Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
support.exe

Overview

General Information

Sample Name:support.exe
Analysis ID:632531
MD5:a2d24ba3b1c040105083109b9912e223
SHA1:ad9daad3cdfbe1dacf4f077b98bb26f7af0854bd
SHA256:348b351762c491c5d02cdfdf34d51faf67024f8f492ed46316d2adda6aac7412
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to inject threads in other processes
Machine Learning detection for sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Program does not show much activity (idle)

Classification

  • System is w10x64
  • support.exe (PID: 6060 cmdline: "C:\Users\user\Desktop\support.exe" MD5: A2D24BA3B1C040105083109B9912E223)
    • conhost.exe (PID: 2404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.517890121.00000000003C5000.00000004.00000001.01000000.00000003.sdmpSUSP_XORed_MSDOS_Stub_MessageDetects suspicious XORed MSDOS stub messageFlorian Roth
  • 0x76:$xo1: )\x15\x14\x0E]\x0D\x0F\x12\x1A\x0F\x1C\x10]\x1E\x1C\x13\x13\x12\x09]\x1F\x18]\x0F\x08\x13]\x14\x13]92.]\x10\x12\x19\x18
00000000.00000000.250484546.0000000000476000.00000008.00000001.01000000.00000003.sdmpSUSP_XORed_MSDOS_Stub_MessageDetects suspicious XORed MSDOS stub messageFlorian Roth
  • 0x7e76:$xo1: )\x15\x14\x0E]\x0D\x0F\x12\x1A\x0F\x1C\x10]\x1E\x1C\x13\x13\x12\x09]\x1F\x18]\x0F\x08\x13]\x14\x13]92.]\x10\x12\x19\x18
00000000.00000002.518495863.0000000000476000.00000008.00000001.01000000.00000003.sdmpSUSP_XORed_MSDOS_Stub_MessageDetects suspicious XORed MSDOS stub messageFlorian Roth
  • 0x7e76:$xo1: )\x15\x14\x0E]\x0D\x0F\x12\x1A\x0F\x1C\x10]\x1E\x1C\x13\x13\x12\x09]\x1F\x18]\x0F\x08\x13]\x14\x13]92.]\x10\x12\x19\x18
00000000.00000000.250216516.00000000003C5000.00000008.00000001.01000000.00000003.sdmpSUSP_XORed_MSDOS_Stub_MessageDetects suspicious XORed MSDOS stub messageFlorian Roth
  • 0x76:$xo1: )\x15\x14\x0E]\x0D\x0F\x12\x1A\x0F\x1C\x10]\x1E\x1C\x13\x13\x12\x09]\x1F\x18]\x0F\x08\x13]\x14\x13]92.]\x10\x12\x19\x18
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: support.exeVirustotal: Detection: 60%Perma Link
Source: support.exeMetadefender: Detection: 23%Perma Link
Source: support.exeReversingLabs: Detection: 68%
Source: support.exeJoe Sandbox ML: detected
Source: support.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: support.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: support.exeString found in binary or memory: (http://www.youtube.com/JamesPaddockMusic equals www.youtube.com (Youtube)
Source: support.exeString found in binary or memory: http://vulpvibe.bandcamp.com/album/squaredance
Source: support.exeString found in binary or memory: http://www.exrock.com
Source: support.exeString found in binary or memory: http://www.netexplorers.com/member/midizone/
Source: support.exeString found in binary or memory: http://www.youtube.com/JamesPaddockMusic
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BCA60 memset,memset,InternetOpenA,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,memmove,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,_invalid_parameter_noinfo_noreturn,
Source: support.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 00000000.00000002.517890121.00000000003C5000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: SUSP_XORed_MSDOS_Stub_Message date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed MSDOS stub message, reference = https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings, score =
Source: 00000000.00000000.250484546.0000000000476000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: SUSP_XORed_MSDOS_Stub_Message date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed MSDOS stub message, reference = https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings, score =
Source: 00000000.00000002.518495863.0000000000476000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: SUSP_XORed_MSDOS_Stub_Message date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed MSDOS stub message, reference = https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings, score =
Source: 00000000.00000000.250216516.00000000003C5000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: SUSP_XORed_MSDOS_Stub_Message date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed MSDOS stub message, reference = https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings, score =
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B1050
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7C40
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B3520
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B3B30
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BA100
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6D60
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BCDA0
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B29D0
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7610
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6F80
Source: support.exeVirustotal: Detection: 60%
Source: support.exeMetadefender: Detection: 23%
Source: support.exeReversingLabs: Detection: 68%
Source: support.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\support.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6C80 FindWindowA,Sleep,CreateToolhelp32Snapshot,memset,Process32First,Process32Next,Process32Next,CloseHandle,CloseHandle,
Source: unknownProcess created: C:\Users\user\Desktop\support.exe "C:\Users\user\Desktop\support.exe"
Source: C:\Users\user\Desktop\support.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7610 FindWindowA,Sleep,Sleep,Sleep,FindWindowA,FindWindowA,FindWindowA,FindWindowA,Sleep,GetWindowThreadProcessId,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z,LoadLibraryA,GetProcAddress,SetLastError,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z,CloseHandle,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z,CloseHandle,
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2404:120:WilError_01
Source: support.exeString found in binary or memory: F-AdDdId A
Source: classification engineClassification label: mal60.evad.winEXE@2/1@0/0
Source: support.exeStatic file information: File size 3431424 > 1048576
Source: support.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x331000
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: support.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: support.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: support.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: support.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: support.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: support.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: support.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BEDB6 push ecx; ret
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7C40 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7C40 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\support.exeWindow / User API: threadDelayed 896
Source: C:\Users\user\Desktop\support.exe TID: 276Thread sleep time: -89600s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging

barindex
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6560 GetModuleHandleA,IsDebuggerPresent,CheckRemoteDebuggerPresent,IsDebuggerPresent,GetModuleHandleA,CheckRemoteDebuggerPresent,IsDebuggerPresent,GetModuleHandleA,CheckRemoteDebuggerPresent,GetTickCount64,Sleep,
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6560 GetModuleHandleA,IsDebuggerPresent,CheckRemoteDebuggerPresent,IsDebuggerPresent,GetModuleHandleA,CheckRemoteDebuggerPresent,IsDebuggerPresent,GetModuleHandleA,CheckRemoteDebuggerPresent,GetTickCount64,Sleep,
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6620 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6450 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B6450 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B64B0 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\support.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\support.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B7C40 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BF0FA SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BEB6B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BEF95 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003B66C0 Sleep,VirtualAllocEx,memset,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,VirtualFreeEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,VirtualFreeEx,VirtualFreeEx,CloseHandle,GetExitCodeProcess,GetExitCodeProcess,memset,ReadProcessMemory,Sleep,memset,WriteProcessMemory,malloc,memset,WriteProcessMemory,VirtualFreeEx,VirtualFreeEx,Sleep,
Source: C:\Users\user\Desktop\support.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BEDEE cpuid
Source: C:\Users\user\Desktop\support.exeCode function: 0_2_003BF154 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path Interception1
Access Token Manipulation
2
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Native API
Boot or Logon Initialization Scripts11
Process Injection
1
Access Token Manipulation
LSASS Memory12
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
support.exe60%VirustotalBrowse
support.exe24%MetadefenderBrowse
support.exe68%ReversingLabsWin32.Trojan.GenericML
support.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.exrock.com0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://vulpvibe.bandcamp.com/album/squaredancesupport.exefalse
    high
    http://www.youtube.com/JamesPaddockMusicsupport.exefalse
      high
      http://www.exrock.comsupport.exefalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:632531
      Start date and time: 23/05/202218:44:162022-05-23 18:44:16 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 27s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:support.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:25
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal60.evad.winEXE@2/1@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 100% (good quality ratio 82.2%)
      • Quality average: 40.9%
      • Quality standard deviation: 33.4%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.223.24.244
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\support.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):118
      Entropy (8bit):4.611012807958004
      Encrypted:false
      SSDEEP:3:XdfLOSyod4nQIBFBdCFfFW1aBQSIovWv/tptE1nwobWyFuQyAov0:tB8xFB2fwamsOHt2WyFfye
      MD5:639D4A73EA7C12736FD64208AA50CBAA
      SHA1:8CFB31975C3EBF3EB4E31F8A827D832C80EDFE61
      SHA-256:A2BE64267B36E4AEDFDE03124CAB323AB6A998FDC6F4F99287B0459F7DF5EC29
      SHA-512:E2A0AD3BA1C86A46862FF6E24F8FE46C9990D0B6D9B9769EE623E631FA635A12DECD6CE3B5D62183BA706B3A000F1AE25C71AD7F09A52241BAB625A25E2CDBBA
      Malicious:false
      Reputation:low
      Preview: - Status (Unknown) -.. - Build date (Dec 27 2021) -.. - Product -.... 1) PPHUD.. 2) PPHUD Alpha.. 3) Music box.... >
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.833608978635711
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:support.exe
      File size:3431424
      MD5:a2d24ba3b1c040105083109b9912e223
      SHA1:ad9daad3cdfbe1dacf4f077b98bb26f7af0854bd
      SHA256:348b351762c491c5d02cdfdf34d51faf67024f8f492ed46316d2adda6aac7412
      SHA512:6482efb73080840fde2e26e3137243dc73dcb12bd48db9722280c4f093e257afe65af91a2a1d7c83d8b0829b8933e05c0dfbfbf89d83021d329372e89f865c5f
      SSDEEP:49152:fym8dnvafFKnfyWDx2O52V3LZ4WtgDkPXqJ5O/srX3LochcQBPBPPhZBPBPPhZBn:6m8dvafFKfP93MF4WeDeX0oU0Qc
      TLSH:93F58D65025ABFE8CE37A5F110B6DF1E71E075FA4439AAAC4C95D4F173A00608C35AAF
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........s... ... ... ..c ... ...!... ...!... ...!... ...!... ...!... ... ... u..!... u.. ... u..!... Rich... ........PE..L...$..a...
      Icon Hash:00828e8e8686b000
      Entrypoint:0x40eb61
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
      DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x61C9B824 [Mon Dec 27 12:57:08 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:9f9653573673d8f6615fcab81ba51787
      Instruction
      call 00007F57D4F9C710h
      jmp 00007F57D4F9BF49h
      push ebp
      mov ebp, esp
      push 00000000h
      call dword ptr [00411090h]
      push dword ptr [ebp+08h]
      call dword ptr [0041108Ch]
      push C0000409h
      call dword ptr [0041102Ch]
      push eax
      call dword ptr [00411094h]
      pop ebp
      ret
      push ebp
      mov ebp, esp
      sub esp, 00000324h
      push 00000017h
      call 00007F57D4F9C8B3h
      test eax, eax
      je 00007F57D4F9C0D7h
      push 00000002h
      pop ecx
      int 29h
      mov dword ptr [007460A0h], eax
      mov dword ptr [0074609Ch], ecx
      mov dword ptr [00746098h], edx
      mov dword ptr [00746094h], ebx
      mov dword ptr [00746090h], esi
      mov dword ptr [0074608Ch], edi
      mov word ptr [007460B8h], ss
      mov word ptr [007460ACh], cs
      mov word ptr [00746088h], ds
      mov word ptr [00746084h], es
      mov word ptr [00746080h], fs
      mov word ptr [0074607Ch], gs
      pushfd
      pop dword ptr [007460B0h]
      mov eax, dword ptr [ebp+00h]
      mov dword ptr [007460A4h], eax
      mov eax, dword ptr [ebp+04h]
      mov dword ptr [007460A8h], eax
      lea eax, dword ptr [ebp+08h]
      mov dword ptr [007460B4h], eax
      mov eax, dword ptr [ebp-00000324h]
      mov dword ptr [00745FF0h], 00010001h
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1375c0x12c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3470000x1e8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3480000xf00.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x120400x38.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x121180x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x120780x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x110000x2b4.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xf4410xf600False0.507637830285data6.47898584689IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x110000x3e9c0x4000False0.454711914062data5.62734968604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x150000x3313a40x331000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x3470000x1e80x200False0.5390625data4.7720374017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x3480000xf000x1000False0.791748046875data6.50058963945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_MANIFEST0x3470600x188XML 1.0 document textEnglishUnited States
      DLLImport
      KERNEL32.dllGetStdHandle, CreateToolhelp32Snapshot, Sleep, Process32Next, CloseHandle, FillConsoleOutputAttribute, SetConsoleCursorPosition, GetCurrentProcess, GetModuleHandleA, GetTickCount64, LoadLibraryA, SetConsoleTitleA, GetProcAddress, IsDebuggerPresent, CheckRemoteDebuggerPresent, SetLastError, Module32Next, Module32First, GetExitCodeProcess, WaitForSingleObject, SetEvent, CreateEventA, GetModuleFileNameA, GetConsoleScreenBufferInfo, Process32First, CreateThread, FillConsoleOutputCharacterA, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, CreateEventW, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead
      ADVAPI32.dllLookupPrivilegeValueA, OpenProcessToken, AdjustTokenPrivileges
      MSVCP140.dll?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ?getloc@ios_base@std@@QBE?AVlocale@2@XZ, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??Bid@locale@std@@QAEIXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@H@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z, ?_Xlength_error@std@@YAXPBD@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPBD@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
      WININET.dllHttpSendRequestA, InternetConnectA, InternetReadFile, InternetOpenA, HttpOpenRequestA, InternetCloseHandle
      WINMM.dllmidiStreamClose, midiOutShortMsg, midiStreamRestart, midiOutReset, midiStreamProperty, midiStreamOpen, midiStreamStop, midiOutUnprepareHeader, midiStreamOut, midiOutPrepareHeader
      VCRUNTIME140.dllmemcpy, __CxxFrameHandler3, __std_exception_destroy, __std_exception_copy, memchr, strstr, _CxxThrowException, _except_handler4_common, memset, __std_terminate, memmove
      api-ms-win-crt-utility-l1-1-0.dllrand, srand
      api-ms-win-crt-time-l1-1-0.dll_localtime64, _time64
      api-ms-win-crt-stdio-l1-1-0.dllungetc, setvbuf, fgetpos, fsetpos, fwrite, __p__commode, _set_fmode, fgetc, fclose, fflush, fputc, fread, _get_stream_buffer_pointers, getchar, _fseeki64
      api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, _get_initial_narrow_environment, _initterm_e, _register_onexit_function, _exit, _initialize_onexit_table, _seh_filter_exe, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _cexit, _initterm, _initialize_narrow_environment, _configure_narrow_argv, _controlfp_s, terminate, __p___argc, _crt_atexit, _invalid_parameter_noinfo_noreturn, exit
      api-ms-win-crt-heap-l1-1-0.dllfree, _callnewh, _set_new_mode, malloc
      api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _lock_file
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Target ID:0
      Start time:18:45:26
      Start date:23/05/2022
      Path:C:\Users\user\Desktop\support.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\support.exe"
      Imagebase:0x3b0000
      File size:3431424 bytes
      MD5 hash:A2D24BA3B1C040105083109B9912E223
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: SUSP_XORed_MSDOS_Stub_Message, Description: Detects suspicious XORed MSDOS stub message, Source: 00000000.00000002.517890121.00000000003C5000.00000004.00000001.01000000.00000003.sdmp, Author: Florian Roth
      • Rule: SUSP_XORed_MSDOS_Stub_Message, Description: Detects suspicious XORed MSDOS stub message, Source: 00000000.00000000.250484546.0000000000476000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
      • Rule: SUSP_XORed_MSDOS_Stub_Message, Description: Detects suspicious XORed MSDOS stub message, Source: 00000000.00000002.518495863.0000000000476000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
      • Rule: SUSP_XORed_MSDOS_Stub_Message, Description: Detects suspicious XORed MSDOS stub message, Source: 00000000.00000000.250216516.00000000003C5000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
      Reputation:low

      Target ID:1
      Start time:18:45:27
      Start date:23/05/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff647620000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      No disassembly