Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XPLHpP8RVc.exe

Overview

General Information

Sample Name:XPLHpP8RVc.exe
Analysis ID:736950
MD5:d63bcf05b6e5f943213930ec13433edd
SHA1:9b9e999a1619630297d3633555b3ca186d9b124d
SHA256:de6e79d80d5cc90b9958e261e2e2c9c2eadda70c27daa171f406fc75fa967f8a
Tags:exe
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: C000007B

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
PE file has a writeable .text section
Uses 32bit PE files
PE file does not import any functions
PE file contains an invalid checksum
PE file overlay found
Entry point lies outside standard sections
PE file contains sections with non-standard names

Classification

No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: XPLHpP8RVc.exeReversingLabs: Detection: 38%
Source: XPLHpP8RVc.exeVirustotal: Detection: 27%Perma Link
Source: XPLHpP8RVc.exeJoe Sandbox ML: detected
Source: XPLHpP8RVc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE

System Summary

barindex
Source: XPLHpP8RVc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: XPLHpP8RVc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: XPLHpP8RVc.exeStatic PE information: No import functions for PE file found
Source: XPLHpP8RVc.exeStatic PE information: Data appended to the last section found
Source: XPLHpP8RVc.exeReversingLabs: Detection: 38%
Source: XPLHpP8RVc.exeVirustotal: Detection: 27%
Source: classification engineClassification label: mal56.winEXE@0/0@0/0
Source: XPLHpP8RVc.exeStatic file information: File size 2398737 > 1048576
Source: XPLHpP8RVc.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: XPLHpP8RVc.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e8000
Source: XPLHpP8RVc.exeStatic PE information: Raw size of .sedata is bigger than: 0x100000 < 0x13a000
Source: XPLHpP8RVc.exeStatic PE information: real checksum: 0x32c7f3 should be: 0x249d50
Source: initial sampleStatic PE information: section where entry point is pointing to: .sedata
Source: XPLHpP8RVc.exeStatic PE information: section name: .sedata
Source: XPLHpP8RVc.exeStatic PE information: section name: .sedata
Source: initial sampleStatic PE information: section name: .sedata entropy: 7.756485763720028
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Software Packing
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
XPLHpP8RVc.exe38%ReversingLabsWin32.Trojan.Mikey
XPLHpP8RVc.exe28%VirustotalBrowse
XPLHpP8RVc.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:736950
Start date and time:2022-11-03 12:22:00 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 3s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:XPLHpP8RVc.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:0
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.winEXE@0/0@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: C000007B
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.65926133234532
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:XPLHpP8RVc.exe
File size:2398737
MD5:d63bcf05b6e5f943213930ec13433edd
SHA1:9b9e999a1619630297d3633555b3ca186d9b124d
SHA256:de6e79d80d5cc90b9958e261e2e2c9c2eadda70c27daa171f406fc75fa967f8a
SHA512:a7d9f37a338386dfcf760fb5cdcc792bef8d75c7500b0f677e2b411258e9ed8a617de93a3de0e4a1266f05c2c807b11750eb950eefeb91f17effdb43441ea6c7
SSDEEP:49152:HWi9hA41soZEaAyefPTsusL53MPwKRjnig0wziDjXvBuyTtamjU8v1+8Ng+:79hl1soZEaAy8T058PwKRjnigfArEyTX
TLSH:CDB5171967F34836C9722BF0C42552E4DE55D7283BBC010E1AF23AA83A337D9553EE5A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........)...GJ..GJ..GJ...J..GJ...J..GJ..FJ5.GJ...J..GJ...Ja.GJ...JD.GJ...J..GJRich..GJ........................PE..L...p.[c...........
Icon Hash:00828e8e8686b000
Entrypoint:0x71ff23
Entrypoint Section:.sedata
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x635B9370 [Fri Oct 28 08:31:44 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:
Programming Language:
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2010 build 30319
  • [ C ] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3230e90x1a4.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x3240000x400.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1e80000x1e8000False0.45711779985271517data6.3271988418278635IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.sedata0x1e90000x13a0000x13a000False0.7854236395773005data7.756485763720028IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x3230000x10000x600False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x3240000x10000x400False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.sedata0x3250000x10000x1000False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
No network behavior found
No statistics
No system behavior
No disassembly