Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Recibo de pago Banreserva.exe

Overview

General Information

Sample Name:Recibo de pago Banreserva.exe
Analysis ID:799539
MD5:963dc44ec86b6f0e667716a4eafb63b1
SHA1:f487e173e2d8ef1c95d33fef82db94ddd2231e48
SHA256:14fe82910c2f207c0d0af16adb78beb03b871289d92bfeb52e7d4814b075e126
Infos:

Detection

AveMaria
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AveMaria stealer
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Writes to foreign memory regions
Found stalling execution ending in API Sleep call
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Uses 32bit PE files
Yara signature match
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Contains long sleeps (>= 3 min)

Classification

  • System is w10x64native
  • Recibo de pago Banreserva.exe (PID: 3160 cmdline: C:\Users\user\Desktop\Recibo de pago Banreserva.exe MD5: 963DC44EC86B6F0E667716A4EAFB63B1)
    • msinfo32.exe (PID: 4648 cmdline: C:\windows\syswow64\msinfo32.exe MD5: 5C49B7B55D4AF40DB1047E08484D6656)
    • Recibo de pago Banreserva.exe (PID: 4700 cmdline: "C:\Users\user\Desktop\Recibo de pago Banreserva.exe" ooooooooooooooo MD5: 963DC44EC86B6F0E667716A4EAFB63B1)
      • msinfo32.exe (PID: 4244 cmdline: C:\windows\syswow64\msinfo32.exe MD5: 5C49B7B55D4AF40DB1047E08484D6656)
  • ZMQ.exe (PID: 2320 cmdline: "C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe" MD5: 963DC44EC86B6F0E667716A4EAFB63B1)
  • ZMQ.exe (PID: 1984 cmdline: "C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe" MD5: 963DC44EC86B6F0E667716A4EAFB63B1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Recibo de pago Banreserva.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
        00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_BandookDetects Bandook backdoorditekshen
        • 0x9a978:$s1: "%sLib\dpx.pyc" "%ws" "%ws" "%ws" "%ws" "%ws"
        • 0x9b158:$s2: %s\usd\dv-%s.dat
        • 0x9ae08:$s3: %sprd.dat
        • 0x9b18c:$s4: %sfile\shell\open\command
        • 0x9aaf4:$s5: explorer.exe , %s
        • 0x9ab3c:$f1: CaptureScreen
        • 0x9aba8:$f2: StartShell
        • 0x9ab4c:$f3: ClearCred
        • 0x9ac08:$f4: GrabFileFromDevice
        • 0x9ac1c:$f5: PutFileOnDevice
        • 0x9ac4c:$f6: ChromeInject
        • 0x9aca0:$f7: StartFileMonitor
        • 0x9ad44:$f8: DisableMouseCapture
        • 0x9ac94:$f9: StealUSB
        • 0x9ad94:$f10: DDOSON
        • 0x9adac:$f11: InstallMac
        • 0x9ab64:$f12: SendCam
        • 0x9b8ac:$x1: RTC-TGUBP
        • 0x9b9a0:$x2: AVE_MARIA
        00000001.00000000.4755352355.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          Process Memory Space: msinfo32.exe PID: 4648JoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
            SourceRuleDescriptionAuthorStrings
            6.2.msinfo32.exe.13140000.0.raw.unpackJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
              6.2.msinfo32.exe.13140000.0.raw.unpackMALWARE_Win_BandookDetects Bandook backdoorditekshen
              • 0x9a978:$s1: "%sLib\dpx.pyc" "%ws" "%ws" "%ws" "%ws" "%ws"
              • 0x9b158:$s2: %s\usd\dv-%s.dat
              • 0x9ae08:$s3: %sprd.dat
              • 0x9b18c:$s4: %sfile\shell\open\command
              • 0x9aaf4:$s5: explorer.exe , %s
              • 0x9ab3c:$f1: CaptureScreen
              • 0x9aba8:$f2: StartShell
              • 0x9ab4c:$f3: ClearCred
              • 0x9ac08:$f4: GrabFileFromDevice
              • 0x9ac1c:$f5: PutFileOnDevice
              • 0x9ac4c:$f6: ChromeInject
              • 0x9aca0:$f7: StartFileMonitor
              • 0x9ad44:$f8: DisableMouseCapture
              • 0x9ac94:$f9: StealUSB
              • 0x9ad94:$f10: DDOSON
              • 0x9adac:$f11: InstallMac
              • 0x9ab64:$f12: SendCam
              • 0x9b8ac:$x1: RTC-TGUBP
              • 0x9b9a0:$x2: AVE_MARIA
              1.0.Recibo de pago Banreserva.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                No Sigma rule has matched
                Timestamp:83.97.20.141192.168.11.207075498312848605 02/06/23-16:46:57.776260
                SID:2848605
                Source Port:7075
                Destination Port:49831
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.11.2083.97.20.1414983170752810128 02/06/23-16:46:57.776688
                SID:2810128
                Source Port:49831
                Destination Port:7075
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Recibo de pago Banreserva.exeVirustotal: Detection: 21%Perma Link
                Source: Recibo de pago Banreserva.exeReversingLabs: Detection: 33%
                Source: Yara matchFile source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 4648, type: MEMORYSTR
                Source: bomes.ruVirustotal: Detection: 12%Perma Link
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeReversingLabs: Detection: 33%
                Source: Recibo de pago Banreserva.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI

                Networking

                barindex
                Source: TrafficSnort IDS: 2810128 ETPRO TROJAN Bandook TCP CnC Beacon 192.168.11.20:49831 -> 83.97.20.141:7075
                Source: TrafficSnort IDS: 2848605 ETPRO TROJAN Bandook TCP CnC Beacon Keep-Alive (Inbound) 83.97.20.141:7075 -> 192.168.11.20:49831
                Source: global trafficTCP traffic: 192.168.11.20:49831 -> 83.97.20.141:7075
                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: Recibo de pago Banreserva.exe, ZMQ.exe.9.drString found in binary or memory: http://prototype.conio.net/
                Source: msinfo32.exe, msinfo32.exe, 00000006.00000002.9810355535.00000000131FC000.00000040.00000400.00020000.00000000.sdmp, msinfo32.exe, 00000006.00000002.9810355535.0000000013C25000.00000040.00000400.00020000.00000000.sdmp, msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://unclesow.com/flras/
                Source: msinfo32.exe, 00000006.00000002.9810355535.0000000013C25000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://unclesow.com/flras/0WlhFQsDBjql9http://unclesow.com/flras/6/2/2023bomes.ruOPR0ZMQC:
                Source: msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://unclesow.com/flras/7075xpucoMG9PLhfbDOBhvcizZOfNCWo6AJR58dtAJWJodmzAFZWlhFQsDBjql9izTWLwt9W5V
                Source: msinfo32.exe, 00000006.00000002.9810355535.00000000131FC000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://unclesow.com/flras/Cdds0
                Source: Recibo de pago Banreserva.exe, ZMQ.exe.9.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Recibo de pago Banreserva.exe, ZMQ.exe.9.drString found in binary or memory: http://www.atozed.com
                Source: Recibo de pago Banreserva.exe, ZMQ.exe.9.drString found in binary or memory: http://www.wapforum.org/DTD/wml_1.1.xml
                Source: Recibo de pago Banreserva.exe, ZMQ.exe.9.drString found in binary or memory: http://www.wapforum.org/DTD/xhtml-mobile10.dtd
                Source: msinfo32.exe, msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/0.0.0.0%s~
                Source: unknownDNS traffic detected: queries for: bomes.ru

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 4648, type: MEMORYSTR

                System Summary

                barindex
                Source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Bandook backdoor Author: ditekshen
                Source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Bandook backdoor Author: ditekshen
                Source: Recibo de pago Banreserva.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Bandook author = ditekshen, description = Detects Bandook backdoor, clamav_sig = MALWARE.Win.Trojan.Bandook
                Source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Bandook author = ditekshen, description = Detects Bandook backdoor, clamav_sig = MALWARE.Win.Trojan.Bandook
                Source: Recibo de pago Banreserva.exe, 00000001.00000000.4757652001.0000000000807000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameViralNinjas8 vs Recibo de pago Banreserva.exe
                Source: Recibo de pago Banreserva.exe, 00000001.00000000.4755352355.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs Recibo de pago Banreserva.exe
                Source: Recibo de pago Banreserva.exeBinary or memory string: OriginalFilename vs Recibo de pago Banreserva.exe
                Source: Recibo de pago Banreserva.exeBinary or memory string: OriginalFilenameViralNinjas8 vs Recibo de pago Banreserva.exe
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeSection loaded: edgegdi.dllJump to behavior
                Source: Recibo de pago Banreserva.exeVirustotal: Detection: 21%
                Source: Recibo de pago Banreserva.exeReversingLabs: Detection: 33%
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Recibo de pago Banreserva.exe C:\Users\user\Desktop\Recibo de pago Banreserva.exe
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exe
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Users\user\Desktop\Recibo de pago Banreserva.exe "C:\Users\user\Desktop\Recibo de pago Banreserva.exe" ooooooooooooooo
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe "C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe "C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe"
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exeJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Users\user\Desktop\Recibo de pago Banreserva.exe "C:\Users\user\Desktop\Recibo de pago Banreserva.exe" oooooooooooooooJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exeJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeMutant created: \Sessions\1\BaseNamedObjects\8dtAJWJodmzAFZ
                Source: C:\Windows\SysWOW64\msinfo32.exeMutant created: \Sessions\1\BaseNamedObjects\xpucoMG
                Source: C:\Windows\SysWOW64\msinfo32.exeFile created: C:\Users\user\AppData\Roaming\ZMQJump to behavior
                Source: Recibo de pago Banreserva.exeString found in binary or memory: NATS-SEFI-ADD
                Source: Recibo de pago Banreserva.exeString found in binary or memory: NATS-DANO-ADD
                Source: Recibo de pago Banreserva.exeString found in binary or memory: JIS_C6229-1984-b-add
                Source: Recibo de pago Banreserva.exeString found in binary or memory: jp-ocr-b-add
                Source: Recibo de pago Banreserva.exeString found in binary or memory: JIS_C6229-1984-hand-add
                Source: Recibo de pago Banreserva.exeString found in binary or memory: jp-ocr-hand-add
                Source: Recibo de pago Banreserva.exeString found in binary or memory: ISO_6937-2-add
                Source: Recibo de pago Banreserva.exeString found in binary or memory: <P>The IP/Address you used was %s.%s
                Source: Recibo de pago Banreserva.exeString found in binary or memory: Execute via &Default browser/Launch default browser and execute application.
                Source: classification engineClassification label: mal100.troj.evad.winEXE@9/1@1/1
                Source: Yara matchFile source: Recibo de pago Banreserva.exe, type: SAMPLE
                Source: Yara matchFile source: 1.0.Recibo de pago Banreserva.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.4755352355.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe, type: DROPPED
                Source: Recibo de pago Banreserva.exeStatic file information: File size 4568064 > 1048576
                Source: Recibo de pago Banreserva.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Recibo de pago Banreserva.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x17d400
                Source: Recibo de pago Banreserva.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2b7400
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeCode function: 1_2_0019CFCE push eax; iretd 1_2_0019CFE1
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeCode function: 7_2_0019CFCE push eax; iretd 7_2_0019CFE1
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeCode function: 10_2_0019CFCE push eax; iretd 10_2_0019CFE1
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeCode function: 11_2_0019CFCE push eax; iretd 11_2_0019CFE1
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeCode function: 11_2_0019DF28 pushfd ; ret 11_2_0019DF29
                Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 6_2_13FF67C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,6_2_13FF67C0
                Source: C:\Windows\SysWOW64\msinfo32.exeFile created: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeJump to dropped file
                Source: C:\Windows\SysWOW64\msinfo32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZMQJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZMQJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\msinfo32.exeStalling execution: Execution stalls by calling Sleepgraph_6-84
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exe TID: 2576Thread sleep time: -230000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exe TID: 364Thread sleep time: -7700000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exe TID: 376Thread sleep time: -220000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exe TID: 7772Thread sleep count: 74 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exe TID: 7772Thread sleep time: -148000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exe TID: 6344Thread sleep time: -7700000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exe TID: 6464Thread sleep time: -40000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exe TID: 6464Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe TID: 5972Thread sleep time: -50000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe TID: 2508Thread sleep time: -42000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\msinfo32.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeThread delayed: delay time: 7700000Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeThread delayed: delay time: 7700000Jump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeThread delayed: delay time: 180000Jump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeAPI call chain: ExitProcess graph end nodegraph_6-94
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeThread delayed: delay time: 7700000Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeThread delayed: delay time: 7700000Jump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeThread delayed: delay time: 40000Jump to behavior
                Source: C:\Windows\SysWOW64\msinfo32.exeThread delayed: delay time: 180000Jump to behavior
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
                Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 6_2_13FF67C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,6_2_13FF67C0
                Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 6_2_13198A15 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_13198A15

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 13140000Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 2EC5008Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 13140000Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 3136008Jump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory allocated: C:\Windows\SysWOW64\msinfo32.exe base: 13140000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory allocated: C:\Windows\SysWOW64\msinfo32.exe base: 13140000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 13140000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeMemory written: C:\Windows\SysWOW64\msinfo32.exe base: 13140000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exeJump to behavior
                Source: C:\Users\user\Desktop\Recibo de pago Banreserva.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe C:\windows\syswow64\msinfo32.exeJump to behavior
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerh
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager"
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerN
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: !PODDUW~!Program Manager~!0~!tB*
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerX
                Source: msinfo32.exe, 00000006.00000002.9809543824.0000000003228000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000006.00000002.9809123695.000000000307C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: !PODDUW~!Program Manager~!0~!

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 4648, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.msinfo32.exe.13140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 4648, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Command and Scripting Interpreter
                1
                Registry Run Keys / Startup Folder
                312
                Process Injection
                1
                Masquerading
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
                Non-Standard Port
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                1
                DLL Side-Loading
                1
                Registry Run Keys / Startup Folder
                21
                Virtualization/Sandbox Evasion
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)1
                DLL Side-Loading
                312
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Recibo de pago Banreserva.exe21%VirustotalBrowse
                Recibo de pago Banreserva.exe33%ReversingLabsWin32.Trojan.InjectorX
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe33%ReversingLabsWin32.Trojan.InjectorX
                No Antivirus matches
                SourceDetectionScannerLabelLink
                bomes.ru12%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://unclesow.com/flras/Cdds00%Avira URL Cloudsafe
                http://www.wapforum.org/DTD/xhtml-mobile10.dtd0%Avira URL Cloudsafe
                http://unclesow.com/flras/0%Avira URL Cloudsafe
                http://www.wapforum.org/DTD/wml_1.1.xml0%Avira URL Cloudsafe
                http://unclesow.com/flras/0WlhFQsDBjql9http://unclesow.com/flras/6/2/2023bomes.ruOPR0ZMQC:0%Avira URL Cloudsafe
                http://www.wapforum.org/DTD/xhtml-mobile10.dtd0%VirustotalBrowse
                http://www.wapforum.org/DTD/wml_1.1.xml1%VirustotalBrowse
                http://prototype.conio.net/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bomes.ru
                83.97.20.141
                truetrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://api.ipify.org/msinfo32.exe, msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpfalse
                  high
                  http://unclesow.com/flras/Cdds0msinfo32.exe, 00000006.00000002.9810355535.00000000131FC000.00000040.00000400.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0Recibo de pago Banreserva.exe, ZMQ.exe.9.drfalse
                    high
                    http://www.atozed.comRecibo de pago Banreserva.exe, ZMQ.exe.9.drfalse
                      high
                      http://unclesow.com/flras/msinfo32.exe, msinfo32.exe, 00000006.00000002.9810355535.00000000131FC000.00000040.00000400.00020000.00000000.sdmp, msinfo32.exe, 00000006.00000002.9810355535.0000000013C25000.00000040.00000400.00020000.00000000.sdmp, msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.wapforum.org/DTD/xhtml-mobile10.dtdRecibo de pago Banreserva.exe, ZMQ.exe.9.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://unclesow.com/flras/0WlhFQsDBjql9http://unclesow.com/flras/6/2/2023bomes.ruOPR0ZMQC:msinfo32.exe, 00000006.00000002.9810355535.0000000013C25000.00000040.00000400.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org/0.0.0.0%s~msinfo32.exe, 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.wapforum.org/DTD/wml_1.1.xmlRecibo de pago Banreserva.exe, ZMQ.exe.9.drfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://prototype.conio.net/Recibo de pago Banreserva.exe, ZMQ.exe.9.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        83.97.20.141
                        bomes.ruRomania
                        9009M247GBtrue
                        Joe Sandbox Version:36.0.0 Rainbow Opal
                        Analysis ID:799539
                        Start date and time:2023-02-06 16:36:14 +01:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 13m 19s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                        Run name:Suspected Instruction Hammering
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample file name:Recibo de pago Banreserva.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@9/1@1/1
                        EGA Information:
                        • Successful, ratio: 20%
                        HDC Information:Failed
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Exclude process from analysis (whitelisted): dllhost.exe, UserOOBEBroker.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, login.live.com
                        • Execution Graph export aborted for target Recibo de pago Banreserva.exe, PID 3160 because there are no executed function
                        • Execution Graph export aborted for target Recibo de pago Banreserva.exe, PID 4700 because there are no executed function
                        • Execution Graph export aborted for target ZMQ.exe, PID 1984 because there are no executed function
                        • Execution Graph export aborted for target ZMQ.exe, PID 2320 because there are no executed function
                        TimeTypeDescription
                        16:45:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZMQ C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe
                        16:45:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZMQ C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        83.97.20.141Confirmar Transferencia lista.exeGet hashmaliciousBrowse
                          Xvq0c5WDmN.exeGet hashmaliciousBrowse
                            Confirmar Transferencia lista.exeGet hashmaliciousBrowse
                              FACTURA_EMITIDA_01.exeGet hashmaliciousBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                bomes.ruConfirmar Transferencia lista.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                Xvq0c5WDmN.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                Confirmar Transferencia lista.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                FACTURA_EMITIDA_01.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                M247GBConfirmar Transferencia lista.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                4iLDIlbK8X.elfGet hashmaliciousBrowse
                                • 45.86.28.81
                                ptLoHDY5Sm.elfGet hashmaliciousBrowse
                                • 171.22.50.184
                                fWikJEXL2p.elfGet hashmaliciousBrowse
                                • 185.254.185.80
                                J3Za3c6EN2.elfGet hashmaliciousBrowse
                                • 193.32.99.113
                                0167.pdf.scrGet hashmaliciousBrowse
                                • 188.72.124.143
                                https://gardendalepain-my.sharepoint.com/:o:/p/jstewart/EtQfO_jHQrxAhnbaOs_LAhsBPkFdP6RBXK5r44uQe3sF6g?e=paOb5rGet hashmaliciousBrowse
                                • 193.29.104.84
                                WQi2YD6hQR.elfGet hashmaliciousBrowse
                                • 168.80.46.16
                                dGCnwOnxb1.elfGet hashmaliciousBrowse
                                • 193.29.104.151
                                UU9joEtotW.elfGet hashmaliciousBrowse
                                • 173.211.86.152
                                AVpGrgzqpb.elfGet hashmaliciousBrowse
                                • 185.94.197.129
                                Xvq0c5WDmN.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                a17hW45pFJ.vbsGet hashmaliciousBrowse
                                • 103.47.144.93
                                Confirmar Transferencia lista.exeGet hashmaliciousBrowse
                                • 83.97.20.141
                                PiuV0y8Fw8.elfGet hashmaliciousBrowse
                                • 38.203.241.110
                                92A99F2DBC918D102F537652B42FC6FDBE25FF2E52A5E.exeGet hashmaliciousBrowse
                                • 206.123.132.35
                                inslallStartx64.exeGet hashmaliciousBrowse
                                • 89.238.185.17
                                05E9WsH93Q.elfGet hashmaliciousBrowse
                                • 185.144.83.46
                                shipping document PL&BL draft.exeGet hashmaliciousBrowse
                                • 185.156.175.35
                                SetupProgram_v3.8.6.exeGet hashmaliciousBrowse
                                • 89.238.170.246
                                No context
                                No context
                                Process:C:\Windows\SysWOW64\msinfo32.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4568064
                                Entropy (8bit):6.7724325286819855
                                Encrypted:false
                                SSDEEP:49152:MxJPhRf0ewejGkahfiJWcSlAerZeWfEhiHECbFkt+aSj982TnUkcNVuV9zwu:MxTGeyk
                                MD5:963DC44EC86B6F0E667716A4EAFB63B1
                                SHA1:F487E173E2D8EF1C95D33FEF82DB94DDD2231E48
                                SHA-256:14FE82910C2F207C0D0AF16ADB78BEB03B871289D92BFEB52E7D4814B075E126
                                SHA-512:6300C982B38242C3D591410672D6872B2E80D675ACB421394B78B59F18E9E85C300E12E3BF7BDDC82EB6AA86A5DD998064232C90C0C5D164A4C6055DAB97CC2E
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe, Author: Joe Security
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 33%
                                Reputation:low
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....I.c......................-.............. ....@...........................F..................@........................... ...0.......t+..................................................p.......................(..|............................text...|........................... ..`.itext..h/.......0.................. ..`.data....w... ...x..................@....bss.....}...............................idata...0... ...2..................@....tls....H....`...........................rdata.......p......................@..@.reloc..............................@..B.rsrc....t+......t+..@..............@..@..............F.......E.............@..@................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.7724325286819855
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 98.45%
                                • Inno Setup installer (109748/4) 1.08%
                                • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                File name:Recibo de pago Banreserva.exe
                                File size:4568064
                                MD5:963dc44ec86b6f0e667716a4eafb63b1
                                SHA1:f487e173e2d8ef1c95d33fef82db94ddd2231e48
                                SHA256:14fe82910c2f207c0d0af16adb78beb03b871289d92bfeb52e7d4814b075e126
                                SHA512:6300c982b38242c3d591410672d6872b2e80d675acb421394b78b59f18e9e85c300e12e3bf7bddc82eb6aa86a5dd998064232c90c0c5d164a4c6055dab97cc2e
                                SSDEEP:49152:MxJPhRf0ewejGkahfiJWcSlAerZeWfEhiHECbFkt+aSj982TnUkcNVuV9zwu:MxTGeyk
                                TLSH:4926C021B7D0413AD03A36789FAAD28CAA3EBE108D35D51F36DC7A4E2F705412E557B2
                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                Icon Hash:0000212129210100
                                Entrypoint:0x581da0
                                Entrypoint Section:.itext
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                DLL Characteristics:
                                Time Stamp:0x63DE49DA [Sat Feb 4 12:04:42 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:94098decd11011734bd0063060a1831a
                                Instruction
                                push ebp
                                mov ebp, esp
                                add esp, FFFFFFF0h
                                push ebx
                                push esi
                                push edi
                                mov eax, 0057D93Ch
                                call 00007F333CA8355Ah
                                xor ecx, ecx
                                mov dl, 01h
                                mov eax, dword ptr [00457ED0h]
                                call 00007F333CAD6C74h
                                mov ebx, eax
                                mov edx, 00581F54h
                                mov eax, ebx
                                call 00007F333CAC126Eh
                                mov edx, 00000020h
                                mov eax, ebx
                                call 00007F333CAC0932h
                                xor eax, eax
                                push ebp
                                push 00581E87h
                                push dword ptr fs:[eax]
                                mov dword ptr fs:[eax], esp
                                mov eax, dword ptr [00591D9Ch]
                                mov eax, dword ptr [eax+00000220h]
                                call 00007F333CBF86A8h
                                push 00000001h
                                push 00000002h
                                mov ecx, 00000002h
                                mov edx, 00000003h
                                mov eax, esi
                                mov ebx, dword ptr [eax]
                                call dword ptr [ebx+00000088h]
                                mov eax, dword ptr [00591D9Ch]
                                call 00007F333CBF92CEh
                                mov dl, 01h
                                mov eax, dword ptr [00591D94h]
                                mov ecx, dword ptr [eax]
                                call dword ptr [ecx-04h]
                                mov eax, dword ptr [esi+00000298h]
                                xor edx, edx
                                call 00007F333CB5AA91h
                                mov dl, 01h
                                mov ecx, dword ptr [eax]
                                call dword ptr [ecx-04h]
                                mov eax, esi
                                mov edx, dword ptr [eax]
                                call dword ptr [edx+00000080h]
                                mov eax, dword ptr [00591D98h]
                                mov edx, dword ptr [eax]
                                call dword ptr [edx-08h]
                                mov eax, dword ptr [00591D9Ch]
                                mov edx, dword ptr [eax]
                                call dword ptr [edx+000002A8h]
                                mov eax, dword ptr [00591D9Ch]
                                call 00007F333CB60497h
                                mov eax, dword ptr [0000009Ch]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1920000x30aa.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b10000x2b7400.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1980000x18b8c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x1970000x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x1928f80x77c.idata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x17d27c0x17d400False0.4251652151639344data6.351665925970968IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .itext0x17f0000x2f680x3000False0.473876953125data6.102609159240764IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x1820000x77940x7800False0.4427734375data4.976361652960001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .bss0x18a0000x7da80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata0x1920000x30aa0x3200False0.3078125data5.073229022966032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0x1960000x480x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x1970000x180x200False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1980000x18b8c0x18c00False0.5334300031565656data6.659400816187808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                .rsrc0x1b10000x2b74000x2b7400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                ESD0x1b3fa80x221aacASCII text, with very long lines (65536), with no line terminatorsEnglishUnited States
                                UNICODEDATA0x3d5a540x723fdata
                                UNICODEDATA0x3dcc940x7ebddata
                                UNICODEDATA0x3e4b540x6a8data
                                UNICODEDATA0x3e51fc0xaf7ddata
                                UNICODEDATA0x3f017c0xd3cfdata
                                UNICODEDATA0x3fd54c0x14c5data
                                RT_CURSOR0x3fea140x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States
                                RT_CURSOR0x3feb480x134dataEnglishUnited States
                                RT_CURSOR0x3fec7c0x134dataEnglishUnited States
                                RT_CURSOR0x3fedb00x134dataEnglishUnited States
                                RT_CURSOR0x3feee40x134dataEnglishUnited States
                                RT_CURSOR0x3ff0180x134dataEnglishUnited States
                                RT_CURSOR0x3ff14c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States
                                RT_BITMAP0x3ff2800x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3ff4500x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States
                                RT_BITMAP0x3ff6340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3ff8040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3ff9d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3ffba40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3ffd740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x3fff440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x4001140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x4002e40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                RT_BITMAP0x4004b40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4005740xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4006540xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4007340xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4008140xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4008d40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                                RT_BITMAP0x4009940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_BITMAP0x400a740xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                                RT_BITMAP0x400b340xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_BITMAP0x400c140xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States
                                RT_BITMAP0x400cfc0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                                RT_BITMAP0x400dbc0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                                RT_ICON0x400e9c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640
                                RT_ICON0x4011840x128Device independent bitmap graphic, 16 x 32 x 4, image size 192
                                RT_ICON0x4012ac0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688
                                RT_ICON0x4021540x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152
                                RT_ICON0x4029fc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320
                                RT_ICON0x402f640x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896
                                RT_ICON0x40718c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600
                                RT_ICON0x4097340x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720
                                RT_ICON0x40b19c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                                RT_ICON0x40c2440x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400
                                RT_ICON0x40cbcc0x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680
                                RT_ICON0x40d2840x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                                RT_DIALOG0x40d6ec0x52data
                                RT_DIALOG0x40d7400x52data
                                RT_STRING0x40d7940x1f0data
                                RT_STRING0x40d9840x49cdata
                                RT_STRING0x40de200x4c0data
                                RT_STRING0x40e2e00x400data
                                RT_STRING0x40e6e00x230data
                                RT_STRING0x40e9100x2ccdata
                                RT_STRING0x40ebdc0x1a4AmigaOS bitmap font "i", fc_YSize 22016, 17920 elements, 2nd "r", 3rd
                                RT_STRING0x40ed800x278data
                                RT_STRING0x40eff80x4f0data
                                RT_STRING0x40f4e80x464AmigaOS bitmap font "P", fc_YSize 17408, 18944 elements, 2nd "t", 3rd "m"
                                RT_STRING0x40f94c0x300data
                                RT_STRING0x40fc4c0x3e4data
                                RT_STRING0x4100300x2e4data
                                RT_STRING0x4103140x530data
                                RT_STRING0x4108440x28cdata
                                RT_STRING0x410ad00x3a0data
                                RT_STRING0x410e700x2e0AmigaOS bitmap font "x", fc_YSize 27648, 17664 elements, 2nd " ", 3rd "w"
                                RT_STRING0x4111500x488data
                                RT_STRING0x4115d80x2b8data
                                RT_STRING0x4118900x36cdata
                                RT_STRING0x411bfc0x360data
                                RT_STRING0x411f5c0x1b8data
                                RT_STRING0x4121140x5f0data
                                RT_STRING0x4127040x5d8data
                                RT_STRING0x412cdc0x3c8data
                                RT_STRING0x4130a40x410data
                                RT_STRING0x4134b40x604data
                                RT_STRING0x413ab80x86cdata
                                RT_STRING0x4143240x8bcdata
                                RT_STRING0x414be00x7a8data
                                RT_STRING0x4153880x850data
                                RT_STRING0x415bd80xa68data
                                RT_STRING0x4166400x740data
                                RT_STRING0x416d800x25cdata
                                RT_STRING0x416fdc0x240data
                                RT_STRING0x41721c0x120data
                                RT_STRING0x41733c0x130data
                                RT_STRING0x41746c0xe0data
                                RT_STRING0x41754c0x2b4data
                                RT_STRING0x4178000x9cdata
                                RT_STRING0x41789c0xecdata
                                RT_STRING0x4179880x1a4data
                                RT_STRING0x417b2c0x430data
                                RT_STRING0x417f5c0x384data
                                RT_STRING0x4182e00x338data
                                RT_STRING0x4186180x324data
                                RT_STRING0x41893c0x3ecdata
                                RT_STRING0x418d280x170data
                                RT_STRING0x418e980xccdata
                                RT_STRING0x418f640x240data
                                RT_STRING0x4191a40x3ccdata
                                RT_STRING0x4195700x41cdata
                                RT_STRING0x41998c0x2ecdata
                                RT_STRING0x419c780x308data
                                RT_RCDATA0x419f800x10data
                                RT_RCDATA0x419f900x1536MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                RT_RCDATA0x41b4c80x359GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x41b8240x12cGIF image data, version 89a, 10 x 12
                                RT_RCDATA0x41b9500x129GIF image data, version 89a, 10 x 12
                                RT_RCDATA0x41ba7c0x4c8GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41bf440x4b5GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41c3fc0x42eGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41c82c0x42eGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41cc5c0x432GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41d0900x434GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41d4c40x4daGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41d9a00x4c1GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41de640x449GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41e2b00x455GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41e7080x4ceGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41ebd80x4b9GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41f0940x32eGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41f3c40x30eGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41f6d40x444GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41fb180x44fGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x41ff680x4b5GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x4204200x4abGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x4208cc0x480GIF image data, version 89a, 24 x 24
                                RT_RCDATA0x420d4c0x46aGIF image data, version 89a, 24 x 24
                                RT_RCDATA0x4211b80x672HTML document, ASCII text, with CRLF, LF line terminators
                                RT_RCDATA0x42182c0xe34GIF image data, version 89a, 105 x 141
                                RT_RCDATA0x4226600xa25GIF image data, version 89a, 171 x 75
                                RT_RCDATA0x4230880x4bGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4230d40x3fGIF image data, version 89a, 12 x 16
                                RT_RCDATA0x4231140x6eGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4231840x50GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4231d40x6cGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4232400x4fGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4232900x6fGIF image data, version 89a, 17 x 16
                                RT_RCDATA0x4233000x41GIF image data, version 89a, 15 x 15
                                RT_RCDATA0x4233440x3cGIF image data, version 89a, 16 x 12
                                RT_RCDATA0x4233800x69GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x4233ec0x4dGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x42343c0x71GIF image data, version 89a, 16 x 17
                                RT_RCDATA0x4234b00x69GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x42351c0x4dGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x42356c0x453HTML document, ASCII text, with CRLF line terminators
                                RT_RCDATA0x4239c00x36GIF image data, version 89a, 1 x 1
                                RT_RCDATA0x4239f80x91GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x423a8c0x82GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x423b100x75GIF image data, version 89a, 16 x 16
                                RT_RCDATA0x423b880x9eGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x423c280x7cGIF image data, version 89a, 16 x 16
                                RT_RCDATA0x423ca40x6528ASCII text, with CRLF line terminators
                                RT_RCDATA0x42a1cc0xed2HTML document, ASCII text, with CRLF line terminators
                                RT_RCDATA0x42b0a00x5e71ASCII text, with CRLF line terminators
                                RT_RCDATA0x430f140x5bdcASCII text, with CRLF line terminators
                                RT_RCDATA0x436af00x539ASCII text, with CRLF line terminators
                                RT_RCDATA0x43702c0x1f8aHTML document, ASCII text, with CRLF line terminators
                                RT_RCDATA0x438fb80x1687ASCII text, with CRLF line terminators
                                RT_RCDATA0x43a6400x17e1ASCII text, with CRLF line terminators
                                RT_RCDATA0x43be240x1ec5ASCII text, with CRLF line terminators
                                RT_RCDATA0x43dcec0x100cISO-8859 text, with CRLF line terminators
                                RT_RCDATA0x43ecf80xb6dASCII text, with CRLF line terminators
                                RT_RCDATA0x43f8680x348ASCII text, with CRLF line terminators
                                RT_RCDATA0x43fbb00x4edASCII text, with CRLF line terminators
                                RT_RCDATA0x4400a00x2408ASCII text, with CRLF line terminators
                                RT_RCDATA0x4424a80x1b42ASCII text, with CRLF line terminators
                                RT_RCDATA0x443fec0xb955ASCII text
                                RT_RCDATA0x44f9440x16003ASCII text
                                RT_RCDATA0x4659480xd7bASCII text, with CRLF line terminators
                                RT_RCDATA0x4666c40x72aASCII text, with CRLF line terminators
                                RT_RCDATA0x466df00x117cdata
                                RT_GROUP_CURSOR0x467f6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467f800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467f940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467fa80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467fbc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467fd00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_CURSOR0x467fe40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                RT_GROUP_ICON0x467ff80xaedata
                                RT_VERSION0x4680a80x2f8data
                                DLLImport
                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, RemoveDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharNextW, CharLowerBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                                version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                kernel32.dlllstrcpyA, WritePrivateProfileStringA, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQuery, VirtualAlloc, TryEnterCriticalSection, SystemTimeToTzSpecificLocalTime, SystemTimeToFileTime, SuspendThread, Sleep, SizeofResource, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryA, ReleaseSemaphore, ReadFile, RaiseException, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetTempFileNameA, GetSystemInfo, GetSystemDirectoryA, GetStringTypeExA, GetStdHandle, GetProcAddress, GetPrivateProfileStringA, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesExA, GetFileAttributesA, GetExitCodeThread, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateSemaphoreA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle
                                advapi32.dllRevertToSelf, RegQueryValueExW, RegQueryValueExA, RegOpenKeyExW, RegOpenKeyExA, RegFlushKey, RegCloseKey, OpenThreadToken, ImpersonateLoggedOnUser
                                kernel32.dllSleep
                                ole32.dllCoCreateGuid
                                oleaut32.dllGetErrorInfo, SysFreeString
                                ole32.dllCoUninitialize, CoInitialize
                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                kernel32.dllGetVersionExA
                                wsock32.dllWSACleanup, WSAStartup, WSAGetLastError, WSACancelAsyncRequest, WSAAsyncGetServByName, WSAAsyncGetHostByName, WSAAsyncSelect, getservbyname, gethostbyname, socket, send, recv, ntohs, listen, ioctlsocket, inet_addr, htons, connect, closesocket, bind
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                83.97.20.141192.168.11.207075498312848605 02/06/23-16:46:57.776260TCP2848605ETPRO TROJAN Bandook TCP CnC Beacon Keep-Alive (Inbound)70754983183.97.20.141192.168.11.20
                                192.168.11.2083.97.20.1414983170752810128 02/06/23-16:46:57.776688TCP2810128ETPRO TROJAN Bandook TCP CnC Beacon498317075192.168.11.2083.97.20.141
                                TimestampSource PortDest PortSource IPDest IP
                                Feb 6, 2023 16:41:19.837397099 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:41:19.924129963 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:41:19.924459934 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:41:20.198875904 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:41:20.332488060 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:41:57.735222101 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:41:57.735691071 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:41:57.864624977 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:42:57.772366047 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:42:57.772639990 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:42:57.916038036 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:43:57.793998957 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:43:57.794434071 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:43:57.938997030 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:44:57.777468920 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:44:57.777970076 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:44:57.917399883 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:45:57.805488110 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:45:57.805847883 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:45:57.991475105 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:46:57.776259899 CET70754983183.97.20.141192.168.11.20
                                Feb 6, 2023 16:46:57.776688099 CET498317075192.168.11.2083.97.20.141
                                Feb 6, 2023 16:46:57.913367987 CET70754983183.97.20.141192.168.11.20
                                TimestampSource PortDest PortSource IPDest IP
                                Feb 6, 2023 16:41:19.664875031 CET5754153192.168.11.201.1.1.1
                                Feb 6, 2023 16:41:19.825637102 CET53575411.1.1.1192.168.11.20
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Feb 6, 2023 16:41:19.664875031 CET192.168.11.201.1.1.10x969bStandard query (0)bomes.ruA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Feb 6, 2023 16:41:19.825637102 CET1.1.1.1192.168.11.200x969bNo error (0)bomes.ru83.97.20.141A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:1
                                Start time:16:38:08
                                Start date:06/02/2023
                                Path:C:\Users\user\Desktop\Recibo de pago Banreserva.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\Recibo de pago Banreserva.exe
                                Imagebase:0x400000
                                File size:4568064 bytes
                                MD5 hash:963DC44EC86B6F0E667716A4EAFB63B1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000000.4755352355.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low

                                Target ID:6
                                Start time:16:41:16
                                Start date:06/02/2023
                                Path:C:\Windows\SysWOW64\msinfo32.exe
                                Wow64 process (32bit):true
                                Commandline:C:\windows\syswow64\msinfo32.exe
                                Imagebase:0x850000
                                File size:338432 bytes
                                MD5 hash:5C49B7B55D4AF40DB1047E08484D6656
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_Bandook, Description: Detects Bandook backdoor, Source: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, Author: ditekshen
                                Reputation:moderate

                                Target ID:7
                                Start time:16:41:16
                                Start date:06/02/2023
                                Path:C:\Users\user\Desktop\Recibo de pago Banreserva.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Recibo de pago Banreserva.exe" ooooooooooooooo
                                Imagebase:0x400000
                                File size:4568064 bytes
                                MD5 hash:963DC44EC86B6F0E667716A4EAFB63B1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Reputation:low

                                Target ID:9
                                Start time:16:44:18
                                Start date:06/02/2023
                                Path:C:\Windows\SysWOW64\msinfo32.exe
                                Wow64 process (32bit):true
                                Commandline:C:\windows\syswow64\msinfo32.exe
                                Imagebase:0x850000
                                File size:338432 bytes
                                MD5 hash:5C49B7B55D4AF40DB1047E08484D6656
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate

                                Target ID:10
                                Start time:16:45:12
                                Start date:06/02/2023
                                Path:C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe"
                                Imagebase:0x7ff75abb0000
                                File size:4568064 bytes
                                MD5 hash:963DC44EC86B6F0E667716A4EAFB63B1
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe, Author: Joe Security
                                Antivirus matches:
                                • Detection: 33%, ReversingLabs
                                Reputation:low

                                Target ID:11
                                Start time:16:45:21
                                Start date:06/02/2023
                                Path:C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\ZMQ\ZMQ.exe"
                                Imagebase:0x400000
                                File size:4568064 bytes
                                MD5 hash:963DC44EC86B6F0E667716A4EAFB63B1
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:Borland Delphi
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:38.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:39.1%
                                  Total number of Nodes:23
                                  Total number of Limit Nodes:2

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_1314FA20 4 Function_131989F3 0->4 1 Function_1315CB10 2 Function_131539F0 3 Function_13154160 5 Function_13198A15 4->5 6 Function_13FF67C0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 13ff67c0-13ff67d0 1 13ff67e2-13ff67e7 0->1 2 13ff67e9 1->2 3 13ff67eb 2->3 4 13ff67d8-13ff67dd 2->4 6 13ff67f0-13ff67f2 3->6 5 13ff67de-13ff67e0 4->5 5->1 5->2 7 13ff67fb-13ff67ff 6->7 8 13ff67f4-13ff67f9 6->8 9 13ff680c-13ff680f 7->9 10 13ff6801 7->10 8->7 13 13ff6818-13ff681a 9->13 14 13ff6811-13ff6816 9->14 11 13ff682b-13ff6830 10->11 12 13ff6803-13ff680a 10->12 15 13ff6843-13ff6845 11->15 16 13ff6832-13ff683b 11->16 12->9 12->11 13->6 14->13 19 13ff684e 15->19 20 13ff6847-13ff684c 15->20 17 13ff683d-13ff6841 16->17 18 13ff68b2-13ff68b5 16->18 17->19 21 13ff68ba-13ff68bd 18->21 22 13ff681c-13ff681e 19->22 23 13ff6850-13ff6853 19->23 20->19 24 13ff68bf-13ff68c1 21->24 27 13ff6827-13ff6829 22->27 28 13ff6820-13ff6825 22->28 25 13ff685c 23->25 26 13ff6855-13ff685a 23->26 24->21 29 13ff68c3-13ff68c6 24->29 25->22 30 13ff685e-13ff6860 25->30 26->25 31 13ff687d-13ff688c 27->31 28->27 29->21 32 13ff68c8-13ff68e4 29->32 33 13ff6869-13ff686d 30->33 34 13ff6862-13ff6867 30->34 35 13ff688e-13ff6895 31->35 36 13ff689c-13ff68a9 31->36 32->24 39 13ff68e6 32->39 33->30 40 13ff686f 33->40 34->33 35->35 37 13ff6897 35->37 36->36 38 13ff68ab-13ff68ad 36->38 37->5 38->5 41 13ff68ec-13ff68f0 39->41 42 13ff687a 40->42 43 13ff6871-13ff6878 40->43 44 13ff6937-13ff6967 VirtualProtect * 2 41->44 45 13ff68f2-13ff6908 LoadLibraryA 41->45 42->31 43->30 43->42 46 13ff696b-13ff696f 44->46 47 13ff6909-13ff690e 45->47 46->46 48 13ff6971 46->48 47->41 49 13ff6910-13ff6912 47->49 50 13ff691b-13ff6928 GetProcAddress 49->50 51 13ff6914-13ff691a 49->51 52 13ff692a-13ff692f 50->52 53 13ff6931 ExitProcess 50->53 51->50 52->47
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 13FF6902
                                  • GetProcAddress.KERNEL32(?,13FF4FF9), ref: 13FF6920
                                  • ExitProcess.KERNEL32(?,13FF4FF9), ref: 13FF6931
                                  • VirtualProtect.KERNELBASE(13140000,00001000,00000004,?,057EBB00), ref: 13FF694E
                                  • VirtualProtect.KERNELBASE(13140000,00001000), ref: 13FF6963
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.9810355535.0000000013FF5000.00000040.00000400.00020000.00000000.sdmp, Offset: 13140000, based on PE: true
                                  • Associated: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_13140000_msinfo32.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                  • String ID:
                                  • API String ID: 1996367037-0
                                  • Opcode ID: 757dd17e5fa95604ecc7aac9eff2aaee55e9d3c2b88249dfadb35353dbfee004
                                  • Instruction ID: b6e887f9ca2b28ec712dfcb76cf18aff48946d11f876862bc2002a9101bb8aff
                                  • Opcode Fuzzy Hash: 757dd17e5fa95604ecc7aac9eff2aaee55e9d3c2b88249dfadb35353dbfee004
                                  • Instruction Fuzzy Hash: 4B51D0B3A557934AD3104AB89EC4650BBACEF0623472C073DDEE1973E5EFA55806C660
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 54 1315cb10-1315cb2a 55 1315cb31-1315cb40 GetLastInputInfo 54->55 56 1315cb46-1315cb4b 55->56 57 1315cb42-1315cb44 55->57 58 1315cb50-1315cb6d Sleep 56->58 57->58 58->55 59 1315cb6f-1315cb75 58->59
                                  APIs
                                  • GetLastInputInfo.USER32(00000008), ref: 1315CB35
                                  • Sleep.KERNELBASE(00002710), ref: 1315CB68
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, Offset: 13140000, based on PE: true
                                  • Associated: 00000006.00000002.9810355535.0000000013FF5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_13140000_msinfo32.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoInputLastSleep
                                  • String ID:
                                  • API String ID: 1162944863-0
                                  • Opcode ID: 5e52a0c89b3970dde6e70d80d26661b019d23b9d3f05a747ec48d91668530a39
                                  • Instruction ID: cd30dbacb1944860300b79b7ce794a3713a7d22bc7408253b9c1ec695d4b28ff
                                  • Opcode Fuzzy Hash: 5e52a0c89b3970dde6e70d80d26661b019d23b9d3f05a747ec48d91668530a39
                                  • Instruction Fuzzy Hash: 8CF0B436904128AFCB04FF6DD9C595ABFBCFB49364F440265E918D3284D734A854CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,13198B34,131CEC68,00000017), ref: 13198A1A
                                  • UnhandledExceptionFilter.KERNEL32(?,?,13198B34,131CEC68,00000017), ref: 13198A23
                                  • GetCurrentProcess.KERNEL32(C0000409,?,13198B34,131CEC68,00000017), ref: 13198A2E
                                  • TerminateProcess.KERNEL32(00000000,?,13198B34,131CEC68,00000017), ref: 13198A35
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, Offset: 13140000, based on PE: true
                                  • Associated: 00000006.00000002.9810355535.0000000013FF5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_13140000_msinfo32.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                  • String ID:
                                  • API String ID: 3231755760-0
                                  • Opcode ID: efe9299d8c83840d8bcc812fe64f9a0cee132a5afa70b9ac625f1b7a0ad52663
                                  • Instruction ID: 487008f51e09d1bf93032ec30c68f8f048622ba8f0a6c57a6f067642269298dc
                                  • Opcode Fuzzy Hash: efe9299d8c83840d8bcc812fe64f9a0cee132a5afa70b9ac625f1b7a0ad52663
                                  • Instruction Fuzzy Hash: 3CD01231440224AFC7483BE1C9CCA4D3F68EB0466AF018000FF0981004DB3944108B79
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 61 1314fa20-1314fa3a 62 1314fab1-1314fabe call 131989f3 61->62 63 1314fa3c-1314fa5f RegOpenKeyA 61->63 63->62 64 1314fa61-1314fa86 RegQueryValueExA 63->64 64->62 66 1314fa88-1314faa6 64->66 66->62
                                  APIs
                                  • RegOpenKeyA.ADVAPI32(80000001,13BFDB78,?), ref: 1314FA57
                                  • RegQueryValueExA.ADVAPI32(?,13C260E0,00000000,00000000,?,00000200), ref: 1314FA7E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.9810355535.0000000013140000.00000040.00000400.00020000.00000000.sdmp, Offset: 13140000, based on PE: true
                                  • Associated: 00000006.00000002.9810355535.0000000013FF5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_13140000_msinfo32.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: OpenQueryValue
                                  • String ID: BLABLA
                                  • API String ID: 4153817207-1676716149
                                  • Opcode ID: aef527a16c6fdcb4c7625d402229a13b9c052565a98cf6f7bcbf6e7f986acc8c
                                  • Instruction ID: e19a3eeec7759514f7a8bcf63f4a0077f9d851227abd78ad3a8c800c338f666f
                                  • Opcode Fuzzy Hash: aef527a16c6fdcb4c7625d402229a13b9c052565a98cf6f7bcbf6e7f986acc8c
                                  • Instruction Fuzzy Hash: 3C01A770600318BFD714EB90CD8CFE97BBCE704205FA041A5ED25E1147D775695CAB14
                                  Uniqueness

                                  Uniqueness Score: -1.00%