license (the "License") to access download install and use the Software on the licensed number of computers (identified in Schedule "A") solely for the uses as set forth in Section 2 of this Agreement.1.2 The term of the License granted herein shall be in perpetuity ("Term") unless otherwise terminated pursuant with this Agreement.1.3 Licensor shall deliver to Licensee the Software within 5 business days of the Effective Date.2. Scope and Use of License2.1 Licensee agrees that the License granted hereunder is limited to use the Software internally and only in connection with Licensee's business in accordance with the terms of this Agreement.2.2 Licensee shall not decompile reverse compile disassemble decode or otherwise reverse engineer the Software. Licensee shall not modify or translate the Software or create any derivative works based on the Software. Except as otherwise set forth in this Agreement Licensee shall not publish distribute market rent lease sublicense or assign all or any portion of the Software. Porting the Software to another framework or product is a violation of this licen
    Source: ImmunityDebugger_1_85_setup.exeStatic file information: File size 22749412 > 1048576
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407B28 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00407B28
    Source: ImmunityDebugger_1_85_setup.exeStatic PE information: real checksum: 0x1b6cd should be:
    Source: loaddll.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xe500
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push ebx; mov dword ptr [esp], 00000000h0_2_0040409D
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push eax; mov dword ptr [esp], 00000000h0_2_0040411F
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push ecx; mov dword ptr [esp], eax0_2_0040415D
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push esi; mov dword ptr [esp], ebx0_2_0040426A
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push eax; mov dword ptr [esp], 0043A400h0_2_0040432E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push ecx; mov dword ptr [esp], 0042B810h0_2_0040439C
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push eax; mov dword ptr [esp], 0042B810h0_2_00404403
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040407F push ebx; mov dword ptr [esp], 00000002h0_2_00404485
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00401834 push eax; mov dword ptr [esp], ebx0_2_004018E5
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00403CB7 push ebx; mov dword ptr [esp], 00439C00h0_2_00403D38
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00406A5D push eax; mov dword ptr [esp], 0042D474h0_2_00406A96
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407A78 push ebx; mov dword ptr [esp], 0042E0B8h0_2_00407A94
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407A78 push edx; mov dword ptr [esp], 0042E0B8h0_2_00407AFA
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407A78 push ecx; mov dword ptr [esp], 0042E0B8h0_2_00407B09
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00401AC9 push edx; mov dword ptr [esp], eax0_2_00401B10
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00401AC9 push esi; mov dword ptr [esp], 0040C004h0_2_00401B27
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407769 push eax; mov dword ptr [esp], ebx0_2_004079DC
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004057D7 push edx; mov dword ptr [esp], eax0_2_00405A8F
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004057D7 push ecx; mov dword ptr [esp], esi0_2_00405A9B
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004057D7 push esi; mov dword ptr [esp], eax0_2_00405AE0
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00403FDC push eax; mov dword ptr [esp], 0043A400h0_2_00403FEF
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00405B86 push eax; mov dword ptr [esp], ebx0_2_00405D2A
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00405B86 push ebx; mov dword ptr [esp], 00439400h0_2_00405D45
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00405B86 push eax; mov dword ptr [esp], 0040B340h0_2_00405ECA
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00405B86 push ecx; mov dword ptr [esp], 00000001h0_2_00405F87
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00406B9F push eax; mov dword ptr [esp], 00000015h0_2_00406C76
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00406B9F push eax; mov dword ptr [esp], esi0_2_00406EB3
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00406B9F push edx; mov dword ptr [esp], eax0_2_0040707E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004053A4 push ecx; mov dword ptr [esp], ebx0_2_004053E5
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004053A4 push ecx; mov dword ptr [esp], ebx0_2_00405414
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_004053A4 push ecx; mov dword ptr [esp], ebx0_2_00405537
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Bookmark.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Cmdline.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\ImmunityDebugger.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\debugger.pydJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Libs\x86smt\libgmp-10.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\loaddll.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Libs\x86smt\libcvc3.2.1.1.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\LICENSE.txtJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Immunity IncJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Immunity Inc\Immunity DebuggerJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Immunity Inc\Immunity Debugger\Immunity Debugger.lnkJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Immunity Inc\Immunity Debugger\Uninstall.lnkJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Cmdline.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Bookmark.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\ImmunityDebugger.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\debugger.pydJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Libs\x86smt\libgmp-10.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\loaddll.exeJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeDropped PE file which has not been started: C:\Program Files (x86)\Immunity Inc\Immunity Debugger\Libs\x86smt\libcvc3.2.1.1.dllJump to dropped file
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile Volume queried: C:\Program Files (x86) FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeFile Volume queried: C:\Program Files (x86) FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407A42 FindFirstFileA,FindClose,0_2_00407A42
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407E0E DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00407E0E
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_0040334A FindFirstFileA,0_2_0040334A
    Source: debugger.pyd.0.drBinary or memory string: check_vmware
    Source: debugger.pyd.0.drBinary or memory string: Check if vmware is present
    Source: ImmunityDebugger.exe.0.drBinary or memory string: AddRowHeaderAddhooksAddsorteddataAddtolistAnalysecodeAnimateArefgettextAreggettextAssembleAttachtoactiveprocessBroadcastBrowsefilenameCalculatecrcCheckconditionCheckhookCompressCreatedumpwindowCreatelistwindowCreatepatchwindowCreateprofilewindowCreatertracewindowCreatesorteddataCreatethreadwindowCreatewatchwindowCreatewinwindowDecodeaddressDecodeasciiDecodecharacterDecodefullvarnameDecodeknownargumentDecodenameDecoderangeDecoderelativeoffsetDecodethreadnameDecodeunicodeDecompressDefaultbarDeletebreakpointsDeletehardwarebreakbyaddrDeletehardwarebreakpointDeletenamerangeDeletenonconfirmedsorteddataDeleteruntraceDeletesorteddataDeletesorteddatarangeDeletewatchDemanglenameDestroysorteddataDisasmDisassemblebackDisassembleforwardDiscardquicknamesDumpbackupErrorExecutehooktimeoutExpressionFindallcommandsFindalldllcallsFindallsequencesFinddecodeFindfileoffsetFindfixupFindhittraceFindimportbynameFindlabelFindlabelbynameFindmemoryFindmoduleFindnameFindnextnameFindnextprocFindnextruntraceipFindprevprocFindprevruntraceipFindprocbeginFindprocendFindreferencesFindsorteddataFindsorteddataindexFindsorteddatarangeFindstringsFindsymbolicnameFindthreadFindunknownfunctionFlashFollowcallGet3dnowGet3dnowxyGetaddressfromlineGetasmfindmodelGetasmfindmodelxyGetbprelnameGetbreakpointtypeGetbreakpointtypecountGetcputhreadidGetdisassemblerrangeGetfloatGetfloat10Getfloat10xyGetfloatxyGethexstringGethexstringxyGetlineGetlinefromaddressGetlinexyGetlongGetlongxyGetmmxGetmmxxyGetnextbreakpointGetoriginaldatasizeGetproclimitsGetregistersGetregxyGetresourcestringGetruntraceprofileGetruntraceregistersGetsortedbyselectionGetsourcefilelimitsGetstatusGettableselectionxyGettextGettextxyGetwatchGoGraphAddGuardmemoryHardbreakpointsHavecopyofmemoryInfolineInjectcodeInsertnameInsertwatchIsadministratorIsfillingIsprefixIsretaddrIssuspiciousIstextAIstextWListhookListmemoryLoopTickingManualbreakpointMergequicknamesMessageModifyhittraceNewtablewindowOpenEXEfilePainttableParseasmoperandPlugingetvaluePluginreadintfrominiPluginreadstringfrominiPluginsaverecordPluginwriteinttoiniPluginwritestringtoiniPrepareasmseqPreparefornewprocessPrint3dnowPrintfloat10Printfloat4Printfloat8PrintsseProgressPyCommitKnowledgePyDetachPyExitIDPyFindDataRefPyFindStringsPyGetUDDKnowledgePyGetVariableNamePyGetallbasicblocksPyGoSilentPyIgnoreSingleStepPySetVariableNamePyShowgraphPyStdout_CatcherPyaddknowledgePycmdexecPycomboPycreategraphwindowPyforgetknowledgePygetallhandlesPygetallnamesPygetallthreadsPygetcallstackPygetcalltreePygeteventPygetintercallPygetknowledgePygetpanelinfoPygetsehchainPygetthreadidPyinputPylistknowledgePypsPysetregPyshellcallPyshowtextwindowPythonsearchPyvqueryQuickinsertnameQuicktablewindowReadcommandReadmemoryRedrawdisassemblerRegisterotclassRegisterpluginclassRemovehookRestoreallthreadsRunsinglethreadRuntracesizeScanmodulesScrollruntracewindowSelectandscrollSendshortcutSetIncludePathSetbreakpointSetbreakpointextSetcpuSetdisasmSetdumptypeSethardwarebreakpointSetmembreakpointSetstatusSettracecon
    Source: ImmunityDebugger.exe.0.drBinary or memory string: vmware_detect
    Source: api-objects.txt.0.drBinary or memory string: Libs.immlib.Debugger.isVmWareLibs.immlib.Debugger-class.html#isVmWare
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAPI call chain: ExitProcess graph end nodegraph_0-3900
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeAPI call chain: ExitProcess graph end nodegraph_0-3568
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407B28 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00407B28
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.500694936.0000000001290000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.500694936.0000000001290000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.500694936.0000000001290000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.500694936.0000000001290000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
    Source: ImmunityDebugger_1_85_setup.exe, 00000000.00000002.500694936.0000000001290000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\ImmunityDebugger_1_85_setup.exeCode function: 0_2_00407769 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00407769

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsNative API1Registry Run Keys / Startup Folder1Process Injection1Masquerading2OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.