Windows Analysis Report T-T Swift Copy.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
Threatname: FormBook |
---|
{"C2 list": ["www.ehawkstech.com/s4mt/"], "decoy": ["deviousrofwft.xyz", "iphone13.photos", "cameraderie.info", "flogotwheelz.com", "lunasconstructionllc.com", "unameofficial.com", "digitalboat.cloud", "hifi-cans.com", "breskizci.com", "kyleandconner.com", "punnyaseva.com", "elitephotoedit.com", "pizzatallrikar.one", "espacio40.com", "bvgsf.xyz", "splootingcorgi.com", "metaverse360.biz", "xnegbuy.com", "buysubarus.com", "optophonia.com", "jingcai16.com", "verdantpor.xyz", "mandyfarricker.com", "affiliategang.com", "chemissimo.com", "myspecialgift4you.com", "21cfintech.com", "parsvivid.com", "ufabetkhmer.net", "litunity.com", "bcwis.com", "ekokosiarki.com", "expocanna.net", "shanichara.com", "brightstarlogisticss.com", "intaom.net", "petshop.zone", "habxgg.com", "taiqen.com", "vehiculosvivienda.com", "igsc-eg.com", "jfhy88.com", "circuspolitician.com", "etxperiodontics.com", "wsxkd.com", "abosasaio.com", "magnacursos.online", "indigenousjobs.net", "digital904.com", "pp-jm.com", "hkqlxc.com", "mygutimautpribuinrop.com", "cosplayharem.com", "jsxybq.com", "fieldstationlodges.com", "ggrow-hairsalon.com", "aureliemorgane.com", "yian-ho.com", "woruke.club", "meet-hamburg.com", "leadergaterealty.com", "choitokki.com", "cfweb.tools", "loveyopu.com"]}
Yara Overview |
---|
Dropped Files |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Methodology_Contains_Shortcut_OtherURIhandlers | Detects possible shortcut usage for .URL persistence | @itsreallynick (Nick Carr) |
|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Methodology_Contains_Shortcut_OtherURIhandlers | Detects possible shortcut usage for .URL persistence | @itsreallynick (Nick Carr) |
| |
JoeSecurity_DBatLoader | Yara detected DBatLoader | Joe Security | ||
JoeSecurity_FormBook | Yara detected FormBook | Joe Security | ||
Formbook_1 | autogenerated rule brought to you by yara-signator | Felix Bilstein - yara-signator at cocacoding dot com |
| |
Formbook | detect Formbook in memory | JPCERT/CC Incident Response Group |
| |
Click to see the 13 entries |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook | Yara detected FormBook | Joe Security | ||
Formbook_1 | autogenerated rule brought to you by yara-signator | Felix Bilstein - yara-signator at cocacoding dot com |
| |
Formbook | detect Formbook in memory | JPCERT/CC Incident Response Group |
| |
JoeSecurity_FormBook | Yara detected FormBook | Joe Security | ||
Formbook_1 | autogenerated rule brought to you by yara-signator | Felix Bilstein - yara-signator at cocacoding dot com |
| |
Click to see the 19 entries |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Execution from Suspicious Folder | Show sources |
Source: | Author: Florian Roth: |
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Yara detected FormBook | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Multi AV Scanner detection for dropped file | Show sources |
Source: | ReversingLabs: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Networking: |
---|
C2 URLs / IPs found in malware configuration | Show sources |
Source: | URLs: |
Source: | DNS traffic detected: |
E-Banking Fraud: |
---|
Yara detected FormBook | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Malicious sample detected (through community Yara rule) | Show sources |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Joe Sandbox Cloud Basic: | Perma Link |
Source: | Key value queried: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Data Obfuscation: |
---|
Yara detected DBatLoader | Show sources |
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 | |
Source: | Code function: | 0_3_0234A5C0 |
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion: |
---|
Tries to detect virtualization through RDTSC time measurements | Show sources |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_3_02349EE0 |
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion: |
---|
Maps a DLL or memory area into another process | Show sources |
Source: | Section loaded: | Jump to behavior |
Writes to foreign memory regions | Show sources |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Creates a thread in another existing process (thread injection) | Show sources |
Source: | Thread created: | Jump to behavior |
Allocates memory in foreign processes | Show sources |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Injects a PE file into a foreign processes | Show sources |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information: |
---|
Yara detected FormBook | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected FormBook | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Registry Run Keys / Startup Folder1 | Process Injection512 | Masquerading1 | OS Credential Dumping | Security Software Discovery211 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Registry Run Keys / Startup Folder1 | Virtualization/Sandbox Evasion1 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol11 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection512 | Security Account Manager | Process Discovery2 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Deobfuscate/Decode Files or Information1 | NTDS | Remote System Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Obfuscated Files or Information2 | LSA Secrets | System Information Discovery11 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Software Packing1 | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
No Antivirus matches |
---|
Dropped Files |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win32.Backdoor.Remcos |
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
onedrive.live.com | unknown | unknown | false | high | |
vhpf4g.bn.files.1drv.com | unknown | unknown | false | high |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| low |
Contacted IPs |
---|
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 510295 |
Start date: | 27.10.2021 |
Start time: | 17:20:15 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 19m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | T-T Swift Copy.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 25 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 1 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@6/3@4/1 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
17:22:23 | API Interceptor | |
17:22:29 | Autostart | |
17:22:37 | Autostart |
Joe Sandbox View / Context |
---|
Created / dropped Files |
---|
Process: | C:\Users\user\Desktop\T-T Swift Copy.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1052672 |
Entropy (8bit): | 7.030914360244136 |
Encrypted: | false |
SSDEEP: | 24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRCdS:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Apg |
MD5: | A3127D76C37D53A8ECAAB821CE5D99A6 |
SHA1: | FE6529FF55514634D6CDE730E4C4C5B664B02CCF |
SHA-256: | D9CA56D191EFAA8AC5BEEE52F508082D6E8EFB29045BB61C23851537982FA6BF |
SHA-512: | 503FB1825DEC1A108B4C307E561FB4DF829079BF53DEC6167B28A0C79D3DA81D188439EBD5590CA2AD24A528D1C63E4DBEAEECD516BE5665866BDC1F07D3E2D0 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
|
Process: | C:\Users\user\Desktop\T-T Swift Copy.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96 |
Entropy (8bit): | 4.851591375784615 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYmTWAX+rSF55i0XMLQtSiL3bsGKd4ovn:HRYFVmTWDyzSQgiL3bsblvn |
MD5: | FDC2ECE626A79B30C114488195904125 |
SHA1: | 0E282FA6243F23E1388E1711A43D3F4033EDFD9F |
SHA-256: | 23976F3C585AEF6EAEE80D2FF579B4114B06766A101F1A0788CD0E129FEBF84E |
SHA-512: | 6E549209E2D5B7BC6089E8EEDD11C482E62A5D12C08A60A5B075FB3E8EC8449DD86C406D6892FDC19265B557A6C42DC52F07EDAC3D2804DCBF97777940D22FD9 |
Malicious: | false |
Yara Hits: |
|
Reputation: | unknown |
Preview: |
|
Process: | C:\Users\user\Desktop\T-T Swift Copy.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 275456 |
Entropy (8bit): | 7.995996090484397 |
Encrypted: | true |
SSDEEP: | 6144:eLRxllE7ow8bOFy5f0iAlZZ1CJWS5vg0GNwcNsoS58ErglehivLUHEJH:6zM0w8bl5siAlBCJWS5vWNwCxGg4ivLJ |
MD5: | 00BF4E71F9A6ECAD41587045D5591BE4 |
SHA1: | DAC3E45F849E280ABDEECB0010F71DB7FB92F68C |
SHA-256: | D8C8989468B6EE8526A595B49DE36162DB5C6DE86DA9236529763AE16D0AE7C6 |
SHA-512: | E129420478F27FD888AC6821848C64BC332446B284021B1725702846F134202AB4C6197C1BBFEB20520FC1923169D933CE4652027FF7E20D4E9C5ACE967AB52B |
Malicious: | false |
Reputation: | unknown |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.030914360244136 |
TrID: |
|
File name: | T-T Swift Copy.exe |
File size: | 1052672 |
MD5: | a3127d76c37d53a8ecaab821ce5d99a6 |
SHA1: | fe6529ff55514634d6cde730e4c4c5b664b02ccf |
SHA256: | d9ca56d191efaa8ac5beee52f508082d6e8efb29045bb61c23851537982fa6bf |
SHA512: | 503fb1825dec1a108b4c307e561fb4df829079bf53dec6167b28a0c79d3da81d188439ebd5590ca2ad24a528d1c63e4dbeaeecd516be5665866bdc1f07d3e2d0 |
SSDEEP: | 24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRCdS:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Apg |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
File Icon |
---|
Icon Hash: | 252506584c9731c0 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x490218 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | c615e590ab9a424646aba34bad72f321 |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
mov eax, 0048FF60h |
call 00007F63B09B53E4h |
mov ebx, dword ptr [004EB650h] |
mov eax, dword ptr [ebx] |
call 00007F63B0A0E673h |
mov eax, dword ptr [ebx] |
mov edx, 00490290h |
call 00007F63B0A0E267h |
mov ecx, dword ptr [004EB544h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0048EBB8h] |
call 00007F63B0A0E66Ch |
mov ecx, dword ptr [004EB5F8h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0047F918h] |
call 00007F63B0A0E659h |
mov ecx, dword ptr [004EB3C8h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [0048E75Ch] |
call 00007F63B0A0E646h |
mov eax, dword ptr [ebx] |
call 00007F63B0A0E6BFh |
pop ebx |
call 00007F63B09B311Dh |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xee000 | 0x2524 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xfd000 | 0xaa00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf3000 | 0x9ba8 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xf2000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x8f29c | 0x8f400 | False | 0.519360820244 | data | 6.57636511075 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
DATA | 0x91000 | 0x5a82c | 0x5aa00 | False | 0.421761853448 | data | 6.88948982392 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
BSS | 0xec000 | 0x1269 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.idata | 0xee000 | 0x2524 | 0x2600 | False | 0.362356085526 | data | 4.99675959328 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.tls | 0xf1000 | 0x40 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rdata | 0xf2000 | 0x18 | 0x200 | False | 0.05078125 | data | 0.199107517787 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0xf3000 | 0x9ba8 | 0x9c00 | False | 0.571890024038 | data | 6.65385066773 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0xfd000 | 0xaa00 | 0xaa00 | False | 0.274057904412 | data | 4.57303719616 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_CURSOR | 0xfe2a0 | 0x134 | data | ||
RT_CURSOR | 0xfe3d4 | 0x134 | data | ||
RT_CURSOR | 0xfe508 | 0x134 | data | ||
RT_CURSOR | 0xfe63c | 0x134 | data | ||
RT_CURSOR | 0xfe770 | 0x134 | data | ||
RT_CURSOR | 0xfe8a4 | 0x134 | data | ||
RT_CURSOR | 0xfe9d8 | 0x134 | data | ||
RT_BITMAP | 0xfeb0c | 0x1d0 | data | ||
RT_BITMAP | 0xfecdc | 0x1e4 | data | ||
RT_BITMAP | 0xfeec0 | 0x1d0 | data | ||
RT_BITMAP | 0xff090 | 0x1d0 | data | ||
RT_BITMAP | 0xff260 | 0x1d0 | data | ||
RT_BITMAP | 0xff430 | 0x1d0 | data | ||
RT_BITMAP | 0xff600 | 0x1d0 | data | ||
RT_BITMAP | 0xff7d0 | 0x1d0 | data | ||
RT_BITMAP | 0xff9a0 | 0x1d0 | data | ||
RT_BITMAP | 0xffb70 | 0x1d0 | data | ||
RT_BITMAP | 0xffd40 | 0x128 | data | ||
RT_BITMAP | 0xffe68 | 0x128 | data | ||
RT_BITMAP | 0xfff90 | 0x128 | data | ||
RT_BITMAP | 0x1000b8 | 0xe8 | data | ||
RT_BITMAP | 0x1001a0 | 0x128 | data | ||
RT_BITMAP | 0x1002c8 | 0x128 | data | ||
RT_BITMAP | 0x1003f0 | 0xd0 | data | ||
RT_BITMAP | 0x1004c0 | 0x128 | data | ||
RT_BITMAP | 0x1005e8 | 0x128 | data | ||
RT_BITMAP | 0x100710 | 0x128 | data | ||
RT_BITMAP | 0x100838 | 0x128 | data | ||
RT_BITMAP | 0x100960 | 0x128 | data | ||
RT_BITMAP | 0x100a88 | 0xe8 | data | ||
RT_BITMAP | 0x100b70 | 0x128 | data | ||
RT_BITMAP | 0x100c98 | 0x128 | data | ||
RT_BITMAP | 0x100dc0 | 0xd0 | data | ||
RT_BITMAP | 0x100e90 | 0x128 | data | ||
RT_BITMAP | 0x100fb8 | 0x128 | data | ||
RT_BITMAP | 0x1010e0 | 0x128 | data | ||
RT_BITMAP | 0x101208 | 0x128 | data | ||
RT_BITMAP | 0x101330 | 0x128 | data | ||
RT_BITMAP | 0x101458 | 0xe8 | data | ||
RT_BITMAP | 0x101540 | 0x128 | data | ||
RT_BITMAP | 0x101668 | 0x128 | data | ||
RT_BITMAP | 0x101790 | 0xd0 | data | ||
RT_BITMAP | 0x101860 | 0x128 | data | ||
RT_BITMAP | 0x101988 | 0x128 | data | ||
RT_BITMAP | 0x101ab0 | 0xe8 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x101b98 | 0x988 | data | English | United States |
RT_ICON | 0x102520 | 0x10a8 | data | English | United States |
RT_DIALOG | 0x1035c8 | 0x52 | data | ||
RT_STRING | 0x10361c | 0x868 | data | ||
RT_STRING | 0x103e84 | 0x830 | data | ||
RT_STRING | 0x1046b4 | 0x1e0 | data | ||
RT_STRING | 0x104894 | 0x198 | data | ||
RT_STRING | 0x104a2c | 0x158 | data | ||
RT_STRING | 0x104b84 | 0x624 | data | ||
RT_STRING | 0x1051a8 | 0x260 | data | ||
RT_STRING | 0x105408 | 0xe8 | data | ||
RT_STRING | 0x1054f0 | 0x128 | data | ||
RT_STRING | 0x105618 | 0x2c8 | data | ||
RT_STRING | 0x1058e0 | 0x408 | data | ||
RT_STRING | 0x105ce8 | 0x380 | data | ||
RT_STRING | 0x106068 | 0x418 | data | ||
RT_STRING | 0x106480 | 0x1b0 | data | ||
RT_STRING | 0x106630 | 0xec | data | ||
RT_STRING | 0x10671c | 0x1e4 | data | ||
RT_STRING | 0x106900 | 0x3e8 | data | ||
RT_STRING | 0x106ce8 | 0x358 | data | ||
RT_STRING | 0x107040 | 0x2b4 | data | ||
RT_RCDATA | 0x1072f4 | 0x10 | data | ||
RT_RCDATA | 0x107304 | 0x390 | data | ||
RT_RCDATA | 0x107694 | 0x23f | Delphi compiled form 'TFrmAbout' | ||
RT_GROUP_CURSOR | 0x1078d4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x1078e8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x1078fc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x107910 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x107924 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x107938 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x10794c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_ICON | 0x107960 | 0x22 | data | English | United States |
Imports |
---|
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
kernel32.dll | lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, StretchDIBits, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetPaletteEntries, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawStateA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
ole32.dll | CreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | GetErrorInfo, SysFreeString |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create |
winmm.dll | sndPlaySoundA |
uRL | InetIsOffline |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Network Port Distribution |
---|
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2021 17:22:23.840656042 CEST | 49557 | 53 | 192.168.2.5 | 8.8.8.8 |
Oct 27, 2021 17:22:24.971437931 CEST | 61733 | 53 | 192.168.2.5 | 8.8.8.8 |
Oct 27, 2021 17:23:29.635649920 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Oct 27, 2021 17:23:29.640189886 CEST | 63183 | 53 | 192.168.2.5 | 8.8.8.8 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Oct 27, 2021 17:22:23.840656042 CEST | 192.168.2.5 | 8.8.8.8 | 0xc540 | Standard query (0) | A (IP address) | IN (0x0001) | |
Oct 27, 2021 17:22:24.971437931 CEST | 192.168.2.5 | 8.8.8.8 | 0xd0ee | Standard query (0) | A (IP address) | IN (0x0001) | |
Oct 27, 2021 17:23:29.635649920 CEST | 192.168.2.5 | 8.8.8.8 | 0x1701 | Standard query (0) | A (IP address) | IN (0x0001) | |
Oct 27, 2021 17:23:29.640189886 CEST | 192.168.2.5 | 8.8.8.8 | 0x501 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Oct 27, 2021 17:22:23.881091118 CEST | 8.8.8.8 | 192.168.2.5 | 0xc540 | No error (0) | odc-web-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) | ||
Oct 27, 2021 17:22:25.050039053 CEST | 8.8.8.8 | 192.168.2.5 | 0xd0ee | No error (0) | bn-files.fe.1drv.com | CNAME (Canonical name) | IN (0x0001) | ||
Oct 27, 2021 17:22:25.050039053 CEST | 8.8.8.8 | 192.168.2.5 | 0xd0ee | No error (0) | odc-bn-files-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) | ||
Oct 27, 2021 17:23:29.654856920 CEST | 8.8.8.8 | 192.168.2.5 | 0x1701 | No error (0) | odc-web-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) | ||
Oct 27, 2021 17:23:29.695108891 CEST | 8.8.8.8 | 192.168.2.5 | 0x501 | No error (0) | odc-web-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 17:21:10 |
Start date: | 27/10/2021 |
Path: | C:\Users\user\Desktop\T-T Swift Copy.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1052672 bytes |
MD5 hash: | A3127D76C37D53A8ECAAB821CE5D99A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
General |
---|
Start time: | 17:22:28 |
Start date: | 27/10/2021 |
Path: | C:\Windows\SysWOW64\mobsync.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1080000 |
File size: | 93184 bytes |
MD5 hash: | 44C19378FA529DD88674BAF647EBDC3C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
General |
---|
Start time: | 17:22:31 |
Start date: | 27/10/2021 |
Path: | C:\Windows\explorer.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff693d90000 |
File size: | 3933184 bytes |
MD5 hash: | AD5296B280E8F522A8A897C96BAB0E1D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
General |
---|
Start time: | 17:22:37 |
Start date: | 27/10/2021 |
Path: | C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1052672 bytes |
MD5 hash: | A3127D76C37D53A8ECAAB821CE5D99A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
General |
---|
Start time: | 17:22:46 |
Start date: | 27/10/2021 |
Path: | C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff7e2800000 |
File size: | 1052672 bytes |
MD5 hash: | A3127D76C37D53A8ECAAB821CE5D99A6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Function 0234BF70, Relevance: 2.6, Strings: 2, Instructions: 68COMMON
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 02349EE0, Relevance: 2.6, Strings: 2, Instructions: 129COMMON
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |