Windows Analysis Report T3AtsGGHEL.exe
Overview
General Information
Sample Name: | T3AtsGGHEL.exe |
Analysis ID: | 534006 |
MD5: | 89611c7a85fb5ccd4dd7edc076bc4ee8 |
SHA1: | a29812244684e248d7fe4f9e65e180bb4cd3098a |
SHA256: | a5cf8668fc9624b386bbdad3a3dba28c029945048a7d15a0b0ee41dfe9e0a2df |
Tags: | exeSmokeLoader |
Infos: | |
Most interesting Screenshot: | |
Errors
|
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Multi AV Scanner detection for domain / URL | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00ECA061 |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | Code function: | 1_2_00EC1820 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00EC2040 | |
Source: | Code function: | 1_2_00EC1820 | |
Source: | Code function: | 1_2_00EBC830 | |
Source: | Code function: | 1_2_00EBD500 | |
Source: | Code function: | 1_2_00EB7630 | |
Source: | Code function: | 1_2_00EB8600 | |
Source: | Code function: | 1_2_00EB98FC | |
Source: | Code function: | 1_2_00EB98F4 | |
Source: | Code function: | 1_2_00EB592D | |
Source: | Code function: | 1_2_00EBC280 | |
Source: | Code function: | 1_2_00EC24F0 | |
Source: | Code function: | 1_2_00EBEED0 | |
Source: | Code function: | 1_2_00ED0E50 | |
Source: | Code function: | 1_2_00EB6E30 | |
Source: | Code function: | 1_2_00ECFF12 |
Source: | Code function: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00EC3DF9 |
Source: | Static PE information: |
Source: | Code function: | 1_2_00EC3002 |
Source: | Last function: |
Source: | Code function: | 1_2_00ECA061 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 1_2_00EC73C4 |
Source: | Code function: | 1_2_00EBC830 | |
Source: | Code function: | 1_2_00EBD500 | |
Source: | Code function: | 1_2_00EBD500 | |
Source: | Code function: | 1_2_00EBD500 | |
Source: | Code function: | 1_2_00EBD500 | |
Source: | Code function: | 1_2_00EC6DF1 | |
Source: | Code function: | 1_2_00EC8752 |
Source: | Code function: | 1_2_00EC2040 |
Source: | Code function: | 1_2_00EC3D29 | |
Source: | Code function: | 1_2_00EC38A6 | |
Source: | Code function: | 1_2_00EC73C4 | |
Source: | Code function: | 1_2_00EC3BC4 |
Source: | Code function: | 1_2_00EC39E4 |
Source: | Code function: | 1_2_00EC703C |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Application Shimming1 | Process Injection1 | Process Injection1 | Input Capture1 | System Time Discovery1 | Remote Services | Input Capture1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Application Shimming1 | Deobfuscate/Decode Files or Information1 | LSASS Memory | Security Software Discovery21 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Ingress Tool Transfer2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information2 | Security Account Manager | Remote System Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | File and Directory Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol2 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | System Information Discovery12 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
61% | Virustotal | Browse | ||
48% | ReversingLabs | Win32.Backdoor.Zapchast | ||
100% | Joe Sandbox ML |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
6% | Virustotal | Browse |
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
7% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
wfsdragon.ru | 172.67.133.215 | true | true |
| unknown |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
212.193.30.45 | unknown | Russian Federation | 57844 | SPD-NETTR | true | |
172.67.133.215 | wfsdragon.ru | United States | 13335 | CLOUDFLARENETUS | true |
General Information |
---|
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 534006 |
Start date: | 04.12.2021 |
Start time: | 23:47:36 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | T3AtsGGHEL.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 26 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal68.winEXE@2/0@1/2 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
212.193.30.45 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
172.67.133.215 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
wfsdragon.ru | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
SPD-NETTR | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.162371325795308 |
TrID: |
|
File name: | T3AtsGGHEL.exe |
File size: | 436224 |
MD5: | 89611c7a85fb5ccd4dd7edc076bc4ee8 |
SHA1: | a29812244684e248d7fe4f9e65e180bb4cd3098a |
SHA256: | a5cf8668fc9624b386bbdad3a3dba28c029945048a7d15a0b0ee41dfe9e0a2df |
SHA512: | 5bb8da1fc7efe568d7279c39c0c8cee8e55f858e2b101db5d48a933d95e4e87040f944428dd930a12a8766e7da37c5e332a0b16211955ef867172822d878eed3 |
SSDEEP: | 12288:1imaXG6cgudGbpR8W6szcwG67S+9Gf1NyKZ4:Mm7C8W3zLG6G+4f9Z |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.cG........................................................*...............Y...................................Rich........... |
File Icon |
---|
Icon Hash: | f89e67662636decc |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x4137fa |
Entrypoint Section: | .code |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x61A8861D [Thu Dec 2 08:38:53 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 503fd9eea05c6f717892aae512299b17 |
Entrypoint Preview |
---|
Instruction |
---|
call 00007FD98CD00443h |
jmp 00007FD98CCFFC69h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push esi |
mov eax, dword ptr [esp+14h] |
or eax, eax |
jne 00007FD98CCFFE1Ah |
mov ecx, dword ptr [esp+10h] |
mov eax, dword ptr [esp+0Ch] |
xor edx, edx |
div ecx |
mov ebx, eax |
mov eax, dword ptr [esp+08h] |
div ecx |
mov esi, eax |
mov eax, ebx |
mul dword ptr [esp+10h] |
mov ecx, eax |
mov eax, esi |
mul dword ptr [esp+10h] |
add edx, ecx |
jmp 00007FD98CCFFE39h |
mov ecx, eax |
mov ebx, dword ptr [esp+10h] |
mov edx, dword ptr [esp+0Ch] |
mov eax, dword ptr [esp+08h] |
shr ecx, 1 |
rcr ebx, 1 |
shr edx, 1 |
rcr eax, 1 |
or ecx, ecx |
jne 00007FD98CCFFDE6h |
div ebx |
mov esi, eax |
mul dword ptr [esp+14h] |
mov ecx, eax |
mov eax, dword ptr [esp+10h] |
mul esi |
add edx, ecx |
jc 00007FD98CCFFE00h |
cmp edx, dword ptr [esp+0Ch] |
jnbe 00007FD98CCFFDFAh |
jc 00007FD98CCFFE01h |
cmp eax, dword ptr [esp+08h] |
jbe 00007FD98CCFFDFBh |
dec esi |
sub eax, dword ptr [esp+10h] |
sbb edx, dword ptr [esp+14h] |
xor ebx, ebx |
sub eax, dword ptr [esp+08h] |
sbb edx, dword ptr [esp+0Ch] |
neg edx |
neg eax |
sbb edx, 00000000h |
mov ecx, edx |
mov edx, ebx |
mov ebx, ecx |
mov ecx, eax |
mov eax, esi |
pop esi |
retn 0010h |
ret |
push ebp |
mov ebp, esp |
push 00000000h |
call dword ptr [00425068h] |
push dword ptr [ebp+08h] |
call dword ptr [00425064h] |
push C0000409h |
call dword ptr [0000006Ch] |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x25140 | 0x3c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x26000 | 0x45c18 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x6c000 | 0x1650 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x602c | 0x1c | .code |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x6048 | 0x40 | .code |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x25000 | 0x13c | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.code | 0x1000 | 0x218a0 | 0x21a00 | False | 0.50054455158 | data | 6.46692412072 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x23000 | 0x1590 | 0xa00 | False | 0.178125 | DOS executable (block device driver @\273\) | 2.44015014816 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.idata | 0x25000 | 0x83a | 0xa00 | False | 0.39140625 | COM executable for DOS | 4.75468144198 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x26000 | 0x45c18 | 0x45e00 | False | 0.816409743962 | data | 7.34383108574 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x6c000 | 0x1650 | 0x1800 | False | 0.733072916667 | data | 6.40608727267 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x26578 | 0x1dccb | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | ||
RT_ICON | 0x44248 | 0x10828 | dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 570425344, next used block 352321536 | ||
RT_ICON | 0x54a70 | 0x94a8 | data | ||
RT_ICON | 0x5df18 | 0x5488 | data | ||
RT_ICON | 0x633a0 | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x675c8 | 0x25a8 | data | ||
RT_ICON | 0x69b70 | 0x10a8 | data | ||
RT_ICON | 0x6ac18 | 0x988 | data | ||
RT_ICON | 0x6b5a0 | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0x6ba08 | 0x84 | data | ||
RT_VERSION | 0x262b0 | 0x2c4 | data | ||
RT_MANIFEST | 0x6ba90 | 0x188 | XML 1.0 document text | English | United States |
Imports |
---|
DLL | Import |
---|---|
KERNEL32.dll | ReadFile, lstrcatA, GetModuleHandleA, CreateFileA, lstrcpyA, CloseHandle, CreateThread, GetProcAddress, GetFileSize, GetConsoleWindow, GetLastError, lstrlenA, lstrcpynA, WriteConsoleW, CreateFileW, HeapSize, QueryPerformanceCounter, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RtlUnwind, RaiseException, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapReAlloc, SetFilePointerEx, GetFileType, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, SetStdHandle, GetStringTypeW, GetConsoleMode, FlushFileBuffers, GetConsoleOutputCP, DecodePointer |
USER32.dll | ShowWindow |
Version Infos |
---|
Description | Data |
---|---|
LegalCopyright | Tokenizer |
InternalName | UpdateToken.exe |
FileVersion | 7272.5.13.1 |
CompanyName | FreshTokenizer |
ProductName | Token Updater |
ProductVersion | 2.1.4.1 |
FileDescription | Token Updater |
OriginalFilename | SetToken.exe |
Translation | 0x041f 0x04b0 |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
12/04/21-23:48:26.150465 | TCP | 2010595 | ET MALWARE User-Agent (???) | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
12/04/21-23:48:26.277728 | TCP | 2010595 | ET MALWARE User-Agent (???) | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 4, 2021 23:48:26.122400045 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.149882078 CET | 80 | 49741 | 212.193.30.45 | 192.168.2.3 |
Dec 4, 2021 23:48:26.149980068 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.150465012 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.177802086 CET | 80 | 49741 | 212.193.30.45 | 192.168.2.3 |
Dec 4, 2021 23:48:26.177956104 CET | 80 | 49741 | 212.193.30.45 | 192.168.2.3 |
Dec 4, 2021 23:48:26.177988052 CET | 80 | 49741 | 212.193.30.45 | 192.168.2.3 |
Dec 4, 2021 23:48:26.178047895 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.178165913 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.249811888 CET | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
Dec 4, 2021 23:48:26.277226925 CET | 80 | 49742 | 172.67.133.215 | 192.168.2.3 |
Dec 4, 2021 23:48:26.277327061 CET | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
Dec 4, 2021 23:48:26.277728081 CET | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
Dec 4, 2021 23:48:26.305057049 CET | 80 | 49742 | 172.67.133.215 | 192.168.2.3 |
Dec 4, 2021 23:48:26.396331072 CET | 80 | 49742 | 172.67.133.215 | 192.168.2.3 |
Dec 4, 2021 23:48:26.396368980 CET | 80 | 49742 | 172.67.133.215 | 192.168.2.3 |
Dec 4, 2021 23:48:26.396445990 CET | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
Dec 4, 2021 23:48:26.483290911 CET | 49741 | 80 | 192.168.2.3 | 212.193.30.45 |
Dec 4, 2021 23:48:26.510665894 CET | 80 | 49741 | 212.193.30.45 | 192.168.2.3 |
Dec 4, 2021 23:48:26.759848118 CET | 49742 | 80 | 192.168.2.3 | 172.67.133.215 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 4, 2021 23:48:26.221666098 CET | 57459 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 4, 2021 23:48:26.244530916 CET | 53 | 57459 | 8.8.8.8 | 192.168.2.3 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Dec 4, 2021 23:48:26.221666098 CET | 192.168.2.3 | 8.8.8.8 | 0xa3a3 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Dec 4, 2021 23:48:26.244530916 CET | 8.8.8.8 | 192.168.2.3 | 0xa3a3 | No error (0) | 172.67.133.215 | A (IP address) | IN (0x0001) | ||
Dec 4, 2021 23:48:26.244530916 CET | 8.8.8.8 | 192.168.2.3 | 0xa3a3 | No error (0) | 104.21.5.208 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
---|
|
HTTP Packets |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49741 | 212.193.30.45 | 80 | C:\Users\user\Desktop\T3AtsGGHEL.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Dec 4, 2021 23:48:26.150465012 CET | 1094 | OUT | |
Dec 4, 2021 23:48:26.177956104 CET | 1095 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49742 | 172.67.133.215 | 80 | C:\Users\user\Desktop\T3AtsGGHEL.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Dec 4, 2021 23:48:26.277728081 CET | 1096 | OUT | |
Dec 4, 2021 23:48:26.396331072 CET | 1096 | IN | |
Dec 4, 2021 23:48:26.396368980 CET | 1096 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 23:48:23 |
Start date: | 04/12/2021 |
Path: | C:\Users\user\Desktop\T3AtsGGHEL.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 436224 bytes |
MD5 hash: | 89611C7A85FB5CCD4DD7EDC076BC4EE8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
General |
---|
Start time: | 23:48:24 |
Start date: | 04/12/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Function 00EB8600, Relevance: 45.1, APIs: 19, Strings: 5, Instructions: 3077COMMON
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EBD500, Relevance: 21.5, APIs: 11, Strings: 1, Instructions: 501sleepthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB7630, Relevance: 14.3, APIs: 6, Strings: 2, Instructions: 253libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EBC830, Relevance: 8.3, APIs: 5, Instructions: 805sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC6DF1, Relevance: 4.5, APIs: 3, Instructions: 20COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC3D29, Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECB051, Relevance: 4.6, APIs: 3, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC9324, Relevance: 3.1, APIs: 2, Instructions: 67COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC7AFC, Relevance: 3.0, APIs: 2, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB7BB0, Relevance: 1.6, APIs: 1, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECB864, Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC9C5F, Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC949E, Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 00EC3002, Relevance: 143.7, APIs: 41, Strings: 41, Instructions: 167libraryloaderCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC24F0, Relevance: 27.4, APIs: 18, Instructions: 403libraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EBEED0, Relevance: 24.8, APIs: 10, Strings: 4, Instructions: 283libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB98F4, Relevance: 19.5, APIs: 12, Instructions: 1484COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB98FC, Relevance: 19.4, APIs: 12, Instructions: 1370COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB592D, Relevance: 18.0, APIs: 11, Instructions: 1536COMMON
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC73C4, Relevance: 4.6, APIs: 3, Instructions: 77COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC703C, Relevance: 3.0, APIs: 2, Instructions: 34timeCOMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECFF12, Relevance: 1.8, APIs: 1, Instructions: 274COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC39E4, Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECA061, Relevance: 1.6, APIs: 1, Instructions: 140COMMON
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ED0E50, Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC8752, Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECBF2C, Relevance: 19.6, APIs: 13, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC89A9, Relevance: 15.1, APIs: 10, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECB0D5, Relevance: 12.2, APIs: 8, Instructions: 203COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECBCA8, Relevance: 10.6, APIs: 7, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECC899, Relevance: 9.3, APIs: 6, Instructions: 317fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC4BC0, Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC6E33, Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECE7DF, Relevance: 7.7, APIs: 5, Instructions: 244COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECDC14, Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECBC07, Relevance: 7.5, APIs: 5, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC4CA0, Relevance: 6.2, APIs: 4, Instructions: 168COMMON
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EB7D90, Relevance: 6.1, APIs: 4, Instructions: 108fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC9D86, Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC8AC1, Relevance: 6.1, APIs: 4, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC8C18, Relevance: 6.1, APIs: 4, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00ECECF5, Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00EC815A, Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |