Loading ...

Play interactive tourEdit tour

Windows Analysis Report 8rbuJ8Ycv1

Overview

General Information

Sample Name:8rbuJ8Ycv1 (renamed file extension from none to exe)
Analysis ID:451510
MD5:546f9c26cb739f1e3ea5ba1605aa7328
SHA1:452ee936bbade0510c6c56d6e2b25f6ce7b835ff
SHA256:6bd6a8e685288ca0af1d41d4d88fabd465f211c7cef32c00c994b89ea0a94f51
Infos:

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 8rbuJ8Ycv1.exe (PID: 6936 cmdline: 'C:\Users\user\Desktop\8rbuJ8Ycv1.exe' MD5: 546F9C26CB739F1E3EA5BA1605AA7328)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: 8rbuJ8Ycv1.exeVirustotal: Detection: 20%Perma Link
Source: 8rbuJ8Ycv1.exeReversingLabs: Detection: 41%
Source: 8rbuJ8Ycv1.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68383 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683F0 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B684CF NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68423 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68577 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662AE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67293
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662F2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B642E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B622D4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63232
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6623A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62276
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B256
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6424C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66397
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68383
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6438F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B673F6
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B683F0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6D3E0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B653EF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B663C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A30B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67357
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65347
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6D0E4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E0CB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E016
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B072
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67078
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6318B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B661F4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B671E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6312F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67143
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B606A3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6469F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B666F7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60623
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B629
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B677
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66647
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60640
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C787
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B647FB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B667EC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C70C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6570B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65709
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64744
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60497
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B664EB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B604D7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B684CF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66432
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64433
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C439
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68423
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6546B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B635B8
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67597
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66582
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B645DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6450F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A576
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6455F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68ADE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CADF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65AC1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68A3E
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64A2B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CA44
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66B8F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68BFF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60BFA
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63BE1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67BC0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65BCF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65B23
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60B0E
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CB66
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63B63
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68B6F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63B57
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65B52
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60B43
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B648B7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C8BF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B658A4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E8D5
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B668DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C818
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66843
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64990
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B689EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6093C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C93A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64926
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60919
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66976
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63EB3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67E96
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DED7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62E3F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64E7B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DE54
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CFF8
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66F1F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63F6B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DF5F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60CB2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68CA7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63CA2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CCAC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC93
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CCF6
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61CE9
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DCCA
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC33
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63C38
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC22
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CC0B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66C6A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CC53
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63C5D
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62DA3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6CDA3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65D82
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63DFF
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DDD3
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62D30
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DD07
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66D0F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61D68
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63D43
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60D4F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DD4C
Source: 8rbuJ8Ycv1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 8rbuJ8Ycv1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181494072.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIncompr3.exe vs 8rbuJ8Ycv1.exe
Source: 8rbuJ8Ycv1.exeBinary or memory string: OriginalFilenameIncompr3.exe vs 8rbuJ8Ycv1.exe
Source: 8rbuJ8Ycv1.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal60.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeFile created: C:\Users\user\AppData\Local\Temp\~DF10ABBB8848BCA337.TMPJump to behavior
Source: 8rbuJ8Ycv1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: 8rbuJ8Ycv1.exeVirustotal: Detection: 20%
Source: 8rbuJ8Ycv1.exeReversingLabs: Detection: 41%
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_00406636 push ebp; iretd
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DA75 push 00000051h; ret
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B61B23 push ebp; retf
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6EB07 push ecx; retf
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662AE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662F2
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B642E7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B662C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6623A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6424C
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66397
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6438F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B663C1
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B661F4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6469F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B666F7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66647
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B647FB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B667EC
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65709
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64744
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B664EB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66432
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64433
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66582
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B645DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6450F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6A576
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6455F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66B8F
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67BC0
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B648B7
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B658A4
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E8D5
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B668DB
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66843
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64990
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E98A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B689EE
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64926
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63924
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B63921
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B60919
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66976
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E961
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6DC22
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66C6A
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65D82
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B62D30
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B66D0F
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeRDTSC instruction interceptor: First address: 0000000002B6BD5F second address: 0000000002B6BD87 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b nop 0x0000000c test eax, D0AB5031h 0x00000011 cmp bx, bx 0x00000014 test bl, 00000003h 0x00000017 cmp dh, FFFFFFFEh 0x0000001a add esi, 00001000h 0x00000020 cmp eax, ebx 0x00000022 pushad 0x00000023 mov edx, 00000093h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeRDTSC instruction interceptor: First address: 0000000002B605C5 second address: 0000000002B6BA17 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 test dh, bh 0x00000005 add esp, 24h 0x00000008 test dh, ah 0x0000000a cmp dx, A12Ah 0x0000000f call 00007F4CB4ECDB65h 0x00000014 test dh, ch 0x00000016 call 00007F4CB4EC2E44h 0x0000001b test dx, 96EDh 0x00000020 test dx, ax 0x00000023 xor edi, edi 0x00000025 test al, bl 0x00000027 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000031 cmp ch, ah 0x00000033 jmp 00007F4CB4EC2B42h 0x00000035 test dh, ah 0x00000037 call 00007F4CB4EC2B74h 0x0000003c call 00007F4CB4EC2B6Dh 0x00000041 lfence 0x00000044 mov edx, E38313D7h 0x00000049 sub edx, 2F16C57Fh 0x0000004f xor edx, 80E7F4C8h 0x00000055 xor edx, 4B75BA84h 0x0000005b mov edx, dword ptr [edx] 0x0000005d lfence 0x00000060 jmp 00007F4CB4EC2B42h 0x00000062 push di 0x00000064 mov di, 99DEh 0x00000068 pop di 0x0000006a cmp ch, dh 0x0000006c test edx, edx 0x0000006e cmp cl, al 0x00000070 cmp ebx, ebx 0x00000072 cmp dl, cl 0x00000074 cmp ax, bx 0x00000077 cmp ch, bh 0x00000079 ret 0x0000007a mov esi, edx 0x0000007c pushad 0x0000007d rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeAPI coverage: 9.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeProcess Stats: CPU usage > 90% for more than 60s
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B68362 rdtsc
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B652EE mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6423B mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B65347 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6C70C mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6B46E mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6AAF6 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B64E3A mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B67C8A mov eax, dword ptr fs:[00000030h]
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: 8rbuJ8Ycv1.exe, 00000001.00000002.1181988661.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\8rbuJ8Ycv1.exeCode function: 1_2_02B6E6B0 cpuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery211Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
8rbuJ8Ycv1.exe20%VirustotalBrowse
8rbuJ8Ycv1.exe41%ReversingLabsWin32.Trojan.GuLoader

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:451510
Start date:20.07.2021
Start time:18:23:55
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 18s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:8rbuJ8Ycv1 (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:13
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 30.4% (good quality ratio 13.4%)
  • Quality average: 23.9%
  • Quality standard deviation: 32.5%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.2334205108883545
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.15%
  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:8rbuJ8Ycv1.exe
File size:241664
MD5:546f9c26cb739f1e3ea5ba1605aa7328
SHA1:452ee936bbade0510c6c56d6e2b25f6ce7b835ff
SHA256:6bd6a8e685288ca0af1d41d4d88fabd465f211c7cef32c00c994b89ea0a94f51
SHA512:c454f30df142f374f8423d025b4b989b7667b0c7c91558e88f0e31723bfd01f22ac539c31ab5d0ef4a0dc05e66577316bea935403b340b188e79dd0f84a01ac9
SSDEEP:3072:53BepJlZa/UNKcz3YU3OVEVGrBI4lsHJlZapGBR:PiUUQcz3zYEMiZHP
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......U................. ...................0....@................

File Icon

Icon Hash:f8fcd4ccf4e4e8d0

Static PE Info

General

Entrypoint:0x4019b0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x55C60000 [Sat Aug 8 13:11:28 2015 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:e9f7dd0da1a2a1266893e1ae4ef42b67

Entrypoint Preview

Instruction
push 00408ABCh
call 00007F4CB4E902F5h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
inc eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [ecx+7Ch], ch
xchg eax, edx
pushad
mov dword ptr [ecx+5DA34FE0h], ecx
xor eax, 8FD9D1CCh
fild dword ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [ecx], al
add byte ptr [eax], al
add byte ptr [edx+00h], al
push es
push eax
add dword ptr [edx], 6Bh
imul ebp, dword ptr [esp+65h], 74616B73h
je 00007F4CB4E90302h
add byte ptr [ebx+ebp+00000275h], ah
add byte ptr [eax], al
dec esp
xor dword ptr [eax], eax
xor esp, ecx
push ds
jne 00007F4CB4E902AEh
retf 44F6h
call far AC3Bh : 6039954Eh
int1
fcom dword ptr [eax]
add dword ptr [ebp+470E07DEh], esp
xchg dword ptr [ebx+73h], edx
sti
aas
adc eax, 4F3A9941h
lodsd
xor ebx, dword ptr [ecx-48EE309Ah]
or al, 00h
stosb
add byte ptr [eax-2Dh], ah
xchg eax, ebx
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
sti
outsd
add byte ptr [eax], al
xchg eax, edi
push 0C000000h
add byte ptr [ebx+79h], dh
jnc 00007F4CB4E90376h
insd
jne 00007F4CB4E90366h
jbe 00007F4CB4E9036Bh
imul ebp, dword ptr [eax+eax+0Dh], 01h
add eax, 726F5400h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x325140x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x350000x6d1e.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a4.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x31b840x32000False0.39130859375data6.38659297214IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x330000x12900x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x350000x6d1e0x7000False0.481828962054data5.45374661294IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x3ae760xea8data
RT_ICON0x3a5ce0x8a8data
RT_ICON0x39f060x6c8data
RT_ICON0x3999e0x568GLS_BINARY_LSB_FIRST
RT_ICON0x373f60x25a8dBase III DBT, version number 0, next free block index 40
RT_ICON0x3634e0x10a8data
RT_ICON0x359c60x988data
RT_ICON0x3555e0x468GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0x354e80x76data
RT_VERSION0x352400x2a8dataEnglishUnited States

Imports

DLLImport
MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaCyStr, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaDateVar, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

Version Infos

DescriptionData
Translation0x0409 0x04b0
LegalCopyrightSocialbakers
InternalNameIncompr3
FileVersion1.00
CompanyNameSocialbakers
LegalTrademarksSocialbakers
ProductNamekildeskatt
ProductVersion1.00
OriginalFilenameIncompr3.exe

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:18:24:44
Start date:20/07/2021
Path:C:\Users\user\Desktop\8rbuJ8Ycv1.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\8rbuJ8Ycv1.exe'
Imagebase:0x400000
File size:241664 bytes
MD5 hash:546F9C26CB739F1E3EA5BA1605AA7328
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

Disassembly

Code Analysis

Reset < >