Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Jaik.84784.3654.20731

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Jaik.84784.3654.20731 (renamed file extension from 20731 to exe)
Analysis ID:662065
MD5:74cd3c3d32dcf5029d1bc66347f44af7
SHA1:d7ec9719a6e5ea0b386ef590b1b74c317e597ff8
SHA256:cb943da125fde19e41c965a9f260caf79a6fca98c89b83bde609b843be0da377
Tags:exe
Infos:

Detection

Dridex Dropper
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for dropped file
Dridex dropper found
Machine Learning detection for sample
Uses 32bit PE files
PE file contains strange resources
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
PE / OLE file has an invalid certificate
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Abnormal high CPU Usage

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeVirustotal: Detection: 58%Perma Link
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeReversingLabs: Detection: 69%
Source: C:\Users\user\AppVerif\DllHelper.exeAvira: detection malicious, Label: TR/Dropper.Gen7
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\pik vevaye\Wapawini\gal\Yim.pdb source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.dr
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B886DE InterlockedIncrement,__itow_s,__invoke_watson_if_error,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,__strftime_l,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,__snwprintf_s,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,__cftoe,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_strlen,WriteFile,OutputDebugStringA,__itow_s,__invoke_watson_if_error,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B88F12 InterlockedIncrement,__itow_s,__invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__strftime_l,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_wcscpy_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,__snwprintf_s,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,GetFileType,_wcslen,WriteConsoleW,GetLastError,__invoke_watson_if_oneof,_wcslen,WriteFile,WriteFile,OutputDebugStringW,__itow_s,__invoke_watson_if_error,___crtMessageWindowW,
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B8BAF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B82460
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B8AD10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00B81290 appears 31 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00B809F0 appears 106 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00B7D760 appears 144 times
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: invalid certificate
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess Stats: CPU usage > 98%
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: DllHelper.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeVirustotal: Detection: 58%
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeReversingLabs: Detection: 69%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeJump to behavior
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B78A10 __wcstoui64,__wdupenv_s,SetThreadPriority,FindVolumeClose,GetCommConfig,LoadLibraryW,GetThreadPriority,GetCommandLineW,SetLastError,GenerateConsoleCtrlEvent,MoveFileWithProgressA,GetProcessHeaps,GetLastError,GetModuleHandleW,GetLastError,InitializeSListHead,DebugSetProcessKillOnExit,EnumSystemGeoID,GetProcessHeap,HeapFree,GetProcAddress,VirtualProtect,LoadResource,GetACP,FreeResource,__atodbl_l,SetConsoleCtrlHandler,SetConsoleCursorPosition,GetCalendarInfoW,VirtualProtect,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile created: C:\Users\user\AppVerifJump to behavior
Source: classification engineClassification label: mal68.bank.winEXE@1/2@0/0
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic file information: File size 1870760 > 1048576
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x19f800
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\pik vevaye\Wapawini\gal\Yim.pdb source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B98235 push edi; retf
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00D0F460 push ebp; iretd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B7962F pushfd ; ret
Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: section name: .tenio
Source: DllHelper.exe.0.drStatic PE information: section name: .tenio
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B901F0 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,
Source: initial sampleStatic PE information: section name: .text entropy: 7.816031131002002
Source: initial sampleStatic PE information: section name: .text entropy: 7.816031131002002
