Loading ...

Play interactive tourEdit tour

Windows Analysis Report yw6At7QnNh

Overview

General Information

Sample Name:yw6At7QnNh (renamed file extension from none to exe)
Analysis ID:458121
MD5:8ba293749c97cbf48f30f02c66d3406d
SHA1:6a7492a26d0a16320daa2cb187232fc0053f4f5f
SHA256:e2075b32b9716dc41ef667a74c1ae2c2841a5b9fd3046db0bdcd96c581778253
Tags:exeuncategorized
Infos:

Most interesting Screenshot:

Detection

ZeusVM
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected ZeusVM e-Banking Trojan
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Contains VNC / remote desktop functionality (version string found)
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
May initialize a security null descriptor
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • yw6At7QnNh.exe (PID: 3420 cmdline: 'C:\Users\user\Desktop\yw6At7QnNh.exe' MD5: 8BA293749C97CBF48F30F02C66D3406D)
    • yw6At7QnNh.exe (PID: 5952 cmdline: 'C:\Users\user\Desktop\yw6At7QnNh.exe' MD5: 8BA293749C97CBF48F30F02C66D3406D)
      • yw6At7QnNh.exe (PID: 1536 cmdline: 'C:\Users\user\Desktop\yw6At7QnNh.exe' MD5: 8BA293749C97CBF48F30F02C66D3406D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: yw6At7QnNh.exeAvira: detected
Antivirus detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmpAvira: detection malicious, Label: TR/Agent.hjvc
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmpReversingLabs: Detection: 53%
Multi AV Scanner detection for submitted fileShow sources
Source: yw6At7QnNh.exeVirustotal: Detection: 81%Perma Link
Source: yw6At7QnNh.exeMetadefender: Detection: 60%Perma Link
Source: yw6At7QnNh.exeReversingLabs: Detection: 92%
Machine Learning detection for sampleShow sources
Source: yw6At7QnNh.exeJoe Sandbox ML: detected
Source: 1.2.yw6At7QnNh.exe.10000000.4.unpackAvira: Label: TR/Agent.hjvc
Source: 3.2.yw6At7QnNh.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 3.1.yw6At7QnNh.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 1.2.yw6At7QnNh.exe.400000.0.unpackAvira: Label: TR/Agent.hjvc
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_2_00401282 GetModuleFileNameA,GetEnvironmentVariableA,GetEnvironmentVariableA,GetEnvironmentVariableA,FindResourceA,GetDesktopWindow,GetDesktopWindow,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindResourceA,LoadResource,SizeofResource,LockResource,FindResourceA,LoadResource,SizeofResource,??2@YAPAXI@Z,??_U@YAPAXI@Z,LockResource,PathCombineA,PathFileExistsA,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptCreateHash,??2@YAPAXI@Z,??_U@YAPAXI@Z,??2@YAPAXI@Z,CryptHashData,CryptDeriveKey,CryptDecrypt,MessageBoxA,??2@YAPAXI@Z,Sleep,GetCommandLineA,CreateFileA,FindCloseChangeNotification,PathCombineA,CreateFileA,CloseHandle,FindExecutableA,DeleteFileA,DeleteFileA,DeleteFileA,Sleep,PathCombineA,DeleteFileA,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040D467 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00417C71 CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040D467 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00417C71 CryptUnprotectData,LocalFree,

Compliance:

barindex
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeUnpacked PE file: 2.2.yw6At7QnNh.exe.400000.0.unpack
Source: C:\Users\user\Desktop\yw6At7QnNh.exeUnpacked PE file: 3.2.yw6At7QnNh.exe.400000.0.unpack
Source: yw6At7QnNh.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040B8C3 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040B8C3 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00411830 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_004118EB FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00411830 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_004118EB FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00414047 recv,
Source: yw6At7QnNh.exeString found in binary or memory: http://www.google.com/webhp
Source: yw6At7QnNh.exe, 00000002.00000002.205524903.0000000002070000.00000004.00000001.sdmp, yw6At7QnNh.exe, 00000003.00000001.203739017.0000000000400000.00000040.00020000.sdmpString found in binary or memory: http://www.google.com/webhpbcMY.txt
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0041D43B GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,OpenInputDesktop,SwitchDesktop,DefWindowProcW,DefWindowProcA,DefDlgProcW,DefDlgProcA,DefFrameProcW,DefFrameProcA,DefMDIChildProcW,DefMDIChildProcA,CallWindowProcW,CallWindowProcA,RegisterClassW,RegisterClassA,RegisterClassExW,RegisterClassExA,BeginPaint,EndPaint,GetDCEx,GetDC,GetWindowDC,ReleaseDC,GetUpdateRect,GetUpdateRgn,GetMessagePos,GetCursorPos,SetCursorPos,SetCapture,ReleaseCapture,GetCapture,GetMessageW,GetMessageA,PeekMessageW,PeekMessageA,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00409FCC EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,

E-Banking Fraud:

barindex
Detected ZeusVM e-Banking TrojanShow sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0041ADE1 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0041ADE1 lstrcmpiA,lstrcmpiA,lstrcmpiA,TlsSetValue,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040A2BA OpenWindowStationW,CreateWindowStationW,GetProcessWindowStation,OpenDesktopW,CreateDesktopW,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_10001000 peagtfosapeh,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_2_00401046 DeleteFileA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_1_00401046 CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_2_004018F0: GetModuleHandleA,??2@YAPAXI@Z,lstrcatA,CreateFileA,DeviceIoControl,isalnum,isalnum,lstrcpyA,lstrcpyA,lstrcpyA,CharUpperA,CharUpperA,CharUpperA,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040DAE4 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00416142 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00413970 CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00416142 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00413970 CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_004036E4
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040200B
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040718A
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040D373
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040EF15
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040200B
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040718A
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040D373
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040EF15
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: String function: 00408888 appears 37 times
Source: yw6At7QnNh.exe, 00000001.00000002.203455259.00000000027D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs yw6At7QnNh.exe
Source: yw6At7QnNh.exe, 00000001.00000002.202804109.0000000000413000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTStub.exe vs yw6At7QnNh.exe
Source: yw6At7QnNh.exe, 00000001.00000002.202804109.0000000000413000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCwork.exe vs yw6At7QnNh.exe
Source: yw6At7QnNh.exeBinary or memory string: OriginalFilename vs yw6At7QnNh.exe
Source: yw6At7QnNh.exe, 00000002.00000002.205116569.0000000000400000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCwork.exe vs yw6At7QnNh.exe
Source: yw6At7QnNh.exeBinary or memory string: OriginalFilenameTStub.exe vs yw6At7QnNh.exe
Source: yw6At7QnNh.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: athefff3h6266cd5fa708f.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@5/2@0/0
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040105A GetSysColor,GetDoubleClickTime,SetDoubleClickTime,GetTickCount,GetDesktopWindow,GetDesktopWindow,PeekMessageA,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindWindowA,SetWindowTextA,LoadLibraryA,GetProcAddress,FindResourceA,IsClipboardFormatAvailable,wsprintfA,LoadResource,SizeofResource,GetLastError,GetCurrentProcess,TerminateProcess,LockResource,GetOpenFileNameA,SetFileAttributesA,LdrInitializeThunk,lstrcmpiA,MessageBoxA,GetClassInfoW,GetSysColor,GetTempPathA,GetUserDefaultLangID,PathAddBackslashA,lstrcatA,CreateFileA,WriteFile,GetLastError,FormatMessageA,CloseHandle,IsWindowEnabled,PostMessageA,LoadLibraryA,lstrlenA,GetProcAddress,GetCurrentThreadId,peagtfosapeh,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_004099A9 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00409B1E CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_004099A9 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00409B1E CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040D88E GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040D88E GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040D837 CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_004179CD CoCreateInstance,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040105A GetSysColor,GetDoubleClickTime,SetDoubleClickTime,GetTickCount,GetDesktopWindow,GetDesktopWindow,PeekMessageA,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindWindowA,SetWindowTextA,LoadLibraryA,GetProcAddress,FindResourceA,IsClipboardFormatAvailable,wsprintfA,LoadResource,SizeofResource,GetLastError,GetCurrentProcess,TerminateProcess,LockResource,GetOpenFileNameA,SetFileAttributesA,LdrInitializeThunk,lstrcmpiA,MessageBoxA,GetClassInfoW,GetSysColor,GetTempPathA,GetUserDefaultLangID,PathAddBackslashA,lstrcatA,CreateFileA,WriteFile,GetLastError,FormatMessageA,CloseHandle,IsWindowEnabled,PostMessageA,LoadLibraryA,lstrlenA,GetProcAddress,GetCurrentThreadId,peagtfosapeh,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
Source: C:\Users\user\Desktop\yw6At7QnNh.exeFile created: C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmpJump to behavior
Source: yw6At7QnNh.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\yw6At7QnNh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: yw6At7QnNh.exeVirustotal: Detection: 81%
Source: yw6At7QnNh.exeMetadefender: Detection: 60%
Source: yw6At7QnNh.exeReversingLabs: Detection: 92%
Source: unknownProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeUnpacked PE file: 3.2.yw6At7QnNh.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.data:W;.reloc:R;
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeUnpacked PE file: 2.2.yw6At7QnNh.exe.400000.0.unpack
Source: C:\Users\user\Desktop\yw6At7QnNh.exeUnpacked PE file: 3.2.yw6At7QnNh.exe.400000.0.unpack
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040105A GetSysColor,GetDoubleClickTime,SetDoubleClickTime,GetTickCount,GetDesktopWindow,GetDesktopWindow,PeekMessageA,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindWindowA,SetWindowTextA,LoadLibraryA,GetProcAddress,FindResourceA,IsClipboardFormatAvailable,wsprintfA,LoadResource,SizeofResource,GetLastError,GetCurrentProcess,TerminateProcess,LockResource,GetOpenFileNameA,SetFileAttributesA,LdrInitializeThunk,lstrcmpiA,MessageBoxA,GetClassInfoW,GetSysColor,GetTempPathA,GetUserDefaultLangID,PathAddBackslashA,lstrcatA,CreateFileA,WriteFile,GetLastError,FormatMessageA,CloseHandle,IsWindowEnabled,PostMessageA,LoadLibraryA,lstrlenA,GetProcAddress,GetCurrentThreadId,peagtfosapeh,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_00405450 push eax; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_00408888 push eax; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_2_00402550 push eax; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 2_1_00402550 push eax; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00402961 push cs; iretd
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040292B push cs; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040B1F7 push ebp; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00402295 push es; iretd
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00402961 push cs; iretd
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040292B push cs; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_0040B1F7 push ebp; ret
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00402295 push es; iretd
Source: C:\Users\user\Desktop\yw6At7QnNh.exeFile created: C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmpJump to dropped file
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040BC07 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,

Malware Analysis System Evasion:

barindex
Contain functionality to detect virtual machinesShow sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: VBOX VBOX QEMU HARDDISK QEMU HARDDISK VMWARE VBOX
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: yw6At7QnNh.exeBinary or memory string: SBIEDLL.DLL
Source: yw6At7QnNh.exe, 00000001.00000002.202804109.0000000000413000.00000004.00020000.sdmp, yw6At7QnNh.exe, 00000002.00000002.205116569.0000000000400000.00000040.00000001.sdmpBinary or memory string: $@RTLDECOMPRESSBUFFERNTDLL.DLLGETTHREADCONTEXTWRITEPROCESSMEMORYVIRTUALALLOCEXNTDLL.DLLNTUNMAPVIEWOFSECTIONCREATEPROCESSARESUMETHREADSETTHREADCONTEXTKERNEL32.DLLOPENMSDEFAULTBROWSER.HTMLYGN3456789MICROSOFT BASE CRYPTOGRAPHIC PROVIDER V1.0APPDATATEMPVIRTUALVMWAREQEMU HARDDISKVMLOGVBOX\\.\CWMONITORSBIEDLL.DLL
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00411830 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_004118EB FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_00411830 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_004118EB FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: yw6At7QnNh.exe, 00000002.00000002.205116569.0000000000400000.00000040.00000001.sdmpBinary or memory string: $@RtlDecompressBufferNtdll.dllGetThreadContextWriteProcessMemoryVirtualAllocExntdll.dllNtUnmapViewOfSectionCreateProcessAResumeThreadSetThreadContextkernel32.dllopenMSDefaultBrowser.htmlYGN3456789Microsoft Base Cryptographic Provider v1.0APPDATATEMPVIRTUALVMWAREQEMU HARDDISKVMLOGVBOX\\.\cwmonitorSbieDll.dll
Source: yw6At7QnNh.exe, 00000001.00000002.203455259.00000000027D0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: yw6At7QnNh.exeBinary or memory string: QEMU HARDDISK
Source: yw6At7QnNh.exeBinary or memory string: VMWARE
Source: yw6At7QnNh.exe, 00000001.00000002.203455259.00000000027D0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: yw6At7QnNh.exe, 00000001.00000002.203455259.00000000027D0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: yw6At7QnNh.exe, 00000001.00000002.203455259.00000000027D0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040105A GetSysColor,GetDoubleClickTime,SetDoubleClickTime,GetTickCount,GetDesktopWindow,GetDesktopWindow,PeekMessageA,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindWindowA,SetWindowTextA,LoadLibraryA,GetProcAddress,FindResourceA,IsClipboardFormatAvailable,wsprintfA,LoadResource,SizeofResource,GetLastError,GetCurrentProcess,TerminateProcess,LockResource,GetOpenFileNameA,SetFileAttributesA,LdrInitializeThunk,lstrcmpiA,MessageBoxA,GetClassInfoW,GetSysColor,GetTempPathA,GetUserDefaultLangID,PathAddBackslashA,lstrcatA,CreateFileA,WriteFile,GetLastError,FormatMessageA,CloseHandle,IsWindowEnabled,PostMessageA,LoadLibraryA,lstrlenA,GetProcAddress,GetCurrentThreadId,peagtfosapeh,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040105A GetSysColor,GetDoubleClickTime,SetDoubleClickTime,GetTickCount,GetDesktopWindow,GetDesktopWindow,PeekMessageA,PeekMessageA,Sleep,IsWindow,IsDialogMessageA,TranslateMessage,DispatchMessageA,IsDlgButtonChecked,GetDesktopWindow,FindWindowA,SetWindowTextA,LoadLibraryA,GetProcAddress,FindResourceA,IsClipboardFormatAvailable,wsprintfA,LoadResource,SizeofResource,GetLastError,GetCurrentProcess,TerminateProcess,LockResource,GetOpenFileNameA,SetFileAttributesA,LdrInitializeThunk,lstrcmpiA,MessageBoxA,GetClassInfoW,GetSysColor,GetTempPathA,GetUserDefaultLangID,PathAddBackslashA,lstrcatA,CreateFileA,WriteFile,GetLastError,FormatMessageA,CloseHandle,IsWindowEnabled,PostMessageA,LoadLibraryA,lstrlenA,GetProcAddress,GetCurrentThreadId,peagtfosapeh,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_004129EB mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_1_004129EB mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_00412D30 GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040A813 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_0040A825 SetUnhandledExceptionFilter,

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to inject code into remote processesShow sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_10001000 peagtfosapeh,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\yw6At7QnNh.exeMemory written: C:\Users\user\Desktop\yw6At7QnNh.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\yw6At7QnNh.exeMemory written: C:\Users\user\Desktop\yw6At7QnNh.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeProcess created: C:\Users\user\Desktop\yw6At7QnNh.exe 'C:\Users\user\Desktop\yw6At7QnNh.exe'
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040F7B1 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_00401B0C GetLocalTime,GetSystemTime,GetTimeZoneInformation,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040994D GetUserNameExW,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_00403D2A GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 1_2_00401C01 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,KiUserExceptionDispatcher,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: yw6At7QnNh.exe, 00000002.00000002.205524903.0000000002070000.00000004.00000001.sdmpBinary or memory string: S:(ML;;NRNWNX;;;LW)SeSecurityPrivilegeS:(ML;CIOI;NRNWNX;;;LW)?O?I?Tcabcabinet.dllFCICreateFCIAddFileFCIFlushCabinetFCIDestroybcdfghklmnpqrstvwxzaeiouyGlobal\Local\

Remote Access Functionality:

barindex
Contains VNC / remote desktop functionality (version string found)Show sources
Source: yw6At7QnNh.exe, 00000002.00000002.205524903.0000000002070000.00000004.00000001.sdmpString found in binary or memory: RFB 003.003
Source: yw6At7QnNh.exe, 00000002.00000002.205524903.0000000002070000.00000004.00000001.sdmpString found in binary or memory: identityAccept-EncodingTEIf-Modified-SinceRFB 003.003
Source: yw6At7QnNh.exeString found in binary or memory: RFB 003.003
Source: yw6At7QnNh.exeString found in binary or memory: RFB 003.003
Source: yw6At7QnNh.exe, 00000003.00000001.203739017.0000000000400000.00000040.00020000.sdmpString found in binary or memory: identityAccept-EncodingTEIf-Modified-SinceRFB 003.003
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040F5E2 socket,bind,closesocket,
Source: C:\Users\user\Desktop\yw6At7QnNh.exeCode function: 3_2_0040F304 socket,bind,listen,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information1Input Capture11System Time Discovery2Remote Desktop Protocol1Archive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobCreate Account1Valid Accounts1Obfuscated Files or Information2LSASS MemoryAccount Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Valid Accounts1Access Token Manipulation11Install Root Certificate1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Process Injection211Software Packing22NTDSSystem Information Discovery4Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsNetwork Share Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsSecurity Software Discovery311VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion1DCSyncVirtualization/Sandbox Evasion1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation11Proc FilesystemProcess Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection211/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
yw6At7QnNh.exe81%VirustotalBrowse
yw6At7QnNh.exe61%MetadefenderBrowse
yw6At7QnNh.exe92%ReversingLabsWin32.Trojan.Zeus
yw6At7QnNh.exe100%AviraTR/Dropper.Gen
yw6At7QnNh.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmp100%AviraTR/Agent.hjvc
C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmp5%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmp53%ReversingLabsWin32.Trojan.Zeus

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
2.2.yw6At7QnNh.exe.400000.0.unpack100%AviraHEUR/AGEN.1115251Download File
1.2.yw6At7QnNh.exe.10000000.4.unpack100%AviraTR/Agent.hjvcDownload File
3.2.yw6At7QnNh.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
3.1.yw6At7QnNh.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
1.2.yw6At7QnNh.exe.400000.0.unpack100%AviraTR/Agent.hjvcDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.google.com/webhpyw6At7QnNh.exefalse
    high
    http://www.google.com/webhpbcMY.txtyw6At7QnNh.exe, 00000002.00000002.205524903.0000000002070000.00000004.00000001.sdmp, yw6At7QnNh.exe, 00000003.00000001.203739017.0000000000400000.00000040.00020000.sdmpfalse
      high

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:458121
      Start date:02.08.2021
      Start time:21:04:10
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 3m 52s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:yw6At7QnNh (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.bank.troj.evad.winEXE@5/2@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 78.7% (good quality ratio 73.1%)
      • Quality average: 81.9%
      • Quality standard deviation: 29.7%
      HCA Information:
      • Successful, ratio: 72%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Stop behavior analysis, all processes terminated
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): svchost.exe

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Temp\ athefff3h6266cd5fa708f.tmp
      Process:C:\Users\user\Desktop\yw6At7QnNh.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):3072
      Entropy (8bit):2.4857544881426725
      Encrypted:false
      SSDEEP:12:etGSGsXpFmGEqIUfIjjObu0Nql2nLEu98DwhKQstDISMhTF0L/x8O6r:etGSB54qIUwnO/AHDw0jukx
      MD5:79460E0544E0DFFE86DD51BBA404A2D3
      SHA1:ED294E22259F0DE6BAC6DD7A701B19B3CDCDA900
      SHA-256:2AFD890122BBA0EED6193476D04266B4A5B7A4DE53CB514BD9EAF4243D9FC973
      SHA-512:E2511BCC767B9EA93D378AA5D3D81A08D39701E9920019C9125BED88CDE1DE02BFABD8A5242710E86B4D20A75A65607DE442772753AB47230DEA4A9BA36F563A
      Malicious:true
      Antivirus:
      • Antivirus: Avira, Detection: 100%
      • Antivirus: Virustotal, Detection: 5%, Browse
      • Antivirus: ReversingLabs, Detection: 53%
      Reputation:low
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.. ... ... ...!... ...3... .I.+... .I.$... .Rich.. .........PE..L....t{N...........!......................... ...............................P....................................... ..L.... ..(............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc..(....@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
      Process:C:\Users\user\Desktop\yw6At7QnNh.exe
      File Type:data
      Category:dropped
      Size (bytes):46
      Entropy (8bit):1.0424600748477153
      Encrypted:false
      SSDEEP:3:/lbON:u
      MD5:89CA7E02D8B79ED50986F098D5686EC9
      SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
      SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
      SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ........................................user.

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.5870490062472085
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:yw6At7QnNh.exe
      File size:225792
      MD5:8ba293749c97cbf48f30f02c66d3406d
      SHA1:6a7492a26d0a16320daa2cb187232fc0053f4f5f
      SHA256:e2075b32b9716dc41ef667a74c1ae2c2841a5b9fd3046db0bdcd96c581778253
      SHA512:041e3f65fcb877eb19f5d63cb79d2eb6327ee4b06191a3a4202a736fb6215cd2b2b5c436c081b0165acf2b1b0341c8c551bbf166f8f46ce48fedd7d23ff74049
      SSDEEP:6144:ERAL6uxQIBpPnki+81Rnn1BgUUhgmfwgA3Bfdw+:z4MT+81RnnHLUhgrL3tdw+
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Hs..Hs..Hs..Hs..Ks...o..Gs...l...s..*l..Os..Hs...s...l..[s...u..Is..RichHs..................PE..L...G.{N...................

      File Icon

      Icon Hash:0000000000000000

      Static PE Info

      General

      Entrypoint:0x401c01
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x4E7B9D47 [Thu Sep 22 20:40:39 2011 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:0f16db1e18559cc080852e2e8fd0038e

      Entrypoint Preview

      Instruction
      push ebp
      mov ebp, esp
      push FFFFFFFFh
      push 0040C160h
      push 00402C1Ch
      mov eax, dword ptr fs:[00000000h]
      push eax
      mov dword ptr fs:[00000000h], esp
      sub esp, 58h
      push ebx
      push esi
      push edi
      mov dword ptr [ebp-18h], esp
      call dword ptr [0040C0B0h]
      xor edx, edx
      mov dl, ah
      mov dword ptr [0040EFBCh], edx
      mov ecx, eax
      and ecx, 000000FFh
      mov dword ptr [0040EFB8h], ecx
      shl ecx, 08h
      add ecx, edx
      mov dword ptr [0040EFB4h], ecx
      shr eax, 10h
      mov dword ptr [0040EFB0h], eax
      xor esi, esi
      push esi
      call 00007FF708C3611Ah
      pop ecx
      test eax, eax
      jne 00007FF708C3529Ah
      push 0000001Ch
      call 00007FF708C35345h
      pop ecx
      mov dword ptr [ebp-04h], esi
      call 00007FF708C35F5Ah
      call dword ptr [0040C0ACh]
      mov dword ptr [00410A58h], eax
      call 00007FF708C35E18h
      mov dword ptr [0040EF98h], eax
      call 00007FF708C35BC1h
      call 00007FF708C35B03h
      call 00007FF708C3545Ch
      mov dword ptr [ebp-30h], esi
      lea eax, dword ptr [ebp-5Ch]
      push eax
      call dword ptr [0040C0A8h]
      call 00007FF708C35A94h
      mov dword ptr [ebp-64h], eax
      test byte ptr [ebp-30h], 00000001h
      je 00007FF708C35298h
      movzx eax, word ptr [ebp-2Ch]
      jmp 00007FF708C35295h
      push 0000000Ah
      pop eax
      push eax
      push dword ptr [ebp-64h]
      push esi
      push esi
      call dword ptr [0040C0A4h]

      Rich Headers

      Programming Language:
      • [ C ] VS98 (6.0) build 8168
      • [RES] VS98 (6.0) cvtres build 1720
      • [C++] VS98 (6.0) build 8168

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xd5980x64.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x29828.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xc0000x15c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xa21e0xa400False0.593225990854data6.56845565551IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0xc0000x1d400x1e00False0.365364583333data4.48192698758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xe0000x2a6c0x1000False0.281005859375data3.38536461745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x110000x298280x29a00False0.905352618243data7.80378630892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x111300x25a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
      RT_GROUP_ICON0x136d80x14dataEnglishUnited States
      RT_VERSION0x136ec0x348dataEnglishUnited States
      None0x13a340x26df4data

      Imports

      DLLImport
      KERNEL32.dllGetCurrentThreadId, lstrlenA, CloseHandle, FormatMessageA, lstrcatA, GetUserDefaultLangID, lstrcmpiA, SetFileAttributesA, TerminateProcess, GetCurrentProcess, GetLastError, GetProcAddress, LoadLibraryA, Sleep, GetTickCount, SetStdHandle, ReadFile, IsBadCodePtr, IsBadReadPtr, SetUnhandledExceptionFilter, FlushFileBuffers, SetFilePointer, RaiseException, SetEnvironmentVariableA, CompareStringW, CompareStringA, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, MultiByteToWideChar, GetOEMCP, GetACP, GetCPInfo, IsBadWritePtr, VirtualAlloc, WriteFile, RtlUnwind, GetTimeZoneInformation, GetSystemTime, GetLocalTime, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, HeapReAlloc, HeapAlloc, HeapSize, HeapFree, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, HeapDestroy, HeapCreate, VirtualFree
      USER32.dllDispatchMessageA, GetSysColor, GetDoubleClickTime, SetDoubleClickTime, GetDesktopWindow, PeekMessageA, IsWindow, IsDialogMessageA, PostMessageA, TranslateMessage, IsDlgButtonChecked, FindWindowA, SetWindowTextA, IsClipboardFormatAvailable, wsprintfA, MessageBoxA, GetClassInfoW, IsWindowEnabled
      comdlg32.dllGetOpenFileNameA
      SHLWAPI.dllPathAddBackslashA

      Version Infos

      DescriptionData
      LegalCopyrightCopyright 2011
      InternalNameTStub
      FileVersion1, 0, 5, 1
      CompanyNamedpjadagef
      PrivateBuild
      LegalTrademarks
      Comments
      ProductNamedpjadagef fddflsnjcjek
      SpecialBuild
      ProductVersion1, 0, 5, 1
      FileDescriptionfddflsnjcjek
      OriginalFilenameTStub.exe
      Translation0x0409 0x04b0

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:21:04:57
      Start date:02/08/2021
      Path:C:\Users\user\Desktop\yw6At7QnNh.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\yw6At7QnNh.exe'
      Imagebase:0x400000
      File size:225792 bytes
      MD5 hash:8BA293749C97CBF48F30F02C66D3406D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:21:04:57
      Start date:02/08/2021
      Path:C:\Users\user\Desktop\yw6At7QnNh.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\yw6At7QnNh.exe'
      Imagebase:0x400000
      File size:225792 bytes
      MD5 hash:8BA293749C97CBF48F30F02C66D3406D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:21:04:58
      Start date:02/08/2021
      Path:C:\Users\user\Desktop\yw6At7QnNh.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\yw6At7QnNh.exe'
      Imagebase:0x400000
      File size:225792 bytes
      MD5 hash:8BA293749C97CBF48F30F02C66D3406D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >