Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
invoice.exe

Overview

General Information

Sample Name:invoice.exe
Analysis ID:828743
MD5:f111934675c34cca18d9d76fc34a2e40
SHA1:6c54e0fbae03df56fee84195f3deb4d2ebd8d8c1
SHA256:c627b8bb6c4ea0cf03aa2d209d0ecc53ff9784283328dabd44c1675aef0939c2
Tags:exesigned
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Initial sample is a PE file and has a suspicious name
Found potential ransomware demand text
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops certificate files (DER)
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • invoice.exe (PID: 2144 cmdline: C:\Users\user\Desktop\invoice.exe MD5: F111934675C34CCA18D9D76FC34A2E40)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: invoice.exeReversingLabs: Detection: 35%
Source: invoice.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: f:\apps8.0.0.270\sw\src\coexagent\mini-agent\release\Ath_CoexAgent.pdb source: Ath_CoexAgent.exe.0.dr
Source: Binary string: C:\Builds\219\N2\HO_NMDllHost_g_2016_r_0\Sources\NMDllHost_2016\src\NMDllHost\NMDllHost\x86\Release\NMDllHost.pdb source: NMDllHost.exe.0.dr
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00406268 FindFirstFileA,FindClose,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_0040572D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004026F8 FindFirstFileA,
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: invoice.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
Source: invoice.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
Source: invoice.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
Source: NMDllHost.exe.0.dr, Mss32.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: invoice.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: invoice.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: NMDllHost.exe.0.dr, Mss32.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: invoice.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
Source: invoice.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
Source: invoice.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
Source: NMDllHost.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: NMDllHost.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: SourceCodePro-ExtraLight.otf.0.drString found in binary or memory: http://scripts.sil.org/OFLSource
Source: invoice.exeString found in binary or memory: http://subca.ocsp-certum.com01
Source: invoice.exeString found in binary or memory: http://subca.ocsp-certum.com02
Source: invoice.exeString found in binary or memory: http://subca.ocsp-certum.com05
Source: NMDllHost.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
Source: NMDllHost.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: NMDllHost.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: NMDllHost.exe.0.dr, Mss32.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: NMDllHost.exe.0.dr, Mss32.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: NMDllHost.exe.0.dr, Mss32.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://www.avast.com0/
Source: invoice.exeString found in binary or memory: http://www.certum.pl/CPS0
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: NMDllHost.exe.0.drString found in binary or memory: http://www.nero.com
Source: NMDllHost.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: NMDllHost.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: NMDllHost.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: NMDllHost.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Mss32.dll.0.dr, lang-1059.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004051CA GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Diskofils\Justiciaryship\vmusbmouse.catJump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: NMDllHost.exe.0.drString found in binary or memory: ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ
Source: NMDllHost.exe.0.drString found in binary or memory: ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ6
Source: Mss32.dll.0.drString found in binary or memory: _AIL_unlock@0

System Summary

barindex
Source: initial sampleStatic PE information: Filename: invoice.exe
Source: invoice.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: lang-1059.dll.0.drStatic PE information: No import functions for PE file found
Source: invoice.exe, 00000000.00000002.837788784.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepaaklders Nonblameful.exe` vs invoice.exe
Source: invoice.exeBinary or memory string: OriginalFilenamepaaklders Nonblameful.exe` vs invoice.exe
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00406742
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00404A09
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00406F19
Source: invoice.exeStatic PE information: invalid certificate
Source: C:\Users\user\Desktop\invoice.exeProcess Stats: CPU usage > 98%
Source: invoice.exeReversingLabs: Detection: 35%
Source: C:\Users\user\Desktop\invoice.exeFile read: C:\Users\user\Desktop\invoice.exeJump to behavior
Source: invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepositoryJump to behavior
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Temp\nsfE50D.tmpJump to behavior
Source: classification engineClassification label: mal56.rans.winEXE@1/12@0/0
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,
Source: C:\Users\user\Desktop\invoice.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00404496 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
Source: invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: f:\apps8.0.0.270\sw\src\coexagent\mini-agent\release\Ath_CoexAgent.pdb source: Ath_CoexAgent.exe.0.dr
Source: Binary string: C:\Builds\219\N2\HO_NMDllHost_g_2016_r_0\Sources\NMDllHost_2016\src\NMDllHost\NMDllHost\x86\Release\NMDllHost.pdb source: NMDllHost.exe.0.dr
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_10002D20 push eax; ret
Source: Mss32.dll.0.drStatic PE information: section name: MSSMIXER
Source: NMDllHost.exe.0.drStatic PE information: section name: .shared
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Temp\nsfE5AA.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Temp\nsfE5AA.tmp\AdvSplash.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Antimodernly\trever\Hovedinteressers\lang-1059.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\NMDllHost.exeJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Ath_CoexAgent.exeJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\Mss32.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\invoice.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\invoice.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\invoice.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Antimodernly\trever\Hovedinteressers\lang-1059.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\NMDllHost.exeJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Ath_CoexAgent.exeJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\Mss32.dllJump to dropped file
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_00406268 FindFirstFileA,FindClose,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_0040572D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004026F8 FindFirstFileA,
Source: C:\Users\user\Desktop\invoice.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\invoice.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData
Source: C:\Users\user\Desktop\invoice.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: vmusbmouse.cat.0.drBinary or memory string: VMware, Inc.
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
Source: C:\Users\user\Desktop\invoice.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Native API
Path Interception1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Access Token Manipulation
LSASS Memory3
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
invoice.exe36%ReversingLabsWin32.Trojan.Tnega
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Antimodernly\trever\Hovedinteressers\lang-1059.dll0%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Ath_CoexAgent.exe2%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\Mss32.dll0%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\NMDllHost.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsfE5AA.tmp\AdvSplash.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsfE5AA.tmp\System.dll0%ReversingLabs
SourceDetectionScannerLabelLinkDownload
0.2.invoice.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
0.0.invoice.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
No Antivirus matches
SourceDetectionScannerLabelLink
http://subca.ocsp-certum.com050%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://subca.ocsp-certum.com020%URL Reputationsafe
http://subca.ocsp-certum.com010%URL Reputationsafe
http://www.avast.com0/0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.certum.pl/ctsca2021.crl0oinvoice.exefalse
    high
    http://nsis.sf.net/NSIS_Errorinvoice.exefalse
      high
      http://repository.certum.pl/ctnca.cer09invoice.exefalse
        high
        http://crl.thawte.com/ThawteTimestampingCA.crl0NMDllHost.exe.0.dr, Mss32.dll.0.drfalse
          high
          http://repository.certum.pl/ctsca2021.cer0invoice.exefalse
            high
            http://crl.certum.pl/ctnca.crl0kinvoice.exefalse
              high
              http://subca.ocsp-certum.com05invoice.exefalse
              • URL Reputation: safe
              unknown
              http://www.symauth.com/rpa00NMDllHost.exe.0.drfalse
                high
                http://ocsp.thawte.com0NMDllHost.exe.0.dr, Mss32.dll.0.drfalse
                • URL Reputation: safe
                unknown
                http://subca.ocsp-certum.com02invoice.exefalse
                • URL Reputation: safe
                unknown
                http://www.nero.comNMDllHost.exe.0.drfalse
                  high
                  http://subca.ocsp-certum.com01invoice.exefalse
                  • URL Reputation: safe
                  unknown
                  http://crl.certum.pl/ctnca2.crl0linvoice.exefalse
                    high
                    http://repository.certum.pl/ctnca2.cer09invoice.exefalse
                      high
                      http://www.avast.com0/invoice.exe, 00000000.00000002.837716661.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1059.dll.0.drfalse
                      • URL Reputation: safe
                      unknown
                      http://scripts.sil.org/OFLSourceSourceCodePro-ExtraLight.otf.0.drfalse
                        high
                        http://nsis.sf.net/NSIS_ErrorErrorinvoice.exefalse
                          high
                          http://www.symauth.com/cps0(NMDllHost.exe.0.drfalse
                            high
                            http://www.certum.pl/CPS0invoice.exefalse
                              high
                              No contacted IP infos
                              Joe Sandbox Version:37.0.0 Beryl
                              Analysis ID:828743
                              Start date and time:2023-03-17 14:20:40 +01:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 25s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:invoice.exe
                              Detection:MAL
                              Classification:mal56.rans.winEXE@1/12@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 85.7% (good quality ratio 84.2%)
                              • Quality average: 87.3%
                              • Quality standard deviation: 21.3%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                              • Not all processes where analyzed, report is missing behavior information
                              • VT rate limit hit for: invoice.exe
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:HTML document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1245
                              Entropy (8bit):5.462849750105637
                              Encrypted:false
                              SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                              MD5:5343C1A8B203C162A3BF3870D9F50FD4
                              SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                              SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                              SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):160264
                              Entropy (8bit):4.358279117234243
                              Encrypted:false
                              SSDEEP:768:EVS3TP/nITMkSXnOLeecEKVdPGeGlo1ciX9NtfoxOpGHXGHmeVDj3bRQ9pY/ycVa:EVsPQBRodPDW4zMctML/
                              MD5:B47C741673A92A16B48140FCBDA04030
                              SHA1:AA7A003DA656320A274F276EE4BF8C27203D1B4C
                              SHA-256:E6E775E7A5AC1BFA01B5A5CB9A7532171817408E67E346E33CA3CB091BDEA478
                              SHA-512:464BFC63FD715E07C02ED78F9603A1C890F3848C0D46BB7B58D352B3FF1E76612E8D772903C9954159586735567DD493A023BCFADA5E15407725F7267567DC60
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....\)b...........!.........P...............................................p.......V....@.......................................... ...M...........R... ...........................................................................................rdata..p...........................@..@.rsrc....M... ...N..................@..@.....\)b........T........................rdata......T....rdata$zzzdbg.... ... ...rsrc$01.....@..H,...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):323584
                              Entropy (8bit):6.212800759462987
                              Encrypted:false
                              SSDEEP:3072:KW+Rs18sEZQEwgD+odVKFKLuFv1kJV0YVJL/vFU/lmJ03Hk7OJ3/b7FG66sN4IqF:j7SdPKZ1kJLLH+lmJgHeOVb7o663L
                              MD5:86B8B1F5C1189D68B07666784BE882FE
                              SHA1:B023E9442CFC9C9652E1C8990F06DEF08BDC5B01
                              SHA-256:0DD8C627F3DDBDB61B1910540C465C0D62C9F8D84C7CBB6C80782DB02D535AF0
                              SHA-512:E471BEBDD441756CD840420C862CD84EF18A03144DDCAA20D783399D0736BD012D3984E38BDDB9DF16837B205D0A6ECA4C6FEE1D41553B5002A4B1E1B753E139
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 2%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........mZ.z...z...z....~..z....n..z....m..z.......z...z...z....q..z.......z....{..z..Rich.z..........PE..L....(.P.................p...p....................@........................................................................@...<...................................P................................N..@............................................text....n.......p.................. ..`.rdata........... ..................@..@.data...@Y.......@..................@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10376
                              Entropy (8bit):7.080841609849737
                              Encrypted:false
                              SSDEEP:192:pL/2EJC+EhGRmwBYyKaWFWQFV5NB0884LfqnajnWc:11PCFRVJlLWc
                              MD5:DBE99D951395F37E5C3F4164D8A22245
                              SHA1:238EF179549F6AEB2E3C6F4188365814A965312B
                              SHA-256:671CB26C75AC0256B07835AE00E7018AF6126FAE7400BF21E57707E0CC9164B5
                              SHA-512:3A931015C1038965028AD70E439F75BA210B1113BBCD8A7C5063DA376DBB577F250BE6141B93F1CB100084A930DAD4B2205864F19F3A5E3911CD6CC0B6D0D0D8
                              Malicious:false
                              Reputation:low
                              Preview:0.(...*.H........(u0.(q...1.0...`.H.e......0..h..+.....7.....Y0..U0...+.....7.......V...\B......*..200624081447Z0...+.....7.....0..N0....RA.A.1.6.5.E.2.A.3.9.8.5.E.4.A.A.5.A.9.2.5.3.8.8.2.1.2.1.4.B.1.0.8.3.5.2.3.D.B.F...1..O0@..+.....7...1200...F.i.l.e........v.m.u.s.b.m.o.u.s.e...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........^*9..Z.S.!!K..R=.0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...0.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RC.2.2.3.E.C.C.5.6.2.3.D.1.E.C.D.2.3.A.8.0.9.C.A.D.4.B.5.F.C.E.7.C.B.6.C.0.2.F.B...1..G0@..+.....7...1200...F.i.l.e........v.m.u.s.b.m.o.u.s.e...i.n.f...0E..+.....7...17050...+.....7.......0!0...+.........#..b=..#.......l..0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...0.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0...0J..+.....7..
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):353768
                              Entropy (8bit):6.836018886719178
                              Encrypted:false
                              SSDEEP:6144:EpcTapyHuUcl0PUpFawtMR6gP4aHrmtcWR3uA9:MIaQ+l0PoRtW6aHrmtcWRt9
                              MD5:B75A8E0DDEEB4330C1DBA37105244B0F
                              SHA1:E5302CA8517AC2826B5D56E3395D41C34B5B3DF7
                              SHA-256:CC142B9D8B5223E2720C6440CB7A124C0A80D2FB04ECF59AD7331DFD6E3CB51F
                              SHA-512:120F91A144B5B6CC9E33B232AE4466AF2E6C5F702F4C04E9A03DD4F239DE752770E4DE2C6BE2CAF3BEE9775C8887EAB9E08A896D7F2EBA1AD8CF928555CC99A3
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.lq..."..."..."..."..."h.."..."..."..."e.."..."e.."k.."..."..."..."..."^.2"..."^.3"..."..."..."Rich..."........PE..L...#..<...........!...............................!................................A....................................0..p...P.......X............N..........`T...................................................................................text....w.......x.................. ..`MSSMIXER.G.......H...|.............. ..`.rdata..%...........................@..@.data............F..................@....rsrc...X...........................@..@.reloc..tW.......X..................@..B................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):116720
                              Entropy (8bit):5.889271571414613
                              Encrypted:false
                              SSDEEP:3072:g3nqpX2I6OhctR+lCTD01Lcy4J93TnCx86:L2W1oy4J93TCT
                              MD5:DBF787BD6E5CE77FB34FF281A144EB96
                              SHA1:50B7799ECCA566BE35429828245D44CB04AD8885
                              SHA-256:CCBACEEA04837229C95C08274C747ABE069279AFB990DDD89EC743C42ADC0AD9
                              SHA-512:07949EC3882D9CB6E2341CE60C6E911F24463B01F484C037E65A2A8F3495543A096B632E01F8480D03FF388D1E811ECF760155F97F1D5329785C506603BB18A7
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............u.L.u.L.u.LF.bL.u.LF.aL.u.LF.dL.u.LF.`L.u.L..,L.u.L..<L.u.L.u.L.t.Lu.|L.u.L...L.u.Lu.`L.u.Lu.fL.u.Lu.cL.u.LRich.u.L........PE..L......U..........................................@.......................................@..................................E..........p...........................`...8...........................0&..@............................................text............................... ..`.rdata...N.......P..................@..@.data...p....`.......T..............@....shared..............^..............@....rsrc...p............`..............@..@.reloc...K.......L...d..............@..B................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:ASCII text, with very long lines (52812), with no line terminators
                              Category:dropped
                              Size (bytes):52812
                              Entropy (8bit):2.691443133069214
                              Encrypted:false
                              SSDEEP:768:w3MHvSSEEEE422O9Py2Ve76uBu+O3+xpnY/A8o9kxErpEEEbYRx+KmGSBAM07byk:bvS53XH/Y/A8opMr07bnr
                              MD5:4C6FAD70762561B0D38AA152C52796A8
                              SHA1:9FAFD1E9CF41E5482AC7960F7F0C20AB5B703D30
                              SHA-256:C7CC1E08C3B0850EF02E7F4371D71918B55686581FDE5D124149884EE56C8F4F
                              SHA-512:721DC72FF2153615343BCEC4B408337E8BD5012C234237F2005C43C48D1179DEDC1606014DE6659F5A22BC9116C2348C1AD5B05BF128D60572EEAE9346E06EE0
                              Malicious:false
                              Preview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
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:OpenType font data
                              Category:dropped
                              Size (bytes):127080
                              Entropy (8bit):7.036042013030407
                              Encrypted:false
                              SSDEEP:3072:Tz0LOC7z/0cS/Uz0+Gp+dtsVaHGg0IADoQg4RAxL2+p:s7z/0jUz0+GsdBHGg9cg4mvp
                              MD5:9ECC8DF598E9EDDE1072942D344CC0CF
                              SHA1:9FF240AB48EB7E97237E25D8C6F8CD738BA97CAA
                              SHA-256:D945E1C81A59A434E36EEDEF21E64B61CC6901A9E43936AF79C20BDBF57592B1
                              SHA-512:09978B7AF39B541C13F5E628BAF789E9FD1635258C74379351612451022D53B38B9F78DA7A74C19BA0FFB7B0C93B63C69EFCFC36285EFBCAF3678ADE7D423AD0
                              Malicious:false
                              Preview:OTTO.......`BASEe.]........FCFF 0.....Ft..i.DSIG.......`....GDEF............GPOS.s........vGSUB..]....T...JOS/2......P...`cmap.spB......3fhead..h........6hhea.3.....$...$hmtx:C<........Bmaxp. P....H....nameCt........:post...3..FT... ..........JC_.<......................L.:...$.......................X.L.L......................P.. .....X.........X...K...X...^.2.............. .....8.........ADBO... ............`.............. .....J.~.................................$.............<...........H...........T...........`...........l.........&.~.........&...........*...........6...........D.*.........:.n.....................2...........$.......................D.*.....................4.......................R...........4...........d.l.........0.......................4...........4...........2.(......... .Z.........4.z...................................................................................&...........8...........J...........\.........$.n......... ...........,...........0............
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9204
                              Entropy (8bit):5.371514089173945
                              Encrypted:false
                              SSDEEP:192:iRJ98lWxEb5BvGIrd+mc1OTno+SXhbSIm1JjSvcQpK/w:ijK0GeIrQmEOTno+SXox1JjmpKo
                              MD5:641B90F9AEDFC68486D0D20B40F7ECA6
                              SHA1:0A683DD844534905336784FADD80498AFE26F6FA
                              SHA-256:87A4B9369FD51D76C9032C0E65C3C6221659E086798829072785BE589E55B839
                              SHA-512:567CB9F6C31D196A171E5A9C2726A39A9B3D351AC92D4ACF8624213A68C9033ACC31AFAAAD82AA9F5359F32D3A0CA40522E151B8370D553A41ABEB6A6E097078
                              Malicious:false
                              Preview:.;!@Lang2@!UTF-8!..; 4.30 : Milan Hrub...; 4.33 : Michal Molhanec..; 9.07 : Ji.. Mal.k..; 15.00 : Kry.tof .ern...;..;..;..;..;..;..;..0..7-Zip..Czech...e.tina..401..OK..Storno........&Ano..&Ne..Zav..&t..N.pov.da....Po&kra.ovat..440..Ano na &v.echno..N&e na v.echno..Zastavit..Spustit znovu..&Pozad...P&op.ed...Po&zastavit..Pozastaveno..Jste si jist., .e to chcete stornovat?..500..&Soubor...pr&avy..&Zobrazen...&Obl.ben...&N.stroje..N.po&v.da..540..&Otev..t..Otev..t u&vnit...Otev..t &mimo..&Zobrazit..&Upravit..&P.ejmenovat..Kop.rovat &do.....P.&esunout do.....Vymaza&t..&Rozd.lit soubor.....&Slou.it soubory.....Vlast&nosti..Pozn.mk&a..Vypo..tat kontroln. sou.et..Porovnat soubory..Vytvo.it slo.ku..Vytvo.it soubor..&Konec..Odk.zat..&Alternate Streams..600..Vybrat &v.e..Zru.it v.b.r v.e..&Invertovat v.b.r..Vybrat.....Zru.it v.b.r.....Vybrat podle typu..Zru.it v.b.r podle typu..700..&Velk. ikony..&Mal. ikony..&Seznam..&Podrobn
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):218305
                              Entropy (8bit):7.337101777894853
                              Encrypted:false
                              SSDEEP:3072:PdqWTzg/gzZ9xRpRmib28JUBTE+vAsGolsJAsJ7Z/aKespGgyfZrl:HOaZ1nv9J2I+veZiKe2i
                              MD5:DF0C864AD6FE636F3AD391B04A408AC7
                              SHA1:B0072D5406BA66EDD9F6A1A443D56378BDA688C5