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile created: C:\Users\user\AppVerif\DllHelper.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeDropped PE file which has not been started: C:\Users\user\AppVerif\DllHelper.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI coverage: 9.0 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B80A60 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B88F12 InterlockedIncrement,__itow_s,__invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__strftime_l,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,_wcscpy_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,_wcscat_s,__invoke_watson_if_error,__snwprintf_s,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,__invoke_watson_if_oneof,_wcscpy_s,__invoke_watson_if_error,GetFileType,_wcslen,WriteConsoleW,GetLastError,__invoke_watson_if_oneof,_wcslen,WriteFile,WriteFile,OutputDebugStringW,__itow_s,__invoke_watson_if_error,___crtMessageWindowW,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B901F0 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B78A10 __wcstoui64,__wdupenv_s,SetThreadPriority,FindVolumeClose,GetCommConfig,LoadLibraryW,GetThreadPriority,GetCommandLineW,SetLastError,GenerateConsoleCtrlEvent,MoveFileWithProgressA,GetProcessHeaps,GetLastError,GetModuleHandleW,GetLastError,InitializeSListHead,DebugSetProcessKillOnExit,EnumSystemGeoID,GetProcessHeap,HeapFree,GetProcAddress,VirtualProtect,LoadResource,GetACP,FreeResource,__atodbl_l,SetConsoleCtrlHandler,SetConsoleCursorPosition,GetCalendarInfoW,VirtualProtect,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B7D060 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B80A60 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B805D0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B85760 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: GetLocaleInfoA,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00B85780 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Native API
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory4
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Deobfuscate/Decode Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Jaik.84784.3654.exe59%VirustotalBrowse
SecuriteInfo.com.Variant.Jaik.84784.3654.exe69%ReversingLabsWin32.Trojan.Jaik
SecuriteInfo.com.Variant.Jaik.84784.3654.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppVerif\DllHelper.exe100%AviraTR/Dropper.Gen7
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:662065
Start date and time: 12/07/202217:42:072022-07-12 17:42:07 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 8m 13s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:SecuriteInfo.com.Variant.Jaik.84784.3654.20731 (renamed file extension from 20731 to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal68.bank.winEXE@1/2@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 3.4% (good quality ratio 3.3%)
  • Quality average: 70.7%
  • Quality standard deviation: 18.5%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115
  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
17:45:30Task SchedulerRun new task: COMSurrogate path: C:\Users\user\AppVerif\DllHelper.exe
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:modified
Size (bytes):480444416
Entropy (8bit):0.06514875317096143
Encrypted:false
SSDEEP:
MD5:BD864AE710BD408189F12305EEDC2008
SHA1:D6EB0CE0A3F94D8A288B0A6B50DC02DF2EE22B35
SHA-256:CE16864816826C0D87BEC3473B15F215D7F572D8DDD52600E4C82D834F535D10
SHA-512:049FE137771902D76BE572A069A607B1B0BD25C638DED9752B6E572758E9093ABB258F95368E1310C05175BCD4139F7901202241FBDA068074CDFB9895439A82
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,...h..h..h..v...y..v...T..v......O..k..h.....v...j..v...i..h...i..v...i..Richh..........................PE..L...,.(]..........................................@......................................@.................................l...(....`...............x..................................................@............................................text...`........................... ..`.data...h1..........................@....tenio.......P......................@....rsrc........`......................@..@.reloc..rG.......H...0..............@..B................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:true
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.789455480828862
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.53%
  • InstallShield setup (43055/19) 0.43%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Variant.Jaik.84784.3654.exe
File size:1870760
MD5:74cd3c3d32dcf5029d1bc66347f44af7
SHA1:d7ec9719a6e5ea0b386ef590b1b74c317e597ff8
SHA256:cb943da125fde19e41c965a9f260caf79a6fca98c89b83bde609b843be0da377
SHA512:6b1340641f1f7820755ccc9e78b083ab32444d560274103e21a3ccaf4dee93b62340a6445960dc5a8f09a0de87c138e182a2c1012fdaf4f4d6d39e88922451fe
SSDEEP:49152:yCu54sLM0OEl6bINMreuk8i09pEkJz5lAcs5PVS7fhl:yCu5OGpQefZ0vfTsfSj
TLSH:9D851208EA509426F4F7863451F98AADA63C94D71F4845C387E4A3FA866C3D0FE3257B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,...h...h...h...v...y...v...T...v.......O...k...h.......v...j...v...i...h...i...v...i...Richh...........................PE..L..
Icon Hash:e0ccbcccc2f2e4cc
Entrypoint:0x40cdb0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5D280B2C [Fri Jul 12 04:23:08 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:7f1ef45f5deb563bbecd8473c31a66d3
Signature Valid:false
Signature Issuer:CN=R3, O=Let's Encrypt, C=US
Signature Validation Error:A certificate chain could not be built to a trusted root authority
Error Number:-2146762486
Not Before, Not After
  • 5/23/2022 2:32:40 AM 8/21/2022 2:32:39 AM
Subject Chain
  • CN=www.artweaver.de
Version:3
Thumbprint MD5:BC879E2879685CBEB888E5D32DD8189D
Thumbprint SHA-1:01B29404E8E3D0019404677B8E9699DF9750B294
Thumbprint SHA-256:0FA3497022A3B9B10A0B786533C315048B785CDFE262198828BDCAB722017FC9
Serial:03BB38E009072B417BF8459D28B7B3D18D33
Instruction
mov edi, edi
push ebp
mov ebp, esp
call 00007F3584C45E4Bh
call 00007F3584C3D496h
pop ebp
ret
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
mov edi, edi
push ebp
mov ebp, esp
push FFFFFFFEh
push 0059F440h
push 004112B0h
mov eax, dword ptr fs:[00000000h]
push eax
add esp, FFFFFF94h
push ebx
push esi
push edi
mov eax, dword ptr [005A1338h]
xor dword ptr [ebp-08h], eax
xor eax, ebp
push eax
lea eax, dword ptr [ebp-10h]
mov dword ptr fs:[00000000h], eax
mov dword ptr [ebp-18h], esp
mov dword ptr [ebp-70h], 00000000h
mov dword ptr [ebp-04h], 00000000h
lea eax, dword ptr [ebp-60h]
push eax
call dword ptr [004010C4h]
mov dword ptr [ebp-04h], FFFFFFFEh
jmp 00007F3584C3D4A8h
mov eax, 00000001h
ret
mov esp, dword ptr [ebp-18h]
mov dword ptr [ebp-78h], 000000FFh
mov dword ptr [ebp-04h], FFFFFFFEh
mov eax, dword ptr [ebp-78h]
jmp 00007F3584C3D5D7h
mov dword ptr [ebp-04h], FFFFFFFEh
call 00007F3584C3D614h
mov dword ptr [ebp-6Ch], eax
push 00000001h
call 00007F3584C4738Ah
add esp, 04h
test eax, eax
jne 00007F3584C3D48Ch
push 0000001Ch
call 00007F3584C3D5CCh
add esp, 04h
call 00007F3584C450D4h
test eax, eax
jne 00007F3584C3D48Ch
push 00000010h
Programming Language:
  • [ASM] VS2008 build 21022
  • [C++] VS2008 build 21022
  • [ C ] VS2008 build 21022
  • [IMP] VS2005 build 50727
  • [RES] VS2008 build 21022
  • [LNK] VS2008 build 21022
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x19fc6c0x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a60000x21cc8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x1c78000x13a8
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c80000x19c0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x12000x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x82a80x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x1bc.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x19f6600x19f800False0.8492162821525271data7.816031131002002IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x1a10000x31680x1400False0.3314453125data3.4095039121071826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tenio0x1a50000x40x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x1a60000x21cc80x21e00False0.8149792435424354data7.4602970996808775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1c80000x47720x4800False0.3001844618055556data3.257312610228726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_ICON0x1a63600x1608ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON0x1bc3f00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
RT_ICON0x1c06180x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777216, next used block 0
RT_ICON0x1c2bc00xea8data
RT_ICON0x1c3a680x668data
RT_ICON0x1c40d00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_ICON0x1c51780x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 12707524, next used block 13232843
RT_ICON0x1c5a200x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2866470365, next used block 64682
RT_ICON0x1c5d080x988data
RT_ICON0x1c66900x6c8data
RT_ICON0x1c6d580x1e8data
RT_ICON0x1c6f400x468GLS_BINARY_LSB_FIRST
RT_ICON0x1c73a80x568GLS_BINARY_LSB_FIRST
RT_ICON0x1c79100x128GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0x1c7a380xcadata
RT_VERSION0x1c7b080x1bcdata
DLLImport
KERNEL32.dllExitProcess, GetCommandLineW, SearchPathW, FindVolumeClose, CreateFiber, FreeResource, CreateFileTransactedW, LoadResource, InitializeSListHead, HeapFree, MoveFileWithProgressA, GetModuleHandleW, GetCommConfig, GenerateConsoleCtrlEvent, GetProcessHeap, ClearCommBreak, SetCommTimeouts, LoadLibraryW, SwitchToFiber, GetCalendarInfoW, SetConsoleCursorPosition, GetACP, SetThreadPriority, VerifyVersionInfoW, DeleteFiber, GetLastError, SetLastError, GetProcAddress, GetProcessHeaps, SetConsoleCtrlHandler, SetFileApisToANSI, FoldStringA, GetThreadPriority, DebugSetProcessKillOnExit, WaitCommEvent, EnumSystemGeoID, CloseHandle, MoveFileTransactedW, FindActCtxSectionStringW, ResetWriteWatch, CreateThread, InterlockedIncrement, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetFullPathNameA, GetStartupInfoW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameW, HeapValidate, IsBadReadPtr, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, GetDriveTypeA, GetOEMCP, GetCPInfo, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, GetModuleFileNameA, WriteFile, FlushFileBuffers, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, DebugBreak, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, HeapAlloc, HeapSize, HeapReAlloc, VirtualAlloc, InitializeCriticalSectionAndSpinCount, GetCurrentDirectoryA, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, LoadLibraryA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, CreateFileA
No network behavior found
No statistics
Target ID:0
Start time:17:43:18
Start date:12/07/2022
Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe"
Imagebase:0xb70000
File size:1870760 bytes
MD5 hash:74CD3C3D32DCF5029D1BC66347F44AF7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly