Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rd1Kf1A4cB.bin

Overview

General Information

Sample Name:Rd1Kf1A4cB.bin (renamed file extension from bin to exe)
Analysis ID:660113
MD5:0ad89e86b34a226ff2a3042103afc7f1
SHA1:91a27477c847ebf9ef3e2cb34e0bc93e323f449d
SHA256:f831d088c3a64b06843d970337f1c8877c9c1988d56720a7dee9d67efeaf78f0
Tags:exezitmo
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Found evasive API chain checking for process token information
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
May initialize a security null descriptor
Contains functionality to launch a process as a different user
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Contains functionality to enumerate network shares
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Rd1Kf1A4cB.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\Rd1Kf1A4cB.exe" MD5: 0AD89E86B34A226FF2A3042103AFC7F1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Rd1Kf1A4cB.exeAvira: detected
Source: Rd1Kf1A4cB.exeVirustotal: Detection: 78%Perma Link
Source: Rd1Kf1A4cB.exeReversingLabs: Detection: 96%
Source: Rd1Kf1A4cB.exeJoe Sandbox ML: detected
Source: 0.2.Rd1Kf1A4cB.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00411780 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

Compliance

barindex
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeUnpacked PE file: 0.2.Rd1Kf1A4cB.exe.400000.0.unpack
Source: Rd1Kf1A4cB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00405838 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00415B2D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00415BE8 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: Rd1Kf1A4cB.exe, Rd1Kf1A4cB.exe, 00000000.00000002.260107317.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google.com/webhp
Source: Rd1Kf1A4cB.exe, 00000000.00000002.260107317.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google.com/webhpbcsocksGlobal
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040CC5C InternetReadFile,
Source: Rd1Kf1A4cB.exe, 00000000.00000002.260413898.000000000077A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040BB78 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040BCEA GetClipboardData,GlobalLock,EnterCriticalSection,LeaveCriticalSection,GlobalUnlock,
Source: Rd1Kf1A4cB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040F964 InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404191 ExitWindowsEx,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404392 CreateMutexW,ExitWindowsEx,OpenEventW,CloseHandle,SetEvent,CloseHandle,CloseHandle,OpenMutexW,GetFileAttributesExW,ReadProcessMemory,CloseHandle,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0041168D
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00412FBB
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00411D38 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404984 NtQueryInformationProcess,CloseHandle,NtCreateThread,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404A40 NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_004063F7 NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: Rd1Kf1A4cB.exeVirustotal: Detection: 78%
Source: Rd1Kf1A4cB.exeReversingLabs: Detection: 96%
Source: Rd1Kf1A4cB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404D06 CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,CloseHandle,GetLengthSid,CloseHandle,Process32NextW,CloseHandle,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00411ADE GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040A15D CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00409FE2 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: classification engineClassification label: mal84.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00416937 CoCreateInstance,

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeUnpacked PE file: 0.2.Rd1Kf1A4cB.exe.400000.0.unpack .text:ER;.rdata:W;.rsrc:R; vs .text:ER;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeUnpacked PE file: 0.2.Rd1Kf1A4cB.exe.400000.0.unpack
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00405838 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040FE5C LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeAPI coverage: 2.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00415B2D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00415BE8 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: Rd1Kf1A4cB.exe, 00000000.00000002.260413898.000000000077A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll+
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00414C0D mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00405838 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00403A5D HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00404B6E LdrLoadDll,LdrGetDllHandle,LdrLoadDll,EnterCriticalSection,lstrcmpiW,LeaveCriticalSection,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00413873 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00410542 GetTimeZoneInformation,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040F48A GetVersionExW,GetNativeSystemInfo,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_00406940 RegOpenKeyExW,GetLocalTime,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0040CEC4 GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,
Source: Rd1Kf1A4cB.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_0041369C HeapAlloc,socket,bind,closesocket,
Source: C:\Users\user\Desktop\Rd1Kf1A4cB.exeCode function: 0_2_004133AC socket,bind,listen,closesocket,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Valid Accounts
23
Native API
1
Valid Accounts
1
Valid Accounts
1
Valid Accounts
21
Input Capture
1
Network Share Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
Access Token Manipulation
11
Access Token Manipulation
LSASS Memory2
System Time Discovery
Remote Desktop Protocol1
Archive Collected Data
Exfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Install Root Certificate
Security Account Manager11
Security Software Discovery
SMB/Windows Admin Shares1
Clipboard Data
Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
Software Packing
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Account Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
System Information Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Rd1Kf1A4cB.exe78%VirustotalBrowse
Rd1Kf1A4cB.exe96%ReversingLabsWin32.Trojan.Zeus
Rd1Kf1A4cB.exe100%AviraTR/Crypt.XPACK.Gen
Rd1Kf1A4cB.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.2.Rd1Kf1A4cB.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
0.2.Rd1Kf1A4cB.exe.590000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.0.Rd1Kf1A4cB.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.google.com/webhpbcsocksGlobalRd1Kf1A4cB.exe, 00000000.00000002.260107317.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
    high
    http://www.google.com/webhpRd1Kf1A4cB.exe, Rd1Kf1A4cB.exe, 00000000.00000002.260107317.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
      high
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:660113
      Start date and time: 09/07/202204:01:112022-07-09 04:01:11 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 14s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:Rd1Kf1A4cB.bin (renamed file extension from bin to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:27
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.evad.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 99.3% (good quality ratio 91.3%)
      • Quality average: 83.3%
      • Quality standard deviation: 29.6%
      HCA Information:
      • Successful, ratio: 88%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.50978452876486
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Rd1Kf1A4cB.exe
      File size:96256
      MD5:0ad89e86b34a226ff2a3042103afc7f1
      SHA1:91a27477c847ebf9ef3e2cb34e0bc93e323f449d
      SHA256:f831d088c3a64b06843d970337f1c8877c9c1988d56720a7dee9d67efeaf78f0
      SHA512:66149bae72c2c2cff1ce25b03c7f109ab64f8bc80fa22712836bf08843df37cf6e282e4a4776a33bf8c864f0dacb1b928ab44191cb49b65e1c3bad3e53b9d2f4
      SSDEEP:1536:uxDWt8Z1R4ayClVUbHTcM7Y62lO+5FZyoaGSMCDjTyF1ac9OtRHhmV:+Wt8ZIalVQzccKO+5FqBIItRAV
      TLSH:8693021941C6B4ABEAA44BF71BB5F117302413A14FB246E259A76E3FCF793CE0294349
      File Content Preview:MZ......................@...................................|...........!..L.!This program cannot be run in DOS mode....$...PE..L...%..L.....................d............... ....@.........................................................................dz.
      Icon Hash:00828e8e8686b000
      Entrypoint:0x401cd0
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:NO_SEH
      Time Stamp:0x4CAF0C25 [Fri Oct 8 12:18:45 2010 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:6ef02dd1adb61f4fee262f301b547fa3
      Signature Valid:
      Signature Issuer:
      Signature Validation Error:
      Error Number:
      Not Before, Not After
        Subject Chain
          Version:
          Thumbprint MD5:
          Thumbprint SHA-1:
          Thumbprint SHA-256:
          Serial:
          Instruction
          push ebp
          mov ebp, esp
          sub esp, 000002A0h
          push ebx
          push esi
          push edi
          push ecx
          sub eax, ecx
          add dword ptr [ebp-000000B8h], eax
          sub dword ptr [ebp-000000BBh], eax
          mov edi, dword ptr [00402034h]
          lea eax, dword ptr [ebp-0Ch]
          push eax
          mov byte ptr [ebp-0Ch], 00000000h
          call edi
          xor eax, dword ptr [ebp-1Dh]
          mov dword ptr [ebp-1Fh], eax
          or dword ptr [ebp-1Fh], eax
          mov ebx, dword ptr [0040200Ch]
          call ebx
          test eax, eax
          jne 00007F03A4A2EA54h
          call ecx
          and dword ptr [ebp-00000171h], eax
          and dword ptr [ebp-000001D1h], eax
          lea ecx, dword ptr [ebp-6Ch]
          push ecx
          push FFFFFDF1h
          call dword ptr [00402030h]
          add esi, dword ptr [ebp-00000220h]
          or dword ptr [ebp-0000010Dh], eax
          call ebx
          test eax, eax
          jne 00007F03A4A2EA54h
          call esp
          or ebx, edi
          xor ebx, dword ptr [ebp-00000295h]
          push 0000000Fh
          push 00000000h
          call dword ptr [00402024h]
          test eax, eax
          jne 00007F03A4A2EA54h
          mov edx, dword ptr [edx]
          lea edx, dword ptr [ebp-01h]
          push edx
          mov byte ptr [ebp-01h], 00000000h
          call edi
          call 00007F03A4A2E14Dh
          test eax, eax
          je 00007F03A4A2EAA6h
          push 00000000h
          push 00000000h
          push 00000000h
          push 00000000h
          push 00000000h
          push 00000000h
          call dword ptr [00402020h]
          or ecx, dword ptr [ebp-2Bh]
          sub dword ptr [ebp-2Ch], eax
          lea eax, dword ptr [ebp-00000268h]
          push eax
          push FFFFFF23h
          call dword ptr [00402030h]
          sub edi, dword ptr [ebp+00000000h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x17a640x50.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x180000x280.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x20000x20.rdata
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x20480xac.rdata
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xe380x1000False0.58837890625data5.938180207293575IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x20000x15c160x15e00False0.9077901785714285data7.598976363385786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x180000x60000x400False0.3388671875data3.245150535902098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_DIALOG0x180a00x6adataEnglishUnited States
          RT_MANIFEST0x181100x16aXML 1.0 document, ISO-8859 text, with CRLF line terminatorsEnglishUnited States
          DLLImport
          KERNEL32GetProcAddress, GetCurrentThread, LoadLibraryA, LocalFree, GetSystemInfo, GetModuleHandleA, CompareStringA, LocalAlloc, CloseHandle
          USER32.dllBeginPaint, CharNextA, DispatchMessageA, GetMessageA, TranslateMessage
          ADVAPI32.dllRegCloseKey
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found
          No statistics
          Target ID:0
          Start time:04:02:18
          Start date:09/07/2022
          Path:C:\Users\user\Desktop\Rd1Kf1A4cB.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\Rd1Kf1A4cB.exe"
          Imagebase:0x400000
          File size:96256 bytes
          MD5 hash:0AD89E86B34A226FF2A3042103AFC7F1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          No disassembly