                              SHA-256:A802EB02B9345615A947C6B8B57441D7DEBD4300FFEAFC16623CE18F68CABBF2
                              SHA-512:2AA97CC2724CA1309B3594F552BAF227CCB7B6F73B29E612A9779D987E9FBE0E41F7CE765083AE16CD3CEC84B826A401279D69200D1AE3A0722B4E3CC731079C
                              Malicious:false
                              Preview:........kkk..........****...u............................|.......................44...e............ .DD..TTT.................""...............................UU...[[[......<<.........qq.........l...................1.*.......4........f.............................(......{{.................1......q....66...........:.........................mmm.........55.'...........................111...99.x.LLLLL..........................~................""...))...........#..............@@.b.........4.0....&............|........................||.................................ppp.8.......ww............W..&...*........````.......~.....................O.,,............C...............................F.....\.........HHHHHHH......o.....^^...d...................ff..... ..D.......I.....W.......................................\...............y..F....ppp..r......................))...........".........................o..........9.22.........~~~.QQQ......C.........................6......~~...................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):5632
                              Entropy (8bit):4.76010720109437
                              Encrypted:false
                              SSDEEP:96:HqNXqwK188CgAtXvZBkjDf0yf9ysrtWp2wol:HAqrg1XvZB6kYtWp2
                              MD5:88C3BA1802AEF228541820767453E058
                              SHA1:4F3AEFB9E4EC27CB49973CB19BD968E54A2BA676
                              SHA-256:2722555EC1F72523774B64D25FD4C2B460000BFE82140876D6100DC4FB1F62B1
                              SHA-512:718790339E13B53553AFDE6968AE10CDA7B47CBDBFC82599116C8B5B1E8FBBA259F0CE6781908BE027360132A0ABE057DF2FFA7072212ACDA96BFF535E241582
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................P$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\invoice.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):11264
                              Entropy (8bit):5.767999234165119
                              Encrypted:false
                              SSDEEP:192:cPtkumJX7zBE2kGwfy9S9VkPsFQ1MZ1c:N7O2k5q9wA1MZa
                              MD5:C9473CB90D79A374B2BA6040CA16E45C
                              SHA1:AB95B54F12796DCE57210D65F05124A6ED81234A
                              SHA-256:B80A5CBA69D1853ED5979B0CA0352437BF368A5CFB86CB4528EDADD410E11352
                              SHA-512:EAFE7D5894622BC21F663BCA4DD594392EE0F5B29270B6B56B0187093D6A3A103545464FF6398AD32D2CF15DAB79B1F133218BA9BA337DDC01330B5ADA804D7B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....uY...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):7.953363965326294
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:invoice.exe
                              File size:861416
                              MD5:f111934675c34cca18d9d76fc34a2e40
                              SHA1:6c54e0fbae03df56fee84195f3deb4d2ebd8d8c1
                              SHA256:c627b8bb6c4ea0cf03aa2d209d0ecc53ff9784283328dabd44c1675aef0939c2
                              SHA512:48b825550b320ebfcccc4260e359ffedad7675913ee7e7a62bd62a3839fd20c8f7cafb9a6e6bb8d7d8a2164674019b696c8851362c0a6b69f4dde8b1da3dc84c
                              SSDEEP:12288:cJAEzBf4FZZmubGJ6vVZgj9Zp4RVkdXALai8ZpP7MxhGmeLJfRriFm4gCb5vr:cJBf4guba6voj9mOdXALN8bP7MxhVP5
                              TLSH:090523919D24D01ACFCB1A32C6E0AAF51FA93D1DF546350FAB103DDE7AB3016992E1D8
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...2.uY.................d...|.....
                              Icon Hash:185d7c3f1d094720
                              Entrypoint:0x4031f1
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x59759532 [Mon Jul 24 06:35:30 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                              Signature Valid:false
                              Signature Issuer:E=Levnendes@Printstnings.Gum, OU="Berlinsk Absorptively Uncatholicise ", O=Toffy, L=Parbrook, S=England, C=GB
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 5/4/2022 1:03:57 AM 5/3/2025 1:03:57 AM
                              Subject Chain
                              • E=Levnendes@Printstnings.Gum, OU="Berlinsk Absorptively Uncatholicise ", O=Toffy, L=Parbrook, S=England, C=GB
                              Version:3
                              Thumbprint MD5:56C9BA7DFEC92471D18B65DEBADFD264
                              Thumbprint SHA-1:791103B8F445F30749CC09454489D8932043151F
                              Thumbprint SHA-256:12660D9C667AA56EF5F4D3C7A46C00BBF32786E1EDB7C6D1BB2EFDC10DDE5337
                              Serial:292387F23D7D31A4C4A61C828EB508755809B6A4
                              Instruction
                              sub esp, 00000184h
                              push ebx
                              push esi
                              push edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+18h], ebx
                              mov dword ptr [esp+10h], 0040A198h
                              mov dword ptr [esp+20h], ebx
                              mov byte ptr [esp+14h], 00000020h
                              call dword ptr [004080A0h]
                              call dword ptr [0040809Ch]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [0042F40Ch], eax
                              je 00007F8F7CA0DE63h
                              push ebx
                              call 00007F8F7CA10F1Ah
                              cmp eax, ebx
                              je 00007F8F7CA0DE59h
                              push 00000C00h
                              call eax
                              mov esi, 00408298h
                              push esi
                              call 00007F8F7CA10E96h
                              push esi
                              call dword ptr [00408098h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], bl
                              jne 00007F8F7CA0DE3Dh
                              push 0000000Ah
                              call 00007F8F7CA10EEEh
                              push 00000008h
                              call 00007F8F7CA10EE7h
                              push 00000006h
                              mov dword ptr [0042F404h], eax
                              call 00007F8F7CA10EDBh
                              cmp eax, ebx
                              je 00007F8F7CA0DE61h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007F8F7CA0DE59h
                              or byte ptr [0042F40Fh], 00000040h
                              push ebp
                              call dword ptr [00408044h]
                              push ebx
                              call dword ptr [00408288h]
                              mov dword ptr [0042F4D8h], eax
                              push ebx
                              lea eax, dword ptr [esp+38h]
                              push 00000160h
                              push eax
                              push ebx
                              push 00429830h
                              call dword ptr [00408178h]
                              push 0040A188h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85340xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x219c8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xd02c00x2228
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x62540x6400False0.6676171875data6.4338643172916266IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x13540x1400False0.4599609375data5.236269898436511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x255180x600False0.4557291666666667data4.044625496015545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x300000x110000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x410000x219c80x21a00False0.8901312732342007data7.609648735329348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x414180x1224fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                              RT_ICON0x536680x6259PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States
                              RT_ICON0x598c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
                              RT_ICON0x5be700x2466PNG image data, 256 x 256, 4-bit colormap, non-interlacedEnglishUnited States
                              RT_ICON0x5e2d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
                              RT_ICON0x5f3800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States
                              RT_ICON0x602280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States
                              RT_ICON0x60ad00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States
                              RT_ICON0x611380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States
                              RT_ICON0x616a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
                              RT_ICON0x61b080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States
                              RT_ICON0x61df00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States
                              RT_DIALOG0x61f180x120dataEnglishUnited States
                              RT_DIALOG0x620380x11cdataEnglishUnited States
                              RT_DIALOG0x621580xc4dataEnglishUnited States
                              RT_DIALOG0x622200x60dataEnglishUnited States
                              RT_GROUP_ICON0x622800xaedataEnglishUnited States
                              RT_VERSION0x623300x354dataEnglishUnited States
                              RT_MANIFEST0x626880x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                              DLLImport
                              KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                              USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
                              No statistics
                              Target ID:0
                              Start time:14:21:38
                              Start date:17/03/2023
                              Path:C:\Users\user\Desktop\invoice.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\invoice.exe
                              Imagebase:0x400000
                              File size:861416 bytes
                              MD5 hash:F111934675C34CCA18D9D76FC34A2E40
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              No disassembly