Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
loader.exe

Overview

General Information

Sample Name:loader.exe
Analysis ID:679607
MD5:e5fd705d3e71f8305fa11e8d1cd2984e
SHA1:551751a4e05ddc9fb3fc3989d50032c15b99caf9
SHA256:557caa9cc31a834b807583b61c2b81a001962cd85419616c0f297d0c84b29d21
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect debuggers (CloseHandle check)
PE file contains section with special chars
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
May sleep (evasive loops) to hinder dynamic analysis
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains sections with non-standard names
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
IP address seen in connection with other malware
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loader.exe (PID: 5972 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: E5FD705D3E71F8305FA11E8D1CD2984E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: loader.exeVirustotal: Detection: 22%Perma Link
Source: loader.exeMetadefender: Detection: 17%Perma Link
Source: loader.exeReversingLabs: Detection: 46%
Source: global trafficTCP traffic: 192.168.2.3:49735 -> 51.79.119.230:13371
Source: global trafficTCP traffic: 192.168.2.3:49734 -> 51.79.119.231:13371
Source: global trafficTCP traffic: 192.168.2.3:49744 -> 51.79.119.229:13371
Source: global trafficTCP traffic: 192.168.2.3:49747 -> 51.79.119.228:13371
Source: global trafficTCP traffic: 192.168.2.3:49748 -> 51.79.119.221:13371
Source: Joe Sandbox ViewIP Address: 51.79.119.229 51.79.119.229
Source: Joe Sandbox ViewIP Address: 51.79.119.228 51.79.119.228
Source: Joe Sandbox ViewIP Address: 51.79.119.221 51.79.119.221
Source: Joe Sandbox ViewIP Address: 51.79.119.230 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.229
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.228
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.221
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.230
Source: unknownTCP traffic detected without corresponding DNS query: 51.79.119.231
Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: loader.exe, 00000000.00000003.259055056.00000000057FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?78d9fd3997324
Source: loader.exe, 00000000.00000003.282588903.0000000000601000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enEM32

System Summary

barindex
Source: loader.exeStatic PE information: section name: 4uN%
Source: loader.exeStatic PE information: section name: A]zn
Source: loader.exeStatic PE information: section name: +/*9
Source: loader.exeStatic PE information: section name: 'x00
Source: loader.exeStatic PE information: section name: 'IAL
Source: loader.exeStatic PE information: section name: w^]>
Source: loader.exeStatic PE information: section name: h`J?
Source: loader.exeVirustotal: Detection: 22%
Source: loader.exeMetadefender: Detection: 17%
Source: loader.exeReversingLabs: Detection: 46%
Source: C:\Users\user\Desktop\loader.exeFile read: C:\Users\user\Desktop\loader.exeJump to behavior
Source: C:\Users\user\Desktop\loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\loader.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
Source: classification engineClassification label: mal76.evad.winEXE@1/4@0/6
Source: C:\Users\user\Desktop\loader.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\Desktop\loader.cfg
Source: loader.exeStatic file information: File size 9042944 > 1048576
Source: loader.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: loader.exeStatic PE information: Raw size of w^]> is bigger than: 0x100000 < 0x89f400
Source: loader.exeStatic PE information: section name: 4uN%
Source: loader.exeStatic PE information: section name: A]zn
Source: loader.exeStatic PE information: section name: +/*9
Source: loader.exeStatic PE information: section name: 'x00
Source: loader.exeStatic PE information: section name: 'IAL
Source: loader.exeStatic PE information: section name: w^]>
Source: loader.exeStatic PE information: section name: h`J?
Source: initial sampleStatic PE information: section where entry point is pointing to: w^]>

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\loader.exeMemory written: PID: 5972 base: 7FFC867E0008 value: E9 7B A9 EA FF
Source: C:\Users\user\Desktop\loader.exeMemory written: PID: 5972 base: 7FFC8668A980 value: E9 90 56 15 00
Source: C:\Users\user\Desktop\loader.exeMemory written: PID: 5972 base: 7FFC867F000D value: E9 6B 9B EC FF
Source: C:\Users\user\Desktop\loader.exeMemory written: PID: 5972 base: 7FFC866B9B70 value: E9 AA 64 13 00
Source: C:\Users\user\Desktop\loader.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\loader.exeSpecial instruction interceptor: First address: 0000000140FA9A84 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\loader.exeSpecial instruction interceptor: First address: 0000000140FA9A9C instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\loader.exeRDTSC instruction interceptor: First address: 0000000140FF5B60 second address: 00000001410056D0 instructions: 0x00000000 rdtsc 0x00000002 xor dl, FFFFFF8Bh 0x00000005 dec eax 0x00000006 add edx, edx 0x00000008 inc eax 0x00000009 xor dh, bh 0x0000000b bswap ax 0x0000000e bsf dx, dx 0x00000012 mov edx, dword ptr [esp+edi] 0x00000015 dec ecx 0x00000016 sub eax, 00000004h 0x0000001c inc ecx 0x0000001d mov dword ptr [eax], edx 0x0000001f lahf 0x00000020 shrd ax, cx, 00000034h 0x00000025 dec eax 0x00000026 sub ebp, 00000004h 0x0000002c mov eax, dword ptr [ebp+00h] 0x00000030 xor eax, esi 0x00000032 rol eax, 02h 0x00000035 cmc 0x00000036 inc ecx 0x00000037 cmp eax, ebp 0x00000039 clc 0x0000003a sub eax, 0E9B52EAh 0x0000003f neg eax 0x00000041 inc ecx 0x00000042 test cl, 0000003Ch 0x00000045 sub eax, 14C9657Ch 0x0000004a push esi 0x0000004b xor dword ptr [esp], eax 0x0000004e dec eax 0x0000004f arpl dx, si 0x00000051 neg si 0x00000054 pop esi 0x00000055 inc eax 0x00000056 test dh, FFFFFF8Fh 0x00000059 dec eax 0x0000005a arpl ax, ax 0x0000005c jmp 00007FB2D0CC171Fh 0x00000061 dec esp 0x00000062 add edx, eax 0x00000064 jmp 00007FB2D0CD78C9h 0x00000069 jmp 00007FB2D0C95CB9h 0x0000006e dec esp 0x0000006f lea ebx, dword ptr [esp+00000140h] 0x00000076 dec ebp 0x00000077 cmp eax, ebx 0x00000079 jmp 00007FB2D0CF947Ah 0x0000007e ja 00007FB2D0CBFCC6h 0x00000084 inc ecx 0x00000085 push edx 0x00000086 ret 0x00000087 dec eax 0x00000088 sub ebp, 00000001h 0x0000008e sal ah, 00000076h 0x00000091 rdtsc
Source: C:\Users\user\Desktop\loader.exeRDTSC instruction interceptor: First address: 00000001407FEBE4 second address: 000000014074229E instructions: 0x00000000 rdtsc 0x00000002 xor dl, FFFFFF8Bh 0x00000005 dec eax 0x00000006 add edx, edx 0x00000008 inc eax 0x00000009 xor dh, bh 0x0000000b bswap ax 0x0000000e bsf dx, dx 0x00000012 mov edx, dword ptr [esp+edi] 0x00000015 dec ecx 0x00000016 sub eax, 00000004h 0x0000001c inc ecx 0x0000001d mov dword ptr [eax], edx 0x0000001f lahf 0x00000020 shrd ax, cx, 00000034h 0x00000025 dec eax 0x00000026 sub ebp, 00000004h 0x0000002c mov eax, dword ptr [ebp+00h] 0x00000030 xor eax, esi 0x00000032 rol eax, 02h 0x00000035 cmc 0x00000036 inc ecx 0x00000037 cmp eax, ebp 0x00000039 clc 0x0000003a sub eax, 0E9B52EAh 0x0000003f neg eax 0x00000041 inc ecx 0x00000042 test cl, 0000003Ch 0x00000045 sub eax, 14C9657Ch 0x0000004a push esi 0x0000004b xor dword ptr [esp], eax 0x0000004e dec eax 0x0000004f arpl dx, si 0x00000051 neg si 0x00000054 pop esi 0x00000055 inc eax 0x00000056 test dh, FFFFFF8Fh 0x00000059 dec eax 0x0000005a arpl ax, ax 0x0000005c jmp 00007FB2D06E9542h 0x00000061 dec esp 0x00000062 add edx, eax 0x00000064 jmp 00007FB2D07848DCh 0x00000069 jmp 00007FB2D06C4ED6h 0x0000006e dec esp 0x0000006f lea ebx, dword ptr [esp+00000140h] 0x00000076 dec ebp 0x00000077 cmp eax, ebx 0x00000079 jmp 00007FB2D0756AADh 0x0000007e ja 00007FB2D067A9FFh 0x00000084 inc ecx 0x00000085 push edx 0x00000086 ret 0x00000087 dec eax 0x00000088 sub ebp, 00000001h 0x0000008e sal ah, 00000076h 0x00000091 rdtsc
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXES
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXETION
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 3247
Source: C:\Users\user\Desktop\loader.exeWindow / User API: threadDelayed 2487
Source: C:\Users\user\Desktop\loader.exe TID: 1760Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\loader.exeFile opened / queried: C:\Windows\System32\drivers\vmmemctl.sys
Source: C:\Users\user\Desktop\loader.exeFile opened / queried: C:\Windows\System32\drivers\vmhgfs.sys
Source: C:\Users\user\Desktop\loader.exeFile opened / queried: C:\Windows\System32\drivers\vmmouse.sys
Source: C:\Users\user\Desktop\loader.exeFile opened: PhysicalDrive0
Source: C:\Users\user\Desktop\loader.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\loader.exeSystem information queried: ModuleInformation
Source: loader.exe, 00000000.00000003.282692502.0000000000632000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Windows\System32\drivers\vmmemctl.sys

Anti Debugging

barindex
Source: C:\Users\user\Desktop\loader.exeThread information set: HideFromDebugger
Source: C:\Users\user\Desktop\loader.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\loader.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\loader.exeProcess queried: DebugObjectHandle
Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpview.exe
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lordpe.exe
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
Source: loader.exe, 00000000.00000003.272407449.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.292218034.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.263600234.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.300046554.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.271260895.0000000005372000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000003.295344503.0000000005372000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Masquerading
1
Credential API Hooking
1
Query Registry
Remote Services1
Credential API Hooking
Exfiltration Over Other Network Medium1
Non-Standard Port
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts14
Virtualization/Sandbox Evasion
LSASS Memory541
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager14
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials213
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
Remote System Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
loader.exe23%VirustotalBrowse
loader.exe17%MetadefenderBrowse
loader.exe46%ReversingLabsWin64.Trojan.Phonzy
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
51.79.119.229
unknownCanada
16276OVHFRfalse
51.79.119.228
unknownCanada
16276OVHFRfalse
51.79.119.221
unknownCanada
16276OVHFRfalse
51.79.119.230
unknownCanada
16276OVHFRfalse
51.79.119.231
unknownCanada
16276OVHFRfalse
IP
192.168.2.1
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:679607
Start date and time: 06/08/202204:27:072022-08-06 04:27:07 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 13s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:loader.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:25
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.evad.winEXE@1/4@0/6
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Adjust boot time
  • Enable AMSI
  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
  • TCP Packets have been reduced to 100
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 8.248.147.254, 8.248.115.254, 8.241.126.121, 8.253.95.120, 67.26.81.254, 173.222.108.210, 173.222.108.226
  • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, arc.msn.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
04:28:15API Interceptor1x Sleep call for process: loader.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\loader.exe
File Type:data
Category:dropped
Size (bytes):2249
Entropy (8bit):7.644646383207026
Encrypted:false
SSDEEP:48:4o/OwVUqbMxLUFq8g5bnF3RoIofFCRI2fqBaj:4o/tjbMx4cbnFhJWs8Baj
MD5:F34CC48D39D75F0E8170A85E925F085F
SHA1:9CB613D56269FD8420EAD7ADE1B1E064315334AF
SHA-256:9B52B1D4D6CB0C7332A884F7DE4D52ADA49B71213359D0A0A5DC755187FABE51
SHA-512:1088C204A04A1B7E565CFBF49A261478DA98B586DDFBCD15785DFC84654B05F5226E6C1EB0FE0EFC15725C34930D8E87D535659E140134BD41335F1B3A1365D3
Malicious:false
Reputation:low
Preview:........%.......P.......................95505749-1328-4162-b38a-e051b523ca17.....................RSA1................%....F...:Ry...g.......pz..L......a...nu.....{.....,..'......}..l....3.6R..3............K.7%].].N.8`F.sYv.W..t.$R...a.#..K...m..I..W..8T.$.u.<.6.lG.q...&.D.......3.D.._..a.&<.L.5K....Oo.;,..oNkLV....2N.;....C..U..V#...2..}_..4.E.^.._.$....s..........................z..O......X......L...5...y....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .......F.5.G.........B..m..C...S.............. ....d.&......@t..].R..0..I...a. iAP.........{..55..<~.......%]....B...j.......+..m|\....GR..JLP.Z!..B7).aT..\m.o.s....V.........j..E.b...k.Cz...i`.p......4q.=.st.h..f.[yW..jNnkU34..W..pU...g&(..v.Q0|...V..G..d^...$..u[...w.......9`.p...x.....7D...M..R.....Et..U.`...:z..#.:=..q.4...........0G..@...`.ET4..i.,.._.....B.J=.X0^n.79..;.U..}9......V.........I.!W.'r........\.7....*.O,..wis.........}......C.G.KF|.&.!.L.rU.v...R?<.....zK
Process:C:\Users\user\Desktop\loader.exe
File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
Category:dropped
Size (bytes):61712
Entropy (8bit):7.995044632446497
Encrypted:true
SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
MD5:589C442FC7A0C70DCA927115A700D41E
SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
Malicious:false
Reputation:moderate, very likely benign file
Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
Process:C:\Users\user\Desktop\loader.exe
File Type:data
Category:modified
Size (bytes):326
Entropy (8bit):3.1297566246827087
Encrypted:false
SSDEEP:6:kKI+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:wNkPlE99SNxAhUeE1
MD5:FBDB41C5DDAACA78BA5ECB1A0BEE5640
SHA1:BC8BFC1D376958D61439422930850CD5F69F1805
SHA-256:7D4BB9D9E727895C6EEA59FEA9C766799C120402D5490FA31831D1CF6CA4CE0C
SHA-512:9AAB9746189C9A8B4B396BA2D825AEFDECAA68BD06943F6A7326978531C8F7B0BBE87B0CB995FFB30C65B7B93B74923AA94511FB88E3D91F907C9F3DCAB4DA03
Malicious:false
Reputation:low
Preview:p...... ..........v.....(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
Process:C:\Users\user\Desktop\loader.exe
File Type:data
Category:dropped
Size (bytes):980
Entropy (8bit):6.899463213878604
Encrypted:false
SSDEEP:24:8AgmQpZduzlC4bYs6PhUBoo2t7KKyNLcR9mMdmgmmCZwghn:819UoaJyWWlKKwIdX3E1n
MD5:D38C7B9090AE1D5DC15821B44650C7AB
SHA1:0AD315F5327304EE4E03D77DA8B67BDF9B076D9D
SHA-256:1FB5BD89E9CE594F0B266F4B43B008A8DF122A139FD1F77379BE5FF6601F221F
SHA-512:1C0594BC6F926BBDFAC00421AF11568EE2C69BCF2ECBC4EEA760757B6006B557DCAAEA25656F198C28C542D952653E7D06A60E12AD82A4D1870828A3522A239F
Malicious:false
Reputation:low
Preview:..................*.....".l..3.............d.d.d.d.d...............m.i.c.r.o.s.o.f.t...............0...+...............l............... ...............9.5.5.0.5.7.4.9.-.1.3.2.8.-.4.1.6.2.-.b.3.8.a.-.e.0.5.1.b.5.2.3.c.a.1.7.....................mW..x..>D/.+.....GX. ...........0...0..........f./V...B......10...*.H........0.1.0...U....user at 4245050...220806112813Z..270806112813Z0.1.0...U....user at 4245050.."0...*.H.............0.............s....$._.^.E.4._}..2..#V..U..C....;.N2....VLkNo..,;.oO...K5.L.<&.a._..D.3.......D.&...q.Gl.6.<.u.$.T8..W..I..m...K..#.a..R$.t..W.vYs.F`8.N..].]%7.K............3..R6.3.....l..}......'..,....{.....un...a.......L...zp.......g...yR:...F....%.....0...*.H.............8.....g..k..'.Tar....F..L.'...u'...~g.A...<...Q.x.`!,..;..{..{..+..w..p..-.$.Z..}8,T....Hj........O0vyn[.'..xi_.H.k.|r.U.=j1.U .Ew.t..y.v.'...LC..............~.2.4E<9.^.#.......-..k6.E.sVx..",.z...'..f.j..v..1....I}z!..:.G..H.E|.8JC{;...|.
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):7.956098799743011
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:loader.exe
File size:9042944
MD5:e5fd705d3e71f8305fa11e8d1cd2984e
SHA1:551751a4e05ddc9fb3fc3989d50032c15b99caf9
SHA256:557caa9cc31a834b807583b61c2b81a001962cd85419616c0f297d0c84b29d21
SHA512:5b20a5ffe995f76f99714d9b0cce3e3a85f4b71440a76138039e6bf9854c08da0adbe6a3c08cead1bcb67c5302419574cef8c5ca87c3eab34a5f02c3a5311b0c
SSDEEP:196608:Vs1m7bBPEAUdZzfjBDZ9AU84V0zFyWv6AJ5ypqetZ9j1:VWmh1YPBDZ9AnFCyNIfj1
TLSH:A39623EFA1103768C01EC4345823BD49B1F6962E1EF88A6AB5DF7AC06F6E811D542F47
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....k.b..........#......v...&.......B.........@.......................................... ................................
Icon Hash:00828e8e8686b000
Entrypoint:0x140f54281
Entrypoint Section:w^]>
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x62E46B1F [Fri Jul 29 23:19:59 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:15fd01fb7e6ca57c8d5b667e1bfac6f6
Instruction
push 69D78D6Dh
call 00007FB2D101DC7Fh
sub dword ptr [ebx-5D758BD8h], eax
or bl, ah
retf
wait
ret
or al, dl
or ecx, dword ptr [F425F3B7h]
movsd
mov byte ptr [edx], dl
and eax, 59B480F4h
fmulp st(3), st(0)
jmp far FBF8h : 74239330h
and ch, dl
retf
outsb
xchg eax, edx
adc al, FFFFFF8Bh
daa
push esp
das
sub dh, byte ptr [esi+ebp+742F3B55h]
xor eax, D334260Fh
sbb ah, byte ptr [esi]
ror ebx, 1
inc eax
wait
and al, DDh
or edi, dword ptr [edi+17F428DFh]
mov eax, 89F4283Eh
fdiv qword ptr [ebp-2Dh]
retf
mov al, byte ptr [742EBFF8h]
sbb byte ptr [ebx], bh
or al, D8h
retf
adc eax, 8BDDAC8Ah
cmpsb
mov bl, 37h
xchg dword ptr [edi+1Eh], esp
adc al, B3h
jns 00007FB2D0EBF82Ah
xchg eax, esp
push esi
adc dword ptr [edi-34068A59h], 0000A319h
push ebx
cwde
int 63h
mov ebp, BF44FEFAh
movsd
adc dword ptr [edi-2031AE10h], 65CF94F8h
pop eax
call 00007FB337BC01DFh
jnp 00007FB2D0EBF775h
insd
sub byte ptr [ebx+4F849E82h], ah
mov al, 2Eh
stosd
popfd
push ebp
aaa
mov edi, 2412C97Ah
inc ecx
movsb
sar ah, 1
push edi
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x93f5b80xc4fw^]>
IMAGE_DIRECTORY_ENTRY_IMPORT0xf167b00x2f8w^]>
IMAGE_DIRECTORY_ENTRY_RESOURCE0x110e0000x2e1h`J?
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10fc9e00x10a10w^]>
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x966b300x48w^]>
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10fc8a00x138w^]>
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x9590000x2b0w^]>
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
4uN%0x10000xe74fe0x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
A]zn0xe90000x7ff6a0x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
+/*90x1690000xc41500x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
'x000x22e0000xda7c0x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
'IAL0x23c0000x6312410x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
w^]>0x86e0000x89f3f00x89f400unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
h`J?0x110e0000x2e10x400False0.4013671875data4.307570076268581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_MANIFEST0x110e0580x289XML 1.0 document textEnglishUnited States
DLLImport
KERNEL32.dllWow64DisableWow64FsRedirection
USER32.dllShowWindow
GDI32.dllDeleteObject
ADVAPI32.dllRegSetKeyValueA
SHELL32.dllSHGetKnownFolderPath
ole32.dllCoCreateGuid
OLEAUT32.dllVariantClear
ntdll.dllNtSuspendThread
MSVCP140.dll?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
SHLWAPI.dllPathRemoveFileSpecA
IMM32.dllImmSetCompositionWindow
WS2_32.dllWSAGetLastError
CRYPT32.dllCertAddCertificateContextToStore
Secur32.dllInitSecurityInterfaceW
d3d11.dllD3D11CreateDeviceAndSwapChain
D3DCOMPILER_47.dllD3DCompile
gdiplus.dllGdipFree
DNSAPI.dllDnsNameCompare_W
RPCRT4.dllUuidCreate
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dllmemmove
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll_errno
api-ms-win-crt-stdio-l1-1-0.dll_get_stream_buffer_pointers
api-ms-win-crt-string-l1-1-0.dllisalnum
api-ms-win-crt-utility-l1-1-0.dllrand
api-ms-win-crt-convert-l1-1-0.dllstrtof
api-ms-win-crt-filesystem-l1-1-0.dllremove
api-ms-win-crt-time-l1-1-0.dll_time64
api-ms-win-crt-math-l1-1-0.dllpowf
api-ms-win-crt-environment-l1-1-0.dllgetenv
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
WTSAPI32.dllWTSSendMessageW
KERNEL32.dllGetSystemTimeAsFileTime
USER32.dllGetUserObjectInformationW
KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
USER32.dllGetProcessWindowStation, GetUserObjectInformationW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 6, 2022 04:28:13.433515072 CEST4973513371192.168.2.351.79.119.230
Aug 6, 2022 04:28:13.433659077 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:13.538110971 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:13.538678885 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:13.539931059 CEST133714973551.79.119.230192.168.2.3
Aug 6, 2022 04:28:14.178667068 CEST4973513371192.168.2.351.79.119.230
Aug 6, 2022 04:28:14.285240889 CEST133714973551.79.119.230192.168.2.3
Aug 6, 2022 04:28:14.631762028 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:14.736622095 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:14.768516064 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:14.788032055 CEST4973513371192.168.2.351.79.119.230
Aug 6, 2022 04:28:14.896356106 CEST133714973551.79.119.230192.168.2.3
Aug 6, 2022 04:28:14.897473097 CEST4974413371192.168.2.351.79.119.229
Aug 6, 2022 04:28:14.933604956 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:15.001610041 CEST133714974451.79.119.229192.168.2.3
Aug 6, 2022 04:28:15.002943993 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:15.016450882 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:15.121400118 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:15.334917068 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:15.433712959 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:15.433820963 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:15.678740025 CEST4974413371192.168.2.351.79.119.229
Aug 6, 2022 04:28:15.783205032 CEST133714974451.79.119.229192.168.2.3
Aug 6, 2022 04:28:16.131970882 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:16.236836910 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:16.288161039 CEST4974413371192.168.2.351.79.119.229
Aug 6, 2022 04:28:16.393563986 CEST133714974451.79.119.229192.168.2.3
Aug 6, 2022 04:28:16.452487946 CEST4974713371192.168.2.351.79.119.228
Aug 6, 2022 04:28:16.559268951 CEST133714974751.79.119.228192.168.2.3
Aug 6, 2022 04:28:16.979001999 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:17.086649895 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:17.131998062 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:17.178889036 CEST4974713371192.168.2.351.79.119.228
Aug 6, 2022 04:28:17.286429882 CEST133714974751.79.119.228192.168.2.3
Aug 6, 2022 04:28:17.301624060 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:17.406037092 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:17.522602081 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:17.788279057 CEST4974713371192.168.2.351.79.119.228
Aug 6, 2022 04:28:17.895164013 CEST133714974751.79.119.228192.168.2.3
Aug 6, 2022 04:28:17.896352053 CEST4974813371192.168.2.351.79.119.221
Aug 6, 2022 04:28:17.994832993 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:18.000715017 CEST133714974851.79.119.221192.168.2.3
Aug 6, 2022 04:28:18.152419090 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:18.585171938 CEST4974813371192.168.2.351.79.119.221
Aug 6, 2022 04:28:18.689703941 CEST133714974851.79.119.221192.168.2.3
Aug 6, 2022 04:28:19.282669067 CEST4974813371192.168.2.351.79.119.221
Aug 6, 2022 04:28:19.335388899 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:19.387276888 CEST133714974851.79.119.221192.168.2.3
Aug 6, 2022 04:28:19.439780951 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:20.522902966 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:20.627474070 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:21.632378101 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:21.736681938 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:22.015671968 CEST4974913371192.168.2.351.79.119.230
Aug 6, 2022 04:28:22.124047995 CEST133714974951.79.119.230192.168.2.3
Aug 6, 2022 04:28:22.635829926 CEST4974913371192.168.2.351.79.119.230
Aug 6, 2022 04:28:22.744920969 CEST133714974951.79.119.230192.168.2.3
Aug 6, 2022 04:28:22.835557938 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:22.939927101 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:23.335596085 CEST4974913371192.168.2.351.79.119.230
Aug 6, 2022 04:28:23.444709063 CEST133714974951.79.119.230192.168.2.3
Aug 6, 2022 04:28:23.811834097 CEST4975013371192.168.2.351.79.119.229
Aug 6, 2022 04:28:23.918912888 CEST133714975051.79.119.229192.168.2.3
Aug 6, 2022 04:28:24.023243904 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:24.127542019 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:24.492155075 CEST4975013371192.168.2.351.79.119.229
Aug 6, 2022 04:28:24.599430084 CEST133714975051.79.119.229192.168.2.3
Aug 6, 2022 04:28:25.132746935 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:25.176233053 CEST4975013371192.168.2.351.79.119.229
Aug 6, 2022 04:28:25.237627983 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:25.283571959 CEST133714975051.79.119.229192.168.2.3
Aug 6, 2022 04:28:25.569619894 CEST4975113371192.168.2.351.79.119.228
Aug 6, 2022 04:28:25.672688007 CEST133714975151.79.119.228192.168.2.3
Aug 6, 2022 04:28:26.335875034 CEST4975113371192.168.2.351.79.119.228
Aug 6, 2022 04:28:26.337289095 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:26.440452099 CEST133714975151.79.119.228192.168.2.3
Aug 6, 2022 04:28:26.441461086 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:27.023390055 CEST4975113371192.168.2.351.79.119.228
Aug 6, 2022 04:28:27.126451969 CEST133714975151.79.119.228192.168.2.3
Aug 6, 2022 04:28:27.242733002 CEST4975213371192.168.2.351.79.119.221
Aug 6, 2022 04:28:27.348345995 CEST133714975251.79.119.221192.168.2.3
Aug 6, 2022 04:28:27.523454905 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:27.627635002 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:27.992371082 CEST4975213371192.168.2.351.79.119.221
Aug 6, 2022 04:28:28.097898960 CEST133714975251.79.119.221192.168.2.3
Aug 6, 2022 04:28:28.634192944 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:28.738545895 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:28.789309025 CEST4975213371192.168.2.351.79.119.221
Aug 6, 2022 04:28:28.894906998 CEST133714975251.79.119.221192.168.2.3
Aug 6, 2022 04:28:29.836213112 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:29.940418959 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:31.023808956 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:31.127978086 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:31.535465956 CEST4975313371192.168.2.351.79.119.230
Aug 6, 2022 04:28:31.641992092 CEST133714975351.79.119.230192.168.2.3
Aug 6, 2022 04:28:32.133248091 CEST4973413371192.168.2.351.79.119.231
Aug 6, 2022 04:28:32.237550020 CEST133714973451.79.119.231192.168.2.3
Aug 6, 2022 04:28:32.336344957 CEST4975313371192.168.2.351.79.119.230
Aug 6, 2022 04:28:32.444093943 CEST133714975351.79.119.230192.168.2.3
Aug 6, 2022 04:28:33.023994923 CEST4975313371192.168.2.351.79.119.230
No statistics
Target ID:0
Start time:04:28:08
Start date:06/08/2022
Path:C:\Users\user\Desktop\loader.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\loader.exe"
Imagebase:0x140000000
File size:9042944 bytes
MD5 hash:E5FD705D3E71F8305FA11E8D1CD2984E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly