Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RKKO3T4hSU

Overview

General Information

Sample Name:RKKO3T4hSU (renamed file extension from none to exe)
Analysis ID:651268
MD5:df9025d622d4ac7b41641491c26dc146
SHA1:ff97781df2915d2d8330d7641f572915da7513cd
SHA256:22b2655f8d9880171d3caf5ccfc408b07c96d47ba0f15e1ad00df414c7494f74
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Installs a global keyboard hook
Binary is likely a compiled AutoIt script file
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Sleep loop found (likely to delay execution)
Detected potential crypto function
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)

Classification

  • System is w10x64
  • RKKO3T4hSU.exe (PID: 824 cmdline: "C:\Users\user\Desktop\RKKO3T4hSU.exe" MD5: DF9025D622D4AC7B41641491C26DC146)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RKKO3T4hSU.exeVirustotal: Detection: 11%Perma Link
Source: RKKO3T4hSU.exeMetadefender: Detection: 14%Perma Link
Source: RKKO3T4hSU.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: RKKO3T4hSU.exe, 00000000.00000002.681137900.0000000001033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://forum.median-xl.com/viewtopic.php?f=4&t=3702

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\RKKO3T4hSU.exe
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\RKKO3T4hSU.exe
Source: RKKO3T4hSU.exe, 00000000.00000002.681153272.000000000105C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetRawInputDatac
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1CB26 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A92344 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,

System Summary

barindex
Source: RKKO3T4hSU.exe, 00000000.00000002.680662270.0000000000B44000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
Source: RKKO3T4hSU.exe, 00000000.00000002.680662270.0000000000B44000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"
Source: RKKO3T4hSU.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: RKKO3T4hSU.exe, 00000000.00000002.680990722.0000000000EE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs RKKO3T4hSU.exe
Source: RKKO3T4hSU.exe, 00000000.00000002.680990722.0000000000EE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs RKKO3T4hSU.exe
Source: RKKO3T4hSU.exe, 00000000.00000002.681832599.000000000322F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME?| vs RKKO3T4hSU.exe
Source: RKKO3T4hSU.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: RKKO3T4hSU.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: RKKO3T4hSU.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: RKKO3T4hSU.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A9E800
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A9E060
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A91287
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A9FE40
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AA70FE
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AA6841
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AC6452
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AA8968
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00ABDAF5
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AB1604
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B17E0D
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00ABBF26
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AC6F36
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A91287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,73CD4310,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A91290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A93633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1D4A8 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A9189B NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C8F9 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C8CA NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1D422 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C9A8 ClientToScreen,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C5E7 SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C928 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C502 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C973 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A916B5 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1CAE6 GetWindowLongW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A916DE GetParent,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C216 PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A9167D NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1C668 DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1BF9A NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1BFF6 ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1D7F6 NtdllDialogWndProc_W,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00B1CB26 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,
Source: RKKO3T4hSU.exeVirustotal: Detection: 11%
Source: RKKO3T4hSU.exeMetadefender: Detection: 14%
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AFA0F4 GetLastError,FormatMessageW,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AF3C99 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeMutant created: \Sessions\1\BaseNamedObjects\D2Stats-Singleton
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A94FE9 FindResourceExW,LoadResource,SizeofResource,LockResource,
Source: classification engineClassification label: mal56.spyw.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindow found: window name: SysTabControl32
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindow detected: Number of UI elements: 24
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AB8AC5 push ecx; ret
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00BD5AD0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A94A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,KiUserCallbackDispatcher,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindow / User API: threadDelayed 6680
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindow / User API: foregroundWindowGot 608
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeWindow / User API: foregroundWindowGot 1054
Source: C:\Users\user\Desktop\RKKO3T4hSU.exe TID: 5908Thread sleep time: -66800s >= -30000s
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeThread sleep count: Count: 6680 delay: -10
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AB8DD9 _memset,IsDebuggerPresent,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AC5BFC RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00BD5AD0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AC9922 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00ABA2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00A94A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,KiUserCallbackDispatcher,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: RKKO3T4hSU.exe, 00000000.00000002.680662270.0000000000B44000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: RKKO3T4hSU.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\RKKO3T4hSU.exeCode function: 0_2_00AB537A GetSystemTimeAsFileTime,__aulldiv,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Native API
Path Interception1
Process Injection
2
Virtualization/Sandbox Evasion
131
Input Capture
1
System Time Discovery
Remote Services131
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS Memory3
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Obfuscated Files or Information
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Software Packing
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RKKO3T4hSU.exe12%VirustotalBrowse
RKKO3T4hSU.exe14%MetadefenderBrowse
RKKO3T4hSU.exe11%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.2.RKKO3T4hSU.exe.a90000.0.unpack100%AviraHEUR/AGEN.1215508Download File
0.0.RKKO3T4hSU.exe.a90000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://forum.median-xl.com/viewtopic.php?f=4&t=3702RKKO3T4hSU.exe, 00000000.00000002.681137900.0000000001033000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    No contacted IP infos
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:651268
    Start date and time: 23/06/202218:20:042022-06-23 18:20:04 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 53s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:RKKO3T4hSU (renamed file extension from none to exe)
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal56.spyw.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 0.7% (good quality ratio 0.7%)
    • Quality average: 81.4%
    • Quality standard deviation: 12.8%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
    Entropy (8bit):7.708642860790186
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.39%
    • UPX compressed Win32 Executable (30571/9) 0.30%
    • Win32 EXE Yoda's Crypter (26571/9) 0.26%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    File name:RKKO3T4hSU.exe
    File size:800768
    MD5:df9025d622d4ac7b41641491c26dc146
    SHA1:ff97781df2915d2d8330d7641f572915da7513cd
    SHA256:22b2655f8d9880171d3caf5ccfc408b07c96d47ba0f15e1ad00df414c7494f74
    SHA512:f3ba07b7b072ccb8d73896517a3f8053e46d5706b32057c09e1e533a62bf46b67ae5ef077cf7b02ecad3df51b7ed180244afb5da446e0122180f1a641af637c8
    SSDEEP:24576:s4GHnhIzOarvotm4V1B3KTr5Lr8Cmat2:rshdarysr8C
    TLSH:F7050178DB9BE17BE26776FD899027B4FC2224D0FE3964B45DCC5110199004FBEAADA0
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
    Icon Hash:4994346870344d4b
    Entrypoint:0x545ad0
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
    Time Stamp:0x61641E2F [Mon Oct 11 11:21:19 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:fc6683d30d9f25244a50fd5357825e79
    Instruction
    pushad
    mov esi, 004F0000h
    lea edi, dword ptr [esi-000EF000h]
    push edi
    jmp 00007F7864F22B7Dh
    nop
    mov al, byte ptr [esi]
    inc esi
    mov byte ptr [edi], al
    inc edi
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007F7864F22B5Fh
    mov eax, 00000001h
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc eax, eax
    add ebx, ebx
    jnc 00007F7864F22B7Dh
    jne 00007F7864F22B9Ah
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007F7864F22B91h
    dec eax
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc eax, eax
    jmp 00007F7864F22B46h
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    jmp 00007F7864F22BC4h
    xor ecx, ecx
    sub eax, 03h
    jc 00007F7864F22B83h
    shl eax, 08h
    mov al, byte ptr [esi]
    inc esi
    xor eax, FFFFFFFFh
    je 00007F7864F22BE7h
    sar eax, 1
    mov ebp, eax
    jmp 00007F7864F22B7Dh
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007F7864F22B3Eh
    inc ecx
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007F7864F22B30h
    add ebx, ebx
    jne 00007F7864F22B79h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    add ebx, ebx
    jnc 00007F7864F22B61h
    jne 00007F7864F22B7Bh
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jnc 00007F7864F22B56h
    add ecx, 02h
    cmp ebp, FFFFFB00h
    adc ecx, 02h
    lea edx, dword ptr [edi+ebp]
    cmp ebp, FFFFFFFCh
    jbe 00007F7864F22B80h
    mov al, byte ptr [edx]
    Programming Language:
    • [ASM] VS2013 build 21005
    • [ C ] VS2013 build 21005
    • [C++] VS2013 build 21005
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [ASM] VS2013 UPD5 build 40629
    • [RES] VS2013 build 21005
    • [LNK] VS2013 UPD5 build 40629
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1b30900x424.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1460000x6d090.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b34b40xc.rsrc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x145cb40x48UPX1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000xef0000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10xf00000x560000x55e00False0.9878491175400291data7.936412421761764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x1460000x6e0000x6d600False0.7275334821428572data7.381009291900878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountry
    RT_ICON0x1465940x128GLS_BINARY_LSB_FIRSTEnglishGreat Britain
    RT_ICON0x1466c00x128GLS_BINARY_LSB_FIRSTEnglishGreat Britain
    RT_ICON0x1467ec0x128GLS_BINARY_LSB_FIRSTEnglishGreat Britain
    RT_ICON0x1469180x32028dataEnglishGreat Britain
    RT_ICON0x1789440xc828dataEnglishGreat Britain
    RT_ICON0x1851700x3228dBase IV DBT of \200.DBF, blocks size 0, block length 12288, next free block index 40, next free block 2002334583, next used block 863525171EnglishGreat Britain
    RT_ICON0x18839c0x1ca8dataEnglishGreat Britain
    RT_ICON0x18a0480xca8dBase IV DBT of @.DBF, block length 3072, next free block index 40, next free block 1565207644, next used block 710691370EnglishGreat Britain
    RT_ICON0x18acf40x568GLS_BINARY_LSB_FIRSTEnglishGreat Britain
    RT_MENU0x10c2380x50dataEnglishGreat Britain
    RT_DIALOG0x10c2880xfcdataEnglishGreat Britain
    RT_STRING0x10c3840x594dataEnglishGreat Britain
    RT_STRING0x10c9180x68adataEnglishGreat Britain
    RT_STRING0x10cfa40x490dataEnglishGreat Britain
    RT_STRING0x10d4340x5fcdataEnglishGreat Britain
    RT_STRING0x10da300x65cdataEnglishGreat Britain
    RT_STRING0x10e08c0x466dataEnglishGreat Britain
    RT_STRING0x10e4f40x158dataEnglishGreat Britain
    RT_RCDATA0x18b2600x2778cdata
    RT_GROUP_ICON0x1b29f00x5adataEnglishGreat Britain
    RT_GROUP_ICON0x1b2a500x14dataEnglishGreat Britain
    RT_GROUP_ICON0x1b2a680x14dataEnglishGreat Britain
    RT_GROUP_ICON0x1b2a800x14dataEnglishGreat Britain
    RT_VERSION0x1b2a980x1f8dataEnglishGreat Britain
    RT_MANIFEST0x1b2c940x3faASCII text, with CRLF line terminatorsEnglishGreat Britain
    DLLImport
    KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
    ADVAPI32.dllGetAce
    COMCTL32.dllImageList_Remove
    COMDLG32.dllGetOpenFileNameW
    GDI32.dllLineTo
    IPHLPAPI.DLLIcmpSendEcho
    MPR.dllWNetUseConnectionW
    ole32.dllCoGetObject
    OLEAUT32.dllVariantInit
    PSAPI.DLLGetProcessMemoryInfo
    SHELL32.dllDragFinish
    USER32.dllGetDC
    USERENV.dllLoadUserProfileW
    UxTheme.dllIsThemeActive
    VERSION.dllVerQueryValueW
    WININET.dllFtpOpenFileW
    WINMM.dlltimeGetTime
    WSOCK32.dllconnect
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    No network behavior found
    No statistics
    Target ID:0
    Start time:18:21:08
    Start date:23/06/2022
    Path:C:\Users\user\Desktop\RKKO3T4hSU.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\RKKO3T4hSU.exe"
    Imagebase:0xa90000
    File size:800768 bytes
    MD5 hash:DF9025D622D4AC7B41641491C26DC146
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    No disassembly