Loading ...

Play interactive tourEdit tour

Windows Analysis Report 8rbuJ8Ycv1

Overview

General Information

Sample Name:8rbuJ8Ycv1 (renamed file extension from none to exe)
Analysis ID:451510
MD5:546f9c26cb739f1e3ea5ba1605aa7328
SHA1:452ee936bbade0510c6c56d6e2b25f6ce7b835ff
SHA256:6bd6a8e685288ca0af1d41d4d88fabd465f211c7cef32c00c994b89ea0a94f51
Infos:

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 8rbuJ8Ycv1.exe (PID: 6936 cmdline: 'C:\Users\user\Desktop\8rbuJ8Ycv1.exe' MD5: 546F9C26CB739F1E3EA5BA1605AA7328)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: 8rbuJ8Ycv1.exeVirustotal: Detection: 20%Perma Link
Source: 8rbuJ8Ycv1.exeReversingLabs: Detection: 41%
Source: 8rbuJ8Ycv1.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 NtAllocateVirtualMemory,1_2_02B68362
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68383 NtAllocateVirtualMemory,1_2_02B68383
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683F0 NtAllocateVirtualMemory,1_2_02B683F0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B684CF NtAllocateVirtualMemory,1_2_02B684CF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68423 NtAllocateVirtualMemory,1_2_02B68423
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68577 NtAllocateVirtualMemory,1_2_02B68577
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683621_2_02B68362
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662AE1_2_02B662AE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B672931_2_02B67293
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662F21_2_02B662F2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B642E71_2_02B642E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE1_2_02B652EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B622D41_2_02B622D4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662C11_2_02B662C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B632321_2_02B63232
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6623A1_2_02B6623A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B1_2_02B6423B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B622761_2_02B62276
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B2561_2_02B6B256
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6424C1_2_02B6424C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B663971_2_02B66397
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683831_2_02B68383
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6438F1_2_02B6438F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B673F61_2_02B673F6
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683F01_2_02B683F0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6D3E01_2_02B6D3E0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B653EF1_2_02B653EF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B663C11_2_02B663C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A30B1_2_02B6A30B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B673571_2_02B67357
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B653471_2_02B65347
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6D0E41_2_02B6D0E4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E0CB1_2_02B6E0CB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E0161_2_02B6E016
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B0721_2_02B6B072
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B670781_2_02B67078
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6318B1_2_02B6318B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B661F41_2_02B661F4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B671E71_2_02B671E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6312F1_2_02B6312F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B671431_2_02B67143
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B606A31_2_02B606A3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6469F1_2_02B6469F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B666F71_2_02B666F7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B606231_2_02B60623
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B6291_2_02B6B629
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B6771_2_02B6B677
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B666471_2_02B66647
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B606401_2_02B60640
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C7871_2_02B6C787
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B647FB1_2_02B647FB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B667EC1_2_02B667EC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C70C1_2_02B6C70C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6570B1_2_02B6570B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B657091_2_02B65709
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B647441_2_02B64744
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B604971_2_02B60497
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B664EB1_2_02B664EB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B604D71_2_02B604D7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B684CF1_2_02B684CF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B664321_2_02B66432
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B644331_2_02B64433
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C4391_2_02B6C439
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B684231_2_02B68423
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6546B1_2_02B6546B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B635B81_2_02B635B8
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B675971_2_02B67597
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B665821_2_02B66582
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B645DB1_2_02B645DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6450F1_2_02B6450F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A5761_2_02B6A576
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6455F1_2_02B6455F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68ADE1_2_02B68ADE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CADF1_2_02B6CADF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65AC11_2_02B65AC1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68A3E1_2_02B68A3E
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64A2B1_2_02B64A2B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CA441_2_02B6CA44
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66B8F1_2_02B66B8F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68BFF1_2_02B68BFF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60BFA1_2_02B60BFA
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63BE11_2_02B63BE1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67BC01_2_02B67BC0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65BCF1_2_02B65BCF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65B231_2_02B65B23
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60B0E1_2_02B60B0E
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CB661_2_02B6CB66
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63B631_2_02B63B63
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68B6F1_2_02B68B6F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63B571_2_02B63B57
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65B521_2_02B65B52
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60B431_2_02B60B43
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B648B71_2_02B648B7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C8BF1_2_02B6C8BF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B658A41_2_02B658A4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E8D51_2_02B6E8D5
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B668DB1_2_02B668DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C8181_2_02B6C818
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B668431_2_02B66843
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B649901_2_02B64990
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B689EE1_2_02B689EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6093C1_2_02B6093C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C93A1_2_02B6C93A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B649261_2_02B64926
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B609191_2_02B60919
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B669761_2_02B66976
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63EB31_2_02B63EB3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67E961_2_02B67E96
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DED71_2_02B6DED7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62E3F1_2_02B62E3F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64E7B1_2_02B64E7B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DE541_2_02B6DE54
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CFF81_2_02B6CFF8
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66F1F1_2_02B66F1F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63F6B1_2_02B63F6B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DF5F1_2_02B6DF5F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60CB21_2_02B60CB2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68CA71_2_02B68CA7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63CA21_2_02B63CA2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CCAC1_2_02B6CCAC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC931_2_02B6DC93
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CCF61_2_02B6CCF6
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61CE91_2_02B61CE9
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DCCA1_2_02B6DCCA
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC331_2_02B6DC33
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63C381_2_02B63C38
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC221_2_02B6DC22
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CC0B1_2_02B6CC0B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66C6A1_2_02B66C6A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CC531_2_02B6CC53
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63C5D1_2_02B63C5D
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62DA31_2_02B62DA3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CDA31_2_02B6CDA3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65D821_2_02B65D82
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63DFF1_2_02B63DFF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DDD31_2_02B6DDD3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62D301_2_02B62D30
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DD071_2_02B6DD07
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66D0F1_2_02B66D0F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61D681_2_02B61D68
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63D431_2_02B63D43
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60D4F1_2_02B60D4F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DD4C1_2_02B6DD4C
Source: 8rbuJ8Ycv1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 8rbuJ8Ycv1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181494072.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIncompr3.exe vs 8rbuJ8Ycv1.exe
Source: 8rbuJ8Ycv1.exeBinary or memory string: OriginalFilenameIncompr3.exe vs 8rbuJ8Ycv1.exe
Source: 8rbuJ8Ycv1.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal60.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeFile created: C:\Users\user\AppData\Local\Temp\~DF10ABBB8848BCA337.TMPJump to behavior
Source: 8rbuJ8Ycv1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8rbuJ8Ycv1.exeVirustotal: Detection: 20%
Source: 8rbuJ8Ycv1.exeReversingLabs: Detection: 41%
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_00406636 push ebp; iretd 1_2_00406640
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DA75 push 00000051h; ret 1_2_02B6DA78
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61B23 push ebp; retf 1_2_02B61B24
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6EB07 push ecx; retf 1_2_02B6EB08
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662AE 1_2_02B662AE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662F2 1_2_02B662F2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B642E7 1_2_02B642E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE 1_2_02B652EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662C1 1_2_02B662C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6623A 1_2_02B6623A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B 1_2_02B6423B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6424C 1_2_02B6424C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66397 1_2_02B66397
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6438F 1_2_02B6438F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B663C1 1_2_02B663C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B661F4 1_2_02B661F4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6469F 1_2_02B6469F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B666F7 1_2_02B666F7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66647 1_2_02B66647
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B647FB 1_2_02B647FB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B667EC 1_2_02B667EC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65709 1_2_02B65709
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64744 1_2_02B64744
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B664EB 1_2_02B664EB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66432 1_2_02B66432
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64433 1_2_02B64433
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66582 1_2_02B66582
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B645DB 1_2_02B645DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6450F 1_2_02B6450F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A576 1_2_02B6A576
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6455F 1_2_02B6455F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66B8F 1_2_02B66B8F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67BC0 1_2_02B67BC0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B648B7 1_2_02B648B7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B658A4 1_2_02B658A4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E8D5 1_2_02B6E8D5
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B668DB 1_2_02B668DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66843 1_2_02B66843
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64990 1_2_02B64990
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E98A 1_2_02B6E98A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B689EE 1_2_02B689EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64926 1_2_02B64926
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63924 1_2_02B63924
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63921 1_2_02B63921
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60919 1_2_02B60919
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66976 1_2_02B66976
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E961 1_2_02B6E961
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC22 1_2_02B6DC22
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66C6A 1_2_02B66C6A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65D82 1_2_02B65D82
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62D30 1_2_02B62D30
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66D0F 1_2_02B66D0F
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeRDTSC instruction interceptor: First address: 0000000002B6BD5F second address: 0000000002B6BD87 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b nop 0x0000000c test eax, D0AB5031h 0x00000011 cmp bx, bx 0x00000014 test bl, 00000003h 0x00000017 cmp dh, FFFFFFFEh 0x0000001a add esi, 00001000h 0x00000020 cmp eax, ebx 0x00000022 pushad 0x00000023 mov edx, 00000093h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeRDTSC instruction interceptor: First address: 0000000002B605C5 second address: 0000000002B6BA17 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 test dh, bh 0x00000005 add esp, 24h 0x00000008 test dh, ah 0x0000000a cmp dx, A12Ah 0x0000000f call 00007F4CB4ECDB65h 0x00000014 test dh, ch 0x00000016 call 00007F4CB4EC2E44h 0x0000001b test dx, 96EDh 0x00000020 test dx, ax 0x00000023 xor edi, edi 0x00000025 test al, bl 0x00000027 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000031 cmp ch, ah 0x00000033 jmp 00007F4CB4EC2B42h 0x00000035 test dh, ah 0x00000037 call 00007F4CB4EC2B74h 0x0000003c call 00007F4CB4EC2B6Dh 0x00000041 lfence 0x00000044 mov edx, E38313D7h 0x00000049 sub edx, 2F16C57Fh 0x0000004f xor edx, 80E7F4C8h 0x00000055 xor edx, 4B75BA84h 0x0000005b mov edx, dword ptr [edx] 0x0000005d lfence 0x00000060 jmp 00007F4CB4EC2B42h 0x00000062 push di 0x00000064 mov di, 99DEh 0x00000068 pop di 0x0000006a cmp ch, dh 0x0000006c test edx, edx 0x0000006e cmp cl, al 0x00000070 cmp ebx, ebx 0x00000072 cmp dl, cl 0x00000074 cmp ax, bx 0x00000077 cmp ch, bh 0x00000079 ret 0x0000007a mov esi, edx 0x0000007c pushad 0x0000007d rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 rdtsc 1_2_02B68362
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeAPI coverage: 9.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess Stats: CPU usage > 90% for more than 60s
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 rdtsc 1_2_02B68362
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE mov eax, dword ptr fs:[00000030h]1_2_02B652EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B mov eax, dword ptr fs:[00000030h]1_2_02B6423B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65347 mov eax, dword ptr fs:[00000030h]1_2_02B65347
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C70C mov eax, dword ptr fs:[00000030h]1_2_02B6C70C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B46E mov eax, dword ptr fs:[00000030h]1_2_02B6B46E
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6AAF6 mov eax, dword ptr fs:[00000030h]1_2_02B6AAF6
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64E3A mov eax, dword ptr fs:[00000030h]1_2_02B64E3A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67C8A mov eax, dword ptr fs:[00000030h]1_2_02B67C8A
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E6B0 cpuid 1_2_02B6E6B0

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery211Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.