Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
empudh9lY5

Overview

General Information

Sample Name:empudh9lY5 (renamed file extension from none to exe)
Analysis ID:715067
MD5:8f43b86f351db105a727e67e39459d78
SHA1:ad9b43ecbae064ddca1908c40999974bc28466ba
SHA256:9830e0d007c07364bf97b2a3e0496b7a7f5811e7e71fcdd9dada104d29d1982c
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses 32bit PE files
Yara signature match
Found large amount of non-executed APIs
PE file contains strange resources
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found potential string decryption / allocating functions

Classification

  • System is w10x64
  • empudh9lY5.exe (PID: 2560 cmdline: C:\Users\user\Desktop\empudh9lY5.exe MD5: 8F43B86F351DB105A727E67E39459D78)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmpCoreImpact_sysdll_exeDetects a malware sysdll.exe from the Rocket Kitten APTFlorian Roth
  • 0x1e799:$x6: /info.dat
  • 0x1e6bf:$z2: Encountered error sending error message to client
  • 0x1e68b:$z3: Encountered error building error message to client
  • 0x1e4b3:$z4: Attempting to unlock uninitialized lock!
  • 0x1e273:$z5: connect_back_tcp_channel#do_connect:: Error resolving connect back hostname
  • 0x1e343:$z6: select_event_get(): fd not found
  • 0x1e6f3:$z7: Encountered error sending syscall response to client
  • 0x20d8b:$z8: GetProcAddress() error
  • 0x1e498:$z9: Error entering thread lock
  • 0x1e4dc:$z10: Error exiting thread lock
  • 0x1e2bf:$z11: connect_back_tcp_channel_init:: socket() failed
  • 0x1e73e:$z12: event_add() failed for ev.
  • 0x1e728:$z13: Uh, oh, exit() failed
  • 0x1e73e:$z14: event_add() failed for ev.
  • 0x1e759:$z15: event_add() failed.
  • 0x1e77e:$z16: needroot
  • 0x1e78e:$z17: ./plugins/
00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmpWoolenGoldfish_Generic_3Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZFlorian Roth
  • 0x1e273:$x3: connect_back_tcp_channel#do_connect:: Error resolving connect back hostname
  • 0x48fb:$s0: kernel32.dll GetProcAddressLoadLibraryAws2_32.dll
  • 0x1e4b3:$s2: Attempting to unlock uninitialized lock!
  • 0x20910:$s4: unable to load kernel32.dll
  • 0x1e6f3:$s7: Encountered error sending syscall response to client
  • 0x1e799:$s9: /info.dat
  • 0x1e498:$s10: Error entering thread lock
  • 0x1e4dc:$s11: Error exiting thread lock
  • 0x1e2bf:$s12: connect_back_tcp_channel_init:: socket() failed
Process Memory Space: empudh9lY5.exe PID: 2560CoreImpact_sysdll_exeDetects a malware sysdll.exe from the Rocket Kitten APTFlorian Roth
  • 0x8395:$x6: /info.dat
  • 0x87ba:$x6: /info.dat
  • 0x82ce:$z2: Encountered error sending error message to client
  • 0x829b:$z3: Encountered error building error message to client
  • 0x80e7:$z4: Attempting to unlock uninitialized lock!
  • 0x7eb9:$z5: connect_back_tcp_channel#do_connect:: Error resolving connect back hostname
  • 0x7f85:$z6: select_event_get(): fd not found
  • 0x8300:$z7: Encountered error sending syscall response to client
  • 0x8ed9:$z8: GetProcAddress() error
  • 0x80cc:$z9: Error entering thread lock
  • 0x8110:$z10: Error exiting thread lock
  • 0x7f05:$z11: connect_back_tcp_channel_init:: socket() failed
  • 0x834b:$z12: event_add() failed for ev.
  • 0x8335:$z13: Uh, oh, exit() failed
  • 0x834b:$z14: event_add() failed for ev.
  • 0x8366:$z15: event_add() failed.
  • 0x837a:$z16: needroot
  • 0x838a:$z17: ./plugins/
Process Memory Space: empudh9lY5.exe PID: 2560WoolenGoldfish_Generic_3Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZFlorian Roth
  • 0x7eb9:$x3: connect_back_tcp_channel#do_connect:: Error resolving connect back hostname
  • 0x7c4c:$s0: kernel32.dll GetProcAddressLoadLibraryAws2_32.dll
  • 0x80e7:$s2: Attempting to unlock uninitialized lock!
  • 0x8a82:$s4: unable to load kernel32.dll
  • 0x8300:$s7: Encountered error sending syscall response to client
  • 0x8395:$s9: /info.dat
  • 0x87ba:$s9: /info.dat
  • 0x80cc:$s10: Error entering thread lock
  • 0x8110:$s11: Error exiting thread lock
  • 0x7f05:$s12: connect_back_tcp_channel_init:: socket() failed
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: empudh9lY5.exeReversingLabs: Detection: 21%
Source: empudh9lY5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: global trafficTCP traffic: 192.168.2.3:49702 -> 189.30.155.39:8080
Source: unknownDNS traffic detected: queries for: sherlock.servegame.com

System Summary

barindex
Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects a malware sysdll.exe from the Rocket Kitten APT Author: Florian Roth
Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ Author: Florian Roth
Source: Process Memory Space: empudh9lY5.exe PID: 2560, type: MEMORYSTRMatched rule: Detects a malware sysdll.exe from the Rocket Kitten APT Author: Florian Roth
Source: Process Memory Space: empudh9lY5.exe PID: 2560, type: MEMORYSTRMatched rule: Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ Author: Florian Roth
Source: empudh9lY5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CoreImpact_sysdll_exe author = Florian Roth, description = Detects a malware sysdll.exe from the Rocket Kitten APT, score = 27.12.2014, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = f89a4d4ae5cca6d69a5256c96111e707
Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WoolenGoldfish_Generic_3 date = 2015/03/25, hash2 = e8dbcde49c7f760165ebb0cb3452e4f1c24981f5, author = Florian Roth, description = Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ, score = 86222ef166474e53f1eb6d7e6701713834e6fee7, reference = http://goo.gl/NpJpVZ, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: empudh9lY5.exe PID: 2560, type: MEMORYSTRMatched rule: CoreImpact_sysdll_exe author = Florian Roth, description = Detects a malware sysdll.exe from the Rocket Kitten APT, score = 27.12.2014, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = f89a4d4ae5cca6d69a5256c96111e707
Source: Process Memory Space: empudh9lY5.exe PID: 2560, type: MEMORYSTRMatched rule: WoolenGoldfish_Generic_3 date = 2015/03/25, hash2 = e8dbcde49c7f760165ebb0cb3452e4f1c24981f5, author = Florian Roth, description = Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ, score = 86222ef166474e53f1eb6d7e6701713834e6fee7, reference = http://goo.gl/NpJpVZ, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: empudh9lY5.exeStatic PE information: Resource name: RT_GROUP_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057492D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574047
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574847
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573871
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574071
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00570861
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057403B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057402D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005740C6
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005740FD
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005878ED
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057408E
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057288C
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057488B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005738BF
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005740A9
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573962
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574169
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574115
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057390B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005741F0
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005739E0
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005741A6
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574240
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573A67
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573A1E
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574A0D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574A36
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573AD7
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005742CA
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005742E9
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573A95
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005742BD
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573AA1
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B56
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B44
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574344
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B76
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B7D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574361
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B03
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573B25
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574320
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005743F1
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573BFB
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574399
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573BBC
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005743B8
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005743A2
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574440
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574400
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573CD4
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573CDF
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573CFA
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574486
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057355C
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574574
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057357D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573563
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573D62
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00587511
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573D04
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573536
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573D30
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573D25
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057452D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005735D4
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005745F6
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573DF5
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573595
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057158D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573DA0
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057465B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574666
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573609
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573E08
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00586E3F
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573628
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005736DC
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573ED9
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005736CF
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005746FF
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005746E3
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005736EE
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573E93
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573EA3
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573EAD
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057374B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00587F6A
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057476B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573719
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574709
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057373F
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574726
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573F2D
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057372B
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573FFC
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005737E1
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00574797
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00573782
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057378F
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: String function: 0057497C appears 190 times
Source: empudh9lY5.exeReversingLabs: Detection: 21%
Source: empudh9lY5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\empudh9lY5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: classification engineClassification label: mal56.winEXE@1/0@3/1
Source: C:\Users\user\Desktop\empudh9lY5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\empudh9lY5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: empudh9lY5.exeStatic file information: File size 1283072 > 1048576
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_005719B5 pushfd ; ret
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_00571219 push 090000B4h; iretd
Source: initial sampleStatic PE information: section name: .text entropy: 6.9280540298858515
Source: C:\Users\user\Desktop\empudh9lY5.exeAPI coverage: 7.8 %
Source: C:\Users\user\Desktop\empudh9lY5.exeCode function: 0_2_0057492D mov ebx, dword ptr fs:[00000030h]
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Software Packing
OS Credential Dumping1
System Information Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
empudh9lY5.exe22%ReversingLabsWin32.Trojan.Gholee
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
sherlock.servegame.com
189.30.155.39
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    189.30.155.39
    sherlock.servegame.comBrazil
    8167BrasilTelecomSA-FilialDistritoFederalBRfalse
    Joe Sandbox Version:36.0.0 Rainbow Opal
    Analysis ID:715067
    Start date and time:2022-10-03 15:49:52 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 26s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:empudh9lY5 (renamed file extension from none to exe)
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal56.winEXE@1/0@3/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, ctldl.windowsupdate.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: empudh9lY5.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Entropy (8bit):6.2099397885668255
    TrID:
    • Win32 Executable (generic) a (10002005/4) 98.87%
    • InstallShield setup (43055/19) 0.43%
    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
    • Windows Screen Saver (13104/52) 0.13%
    • DOS Executable Borland C++ (13009/5) 0.13%
    File name:empudh9lY5.exe
    File size:1283072
    MD5:8f43b86f351db105a727e67e39459d78
    SHA1:ad9b43ecbae064ddca1908c40999974bc28466ba
    SHA256:9830e0d007c07364bf97b2a3e0496b7a7f5811e7e71fcdd9dada104d29d1982c
    SHA512:e8d59fceaa01d7ef3b5ced15f15d75a0bdd0bd3cc828a741798798e4527f4d58051a2b3c5a028f347c42a49f760d918bd9f1d46f7ab8adccf5837db024982011
    SSDEEP:24576:pmUgVoR4T0gR1U2vfVD8sA15qkJ1K3mbDQca9L32GY:pGoqT0ujvTO6L3
    TLSH:27555AA27694C132C0620674DD6BCAF964357E24DF30A5877BE03F4F3EB5B807926296
    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
    Icon Hash:6117164569166de9
    Entrypoint:0x40138c
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
    DLL Characteristics:
    Time Stamp:0x4B3D3B00 [Fri Jan 1 00:00:00 2010 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:cafc89e1b0a9b2c5b10389d6d19936ce
    Instruction
    jmp 00007F2114C4EAC2h
    bound di, dword ptr [edx]
    inc ebx
    sub ebp, dword ptr [ebx]
    dec eax
    dec edi
    dec edi
    dec ebx
    nop
    jmp 00007F2115114B4Dh
    mov eax, dword ptr [004C608Bh]
    shl eax, 02h
    mov dword ptr [004C608Fh], eax
    push edx
    push 00000000h
    call 00007F2114D12010h
    mov edx, eax
    call 00007F2114D0326Fh
    pop edx
    call 00007F2114D03191h
    call 00007F2114D032A4h
    push 00000000h
    call 00007F2114D044D9h
    pop ecx
    push 004C6034h
    push 00000000h
    call 00007F2114D11FEAh
    mov dword ptr [004C6093h], eax
    push 00000000h
    jmp 00007F2114D0D99Ch
    jmp 00007F2114D0450Bh
    xor eax, eax
    mov al, byte ptr [004C607Dh]
    ret
    mov eax, dword ptr [004C6093h]
    ret
    pushad
    mov ebx, BCB05000h
    push ebx
    push 00000BADh
    ret
    mov ecx, 000000E4h
    or ecx, ecx
    je 00007F2114C4EAFFh
    cmp dword ptr [004C608Bh], 00000000h
    jnc 00007F2114C4EABCh
    mov eax, 000000FEh
    call 00007F2114C4EA8Ch
    mov ecx, 000000E4h
    push ecx
    push 00000008h
    call 00007F2114D11FA7h
    push eax
    call 00007F2114D11FF5h
    or eax, eax
    jne 00007F2114C4EABCh
    mov eax, 000000FDh
    call 00007F2114C4EA6Bh
    push eax
    push eax
    push dword ptr [004C608Bh]
    call 00007F2114D0DB66h
    push dword ptr [004C608Bh]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0xfc0000x482.edata
    IMAGE_DIRECTORY_ENTRY_IMPORT0xf90000x24e5.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xfd0000x489e3.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0xf80000x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xc50000xc4200False0.5265893881453155data6.9280540298858515IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0xc60000x310000x29200False0.3381637063069909data5.3675051401997385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .tls0xf70000x10000x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0xf80000x10000x200False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    .idata0xf90000x30000x2600False0.3246299342105263data5.165811799711141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .edata0xfc0000x10000x600False0.3919270833333333data4.649758707069864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xfd0000x489e30x48a00False0.07789304539586919data3.41590450767586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1460000xc0000x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    RT_BITMAP0xfe5580x5cDevice independent bitmap graphic, 9 x 11 x 1, image size 44
    RT_BITMAP0xfe5b40x64Device independent bitmap graphic, 11 x 13 x 1, image size 52
    RT_BITMAP0xfe6180x6cDevice independent bitmap graphic, 13 x 15 x 1, image size 60
    RT_BITMAP0xfe6840x74Device independent bitmap graphic, 15 x 17 x 1, image size 68
    RT_BITMAP0xfe6f80x7cDevice independent bitmap graphic, 15 x 19 x 1, image size 76
    RT_BITMAP0xfe7740x84Device independent bitmap graphic, 17 x 21 x 1, image size 84
    RT_BITMAP0xfe7f80x8cDevice independent bitmap graphic, 19 x 23 x 1, image size 92
    RT_BITMAP0xfe8840x94Device independent bitmap graphic, 21 x 25 x 1, image size 100
    RT_BITMAP0xfe9180x9cDevice independent bitmap graphic, 21 x 27 x 1, image size 108
    RT_BITMAP0xfe9b40xb0Device independent bitmap graphic, 14 x 9 x 4, image size 72
    RT_BITMAP0xfea640xecDevice independent bitmap graphic, 18 x 11 x 4, image size 132
    RT_BITMAP0xfeb500x104Device independent bitmap graphic, 22 x 13 x 4, image size 156
    RT_BITMAP0xfec540x158Device independent bitmap graphic, 26 x 15 x 4, image size 240
    RT_BITMAP0xfedac0x178Device independent bitmap graphic, 26 x 17 x 4, image size 272
    RT_BITMAP0xfef240x198Device independent bitmap graphic, 30 x 19 x 4, image size 304
    RT_BITMAP0xff0bc0x20cDevice independent bitmap graphic, 34 x 21 x 4, image size 420
    RT_BITMAP0xff2c80x234Device independent bitmap graphic, 38 x 23 x 4, image size 460
    RT_BITMAP0xff4fc0x25cDevice independent bitmap graphic, 38 x 25 x 4, image size 500
    RT_BITMAP0xff7580x5cDevice independent bitmap graphic, 9 x 11 x 1, image size 44
    RT_BITMAP0xff7b40x64Device independent bitmap graphic, 11 x 13 x 1, image size 52
    RT_BITMAP0xff8180x6cDevice independent bitmap graphic, 13 x 15 x 1, image size 60
    RT_BITMAP0xff8840x74Device independent bitmap graphic, 15 x 17 x 1, image size 68
    RT_BITMAP0xff8f80x7cDevice independent bitmap graphic, 15 x 19 x 1, image size 76
    RT_BITMAP0xff9740x84Device independent bitmap graphic, 17 x 21 x 1, image size 84
    RT_BITMAP0xff9f80x8cDevice independent bitmap graphic, 19 x 23 x 1, image size 92
    RT_BITMAP0xffa840x94Device independent bitmap graphic, 21 x 25 x 1, image size 100
    RT_BITMAP0xffb180x9cDevice independent bitmap graphic, 21 x 27 x 1, image size 108
    RT_BITMAP0xffbb40xb0Device independent bitmap graphic, 14 x 9 x 4, image size 72
    RT_BITMAP0xffc640xecDevice independent bitmap graphic, 18 x 11 x 4, image size 132
    RT_BITMAP0xffd500x104Device independent bitmap graphic, 22 x 13 x 4, image size 156
    RT_BITMAP0xffe540x158Device independent bitmap graphic, 26 x 15 x 4, image size 240
    RT_BITMAP0xfffac0x178Device independent bitmap graphic, 26 x 17 x 4, image size 272
    RT_BITMAP0x1001240x198Device independent bitmap graphic, 30 x 19 x 4, image size 304
    RT_BITMAP0x1002bc0x20cDevice independent bitmap graphic, 34 x 21 x 4, image size 420
    RT_BITMAP0x1004c80x234Device independent bitmap graphic, 38 x 23 x 4, image size 460
    RT_BITMAP0x1006fc0x25cDevice independent bitmap graphic, 38 x 25 x 4, image size 500
    RT_ICON0x1009580x882PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_ICON0x1011dc0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States
    RT_ICON0x10a6840x7258Device independent bitmap graphic, 84 x 168 x 32, image size 0EnglishUnited States
    RT_ICON0x1118dc0x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 0EnglishUnited States
    RT_ICON0x1180c40x5488Device independent bitmap graphic, 72 x 144 x 32, image size 0EnglishUnited States
    RT_ICON0x11d54c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States
    RT_ICON0x1217740x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 0EnglishUnited States
    RT_ICON0x1251bc0x32e8Device independent bitmap graphic, 56 x 112 x 32, image size 0EnglishUnited States
    RT_ICON0x1284a40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States
    RT_ICON0x12aa4c0x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States
    RT_ICON0x12c4b40x1588Device independent bitmap graphic, 36 x 72 x 32, image size 0EnglishUnited States
    RT_ICON0x12da3c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States
    RT_ICON0x12eae40xcd8Device independent bitmap graphic, 28 x 56 x 32, image size 0EnglishUnited States
    RT_ICON0x12f7bc0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States
    RT_ICON0x1301440x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0EnglishUnited States
    RT_ICON0x1307fc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States
    RT_DIALOG0x130c640x76data
    RT_STRING0x130cdc0x35cdata
    RT_STRING0x1310380xdcdata
    RT_STRING0x1311140x10cdata
    RT_STRING0x1312200x33cdata
    RT_STRING0x13155c0x3dcdata
    RT_STRING0x1319380xf0data
    RT_STRING0x131a280xd8data
    RT_STRING0x131b000x274data
    RT_STRING0x131d740x3d8data
    RT_STRING0x13214c0x374data
    RT_STRING0x1324c00x2dcdata
    RT_STRING0x13279c0x390data
    RT_STRING0x132b2c0x454data
    RT_RCDATA0x132f800x10data
    RT_RCDATA0x132f900x734Delphi compiled form 'TAddCEADataForm'
    RT_RCDATA0x1336c40x3caDelphi compiled form 'TAddDIDDataForm'
    RT_RCDATA0x133a900x15c7Delphi compiled form 'TAudioFormatForm'
    RT_RCDATA0x1350580x78fDelphi compiled form 'TAudioFormatListForm'
    RT_RCDATA0x1357e80xb12Delphi compiled form 'TColorimetryForm'
    RT_RCDATA0x1362fc0xffDelphi compiled form 'TCommonForm'
    RT_RCDATA0x1363fc0x1aa2Delphi compiled form 'TDetailedResolutionForm'
    RT_RCDATA0x137ea00x7e4Delphi compiled form 'TDIDDetailedResolutionListForm'
    RT_RCDATA0x1386840x2216Delphi compiled form 'TDisplayForm'
    RT_RCDATA0x13a89c0x1c20Delphi compiled form 'TExtensionBlockForm'
    RT_RCDATA0x13c4bc0x45fDelphi compiled form 'TFreeSyncRangeForm'
    RT_RCDATA0x13c91c0x16d1Delphi compiled form 'THDMI2SupportForm'
    RT_RCDATA0x13dff00x4f3Delphi compiled form 'THDMIResolutionForm'
    RT_RCDATA0x13e4e40x18ddDelphi compiled form 'THDMISupportForm'
    RT_RCDATA0x13fdc40x830Delphi compiled form 'THDRStaticMetadataForm'
    RT_RCDATA0x1405f40xf41Delphi compiled form 'TPropertiesForm'
    RT_RCDATA0x1415380xee8Delphi compiled form 'TSpeakerSetupForm'
    RT_RCDATA0x1424200x581Delphi compiled form 'TStandardResolutionForm'
    RT_RCDATA0x1429a40x13afDelphi compiled form 'TTiledDisplayTopologyForm'
    RT_RCDATA0x143d540x556Delphi compiled form 'TTVResolutionForm'
    RT_RCDATA0x1442ac0x7d2Delphi compiled form 'TTVResolutionListForm'
    RT_RCDATA0x144a800xabaDelphi compiled form 'TVideoCapabilityForm'
    RT_GROUP_ICON0x14553c0xe6GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_MANIFEST0x1456240x3bfASCII text, with CRLF line terminators
    DLLImport
    SETUPAPI.DLLSetupDiDestroyDeviceInfoList, SetupDiEnumDeviceInfo, SetupDiGetClassDevsA
    ADVAPI32.DLLRegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyExA, RegFlushKey, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
    KERNEL32.DLLCloseHandle, CompareStringA, CreateEventA, CreateFileA, CreateThread, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, EnumCalendarInfoA, ExitProcess, FindClose, FindFirstFileA, FindResourceA, FormatMessageA, FreeLibrary, FreeResource, GetACP, GetCPInfo, GetCommandLineA, GetCurrentProcessId, GetCurrentThreadId, GetDateFormatA, GetDiskFreeSpaceA, GetEnvironmentStrings, GetFileAttributesA, GetFileType, GetFullPathNameA, GetLastError, GetLocalTime, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, GetStringTypeA, GetStringTypeW, GetSystemDefaultLangID, GetThreadLocale, GetTickCount, GetUserDefaultLCID, GetVersion, GetVersionExA, GlobalAddAtomA, GlobalDeleteAtom, GlobalFindAtomA, HeapAlloc, HeapFree, InitializeCriticalSection, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, IsValidLocale, LCMapStringA, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadResource, LockResource, MulDiv, MultiByteToWideChar, RaiseException, ReadFile, ResetEvent, RtlUnwind, SetConsoleCtrlHandler, SetEndOfFile, SetErrorMode, SetEvent, SetFilePointer, SetHandleCount, SetLastError, SetThreadLocale, SizeofResource, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualQuery, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcpyA, lstrcpynA, lstrlenA
    VERSION.DLLGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
    COMCTL32.DLLImageList_Add, ImageList_BeginDrag, ImageList_Destroy, ImageList_DragEnter, ImageList_DragLeave, ImageList_DragMove, ImageList_DragShowNolock, ImageList_Draw, ImageList_DrawEx, ImageList_EndDrag, ImageList_GetBkColor, ImageList_GetDragImage, ImageList_GetIconSize, ImageList_GetImageCount, ImageList_Read, ImageList_Remove, ImageList_Replace, ImageList_SetBkColor, ImageList_SetIconSize, ImageList_Write, _TrackMouseEvent, ImageList_Create
    COMDLG32.DLLGetOpenFileNameA, GetSaveFileNameA
    GDI32.DLLBitBlt, CreateBitmap, CreateBrushIndirect, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, CreateDIBitmap, CreateFontIndirectA, CreateHalftonePalette, CreatePalette, CreatePenIndirect, CreateSolidBrush, DeleteDC, DeleteObject, Ellipse, ExcludeClipRect, ExtTextOutA, GetBitmapBits, GetBrushOrgEx, GetClipBox, GetCurrentPositionEx, GetDCOrgEx, GetDIBColorTable, GetDIBits, GetDeviceCaps, GetObjectA, GetPaletteEntries, GetPixel, GetRgnBox, GetStockObject, GetSystemPaletteEntries, GetTextExtentPoint32A, GetTextMetricsA, GetWindowOrgEx, IntersectClipRect, LineTo, MaskBlt, MoveToEx, PatBlt, RealizePalette, RectVisible, Rectangle, RestoreDC, RoundRect, SaveDC, SelectClipRgn, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetBrushOrgEx, SetDIBColorTable, SetPixel, SetROP2, SetStretchBltMode, SetTextColor, SetViewportOrgEx, SetWindowOrgEx, StretchBlt, UnrealizeObject
    USER32.DLLActivateKeyboardLayout, AdjustWindowRectEx, BeginPaint, CallNextHookEx, CallWindowProcA, CharLowerA, CharNextA, CharToOemA, CheckDlgButton, CheckMenuItem, ClientToScreen, CreateIcon, CreateMenu, CreatePopupMenu, CreateWindowExA, DefFrameProcA, DefMDIChildProcA, DefWindowProcA, DeleteMenu, DestroyCursor, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageA, DispatchMessageW, DrawEdge, DrawFocusRect, DrawFrameControl, DrawIcon, DrawIconEx, DrawMenuBar, DrawTextA, EnableMenuItem, EnableScrollBar, EnableWindow, EndPaint, EnumChildWindows, EnumThreadWindows, EnumWindows, EqualRect, FillRect, FindWindowA, FrameRect, GetActiveWindow, GetCapture, GetClassInfoA, GetClassLongA, GetClientRect, GetCursor, GetCursorPos, GetDC, GetDCEx, GetDesktopWindow, GetFocus, GetForegroundWindow, GetIconInfo, GetKeyNameTextA, GetKeyState, GetKeyboardLayout, GetKeyboardLayoutList, GetKeyboardLayoutNameA, GetKeyboardState, GetKeyboardType, GetLastActivePopup, GetMenu, GetMenuItemCount, GetMenuItemID, GetMenuItemInfoA, GetMenuState, GetMenuStringA, GetMessagePos, GetParent, GetPropA, GetScrollInfo, GetScrollPos, GetScrollRange, GetSubMenu, GetSysColor, GetSysColorBrush, GetSystemMenu, GetTopWindow, GetWindow, GetWindowDC, GetWindowLongA, GetWindowLongW, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, InflateRect, InsertMenuA, InsertMenuItemA, IntersectRect, InvalidateRect, IsChild, IsDialogMessageA, IsDialogMessageW, IsDlgButtonChecked, IsIconic, IsRectEmpty, IsWindow, IsWindowEnabled, IsWindowUnicode, IsWindowVisible, IsZoomed, KillTimer, LoadBitmapA, LoadCursorA, LoadIconA, LoadKeyboardLayoutA, LoadStringA, MapVirtualKeyA, MapWindowPoints, MessageBoxA, OemToCharA, OffsetRect, PeekMessageA, PeekMessageW, PostMessageA, PostQuitMessage, PtInRect, RedrawWindow, RegisterClassA, RegisterClipboardFormatA, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, RemoveMenu, RemovePropA, ScreenToClient, ScrollWindow, SendMessageA, SendMessageW, SetActiveWindow, SetCapture, SetClassLongA, SetCursor, SetFocus, SetForegroundWindow, SetMenu, SetMenuItemInfoA, SetParent, SetPropA, SetRect, SetScrollInfo, SetScrollPos, SetScrollRange, SetTimer, SetWindowLongA, SetWindowLongW, SetWindowPlacement, SetWindowPos, SetWindowTextA, SetWindowsHookExA, ShowOwnedPopups, ShowScrollBar, ShowWindow, SystemParametersInfoA, TrackPopupMenu, TranslateMDISysAccel, TranslateMessage, UnhookWindowsHookEx, UnregisterClassA, UpdateWindow, WaitMessage, WindowFromPoint, wsprintfA, GetSystemMetrics
    OLEAUT32.DLLSafeArrayCreate, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayPtrOfIndex, SysAllocStringLen, SysFreeString, SysReAllocStringLen, VariantChangeType, VariantClear, VariantCopy, VariantInit
    NameOrdinalAddress
    @$xp$28Vistaaltfixunit@TVistaAltFix30x466b0c
    @Vistaaltfixunit@Finalization$qqrv80x466cb0
    @Vistaaltfixunit@Register$qqrv40x466b38
    @Vistaaltfixunit@TVistaAltFix@20x466ac8
    @Vistaaltfixunit@TVistaAltFix@$bctr$qqrp18Classes@TComponent50x466ba4
    @Vistaaltfixunit@TVistaAltFix@$bdtr$qqrv60x466c1c
    @Vistaaltfixunit@TVistaAltFix@VistaWithTheme$qqrv70x466c6c
    @Vistaaltfixunit@initialization$qqrv90x466ce0
    _AddCEADataForm110x4ef1a0
    _AddDIDDataForm120x4ef1a4
    _AudioFormatForm130x4ef1a8
    _AudioFormatListForm140x4ef1ac
    _ColorimetryForm150x4ef1b0
    _CommonForm160x4ef1b4
    _DIDDetailedResolutionListForm180x4ef20c
    _DetailedResolutionForm170x4ef208
    _DisplayForm190x4ef214
    _ExtensionBlockForm200x4ef254
    _FreeSyncRangeForm210x4f2714
    _HDMI2SupportForm240x4f2720
    _HDMIResolutionForm220x4f2718
    _HDMISupportForm230x4f271c
    _HDRStaticMetadataForm250x4f2724
    _PropertiesForm260x4f2728
    _SpeakerSetupForm270x4f272c
    _StandardResolutionForm280x4f2730
    _TVResolutionForm300x4f2738
    _TVResolutionListForm310x4f273c
    _TiledDisplayTopologyForm290x4f2734
    _VideoCapabilityForm320x4f2740
    __GetExceptDLLinfo10x4013e5
    ___CPPdebugHook100x4c6098
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Oct 3, 2022 15:51:33.522084951 CEST497028080192.168.2.3189.30.155.39
    Oct 3, 2022 15:51:33.783726931 CEST808049702189.30.155.39192.168.2.3
    Oct 3, 2022 15:51:34.319655895 CEST497028080192.168.2.3189.30.155.39
    Oct 3, 2022 15:51:34.578561068 CEST808049702189.30.155.39192.168.2.3
    Oct 3, 2022 15:51:35.210315943 CEST497028080192.168.2.3189.30.155.39
    Oct 3, 2022 15:51:35.469022989 CEST808049702189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:05.559123993 CEST497038080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:05.794964075 CEST808049703189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:06.306580067 CEST497038080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:06.542495012 CEST808049703189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:07.056663990 CEST497038080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:07.292512894 CEST808049703189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:37.412137985 CEST497048080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:37.656075001 CEST808049704189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:38.168632984 CEST497048080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:38.412554026 CEST808049704189.30.155.39192.168.2.3
    Oct 3, 2022 15:52:38.918927908 CEST497048080192.168.2.3189.30.155.39
    Oct 3, 2022 15:52:39.163156033 CEST808049704189.30.155.39192.168.2.3
    TimestampSource PortDest PortSource IPDest IP
    Oct 3, 2022 15:51:33.484947920 CEST5784053192.168.2.38.8.8.8
    Oct 3, 2022 15:51:33.507029057 CEST53578408.8.8.8192.168.2.3
    Oct 3, 2022 15:52:05.536159992 CEST5799053192.168.2.38.8.8.8
    Oct 3, 2022 15:52:05.556083918 CEST53579908.8.8.8192.168.2.3
    Oct 3, 2022 15:52:37.390862942 CEST5238753192.168.2.38.8.8.8
    Oct 3, 2022 15:52:37.410737038 CEST53523878.8.8.8192.168.2.3
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 3, 2022 15:51:33.484947920 CEST192.168.2.38.8.8.80x7839Standard query (0)sherlock.servegame.comA (IP address)IN (0x0001)false
    Oct 3, 2022 15:52:05.536159992 CEST192.168.2.38.8.8.80x74c3Standard query (0)sherlock.servegame.comA (IP address)IN (0x0001)false
    Oct 3, 2022 15:52:37.390862942 CEST192.168.2.38.8.8.80x5f5eStandard query (0)sherlock.servegame.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 3, 2022 15:51:33.507029057 CEST8.8.8.8192.168.2.30x7839No error (0)sherlock.servegame.com189.30.155.39A (IP address)IN (0x0001)false
    Oct 3, 2022 15:52:05.556083918 CEST8.8.8.8192.168.2.30x74c3No error (0)sherlock.servegame.com189.30.155.39A (IP address)IN (0x0001)false
    Oct 3, 2022 15:52:37.410737038 CEST8.8.8.8192.168.2.30x5f5eNo error (0)sherlock.servegame.com189.30.155.39A (IP address)IN (0x0001)false
    No statistics
    Target ID:0
    Start time:15:50:47
    Start date:03/10/2022
    Path:C:\Users\user\Desktop\empudh9lY5.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\empudh9lY5.exe
    Imagebase:0x400000
    File size:1283072 bytes
    MD5 hash:8F43B86F351DB105A727E67E39459D78
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: CoreImpact_sysdll_exe, Description: Detects a malware sysdll.exe from the Rocket Kitten APT, Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
    • Rule: WoolenGoldfish_Generic_3, Description: Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ, Source: 00000000.00000002.516789881.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
    Reputation:low

    No disassembly