Windows
Analysis Report
SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.24282.9873.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.24282.9873.exe (PID: 6740 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.T rojan.TR.C rypt.XPACK .Gen.24282 .9873.exe MD5: 276DA269917B96163DA34A47C9115BFF) conhost.exe (PID: 6848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) WerFault.exe (PID: 6964 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 740 -s 244 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process created: |
Source: | Static PE information: |
Source: | ReversingLabs: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Code function: | 0_2_00405FDE |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_00402848 |
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | 1 Input Capture | 21 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
19% | ReversingLabs | |||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1266034 |
Start date and time: | 2023-07-03 17:48:40 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.24282.9873.exe |
Detection: | MAL |
Classification: | mal60.winEXE@3/6@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W erFault.exe, WMIADAP.exe, conh ost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 20.189.173.20 - Excluded domains from analysis
(whitelisted): login.live.com , blobcollector.events.data.tr afficmanager.net, onedsblobprd wus15.westus.cloudapp.azure.co m, ctldl.windowsupdate.com, wa tson.telemetry.microsoft.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.6802638759969519 |
Encrypted: | false |
SSDEEP: | 384:EeLPLOQfgBUZMXUCWjE/u7suX4It6j+Y:EfBUiIjE/u7suX4It |
MD5: | DE88D30114D9C8B503D0A7892F5B7C3B |
SHA1: | 02232BB81A5DDECFD9C27AB414718201325108C8 |
SHA-256: | A55A85D4D30B8BCACBD00C203A59C8C02EE013BC386098C8447E75AC02B652C2 |
SHA-512: | 9AEEEC4C32FB8D9956C93ECD72D452A12B0688567010F254E259ACEC287FE0CDC4615D57FB93187C9840277C031EDD9836D5E08C0A72BCCA2CE80618707915DA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18332 |
Entropy (8bit): | 2.2077851926261602 |
Encrypted: | false |
SSDEEP: | 96:5Y8iYQ88D/JARrizF7Lai7k3n/C+Jt+v9pthSXRIAWInWIH3KAI3+j41ny/:9i/JW2Z7LaOM/Cst+vJhMRzK3+E1ny/ |
MD5: | B6215FFA7DE2417659B39FF189EB5A8F |
SHA1: | 31C290E3EC0229E3EF2B20FC0503B69B5E2B421C |
SHA-256: | 8D78981933D9275843C0C731CE3E4C4AE6E66FFFCD772906912AFA08703E8A58 |
SHA-512: | 19787A3073611324FDF1D7E0D9888E4D685707750EC1A8C2A050C106A7FF0F7F2DAF81A68CB44BC9605369AF0EDC9449202D1DAE99D0F3F22253CD4745ACF562 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8482 |
Entropy (8bit): | 3.711545260872399 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNi7dw6C6YAkSUgRgmf9dXS4Cpr+89boAsfsYm:RrlsNi766C6YTSU8gmf99SXoTfy |
MD5: | B59C04E4888A6DD6EC5B165518C267E2 |
SHA1: | F8947A0AC7BB7C3149B202ED4560529A1509B3AD |
SHA-256: | 5ED746C51CBDE20AEF99A439030014F8EF054B0BCED97F3F9AC341B7989A1A28 |
SHA-512: | 5E56EAAA0ED33691D80DACA2FED885F30B3133E163101E187C746AA78C1171FD35A15632A4D7EA76E78F468344A272028E2EA0D88CC915582EB973688D005797 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4822 |
Entropy (8bit): | 4.6110034555903825 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zspJgtWI9U/SWgc8sqYjg8fm8M4JIvZFnTk+q8cfWFVKJ+7jd:uITf7v/zgrsqYxJuMrWFm+7jd |
MD5: | 32EAAE87FE5577A89D80A34FBE42B49B |
SHA1: | 83CBB6278DDE12A6BA95A2F07580DD776D2842D5 |
SHA-256: | F8C0DEFFA82CD11E69B1198D388CCF5980A1BD924C11C4945D7DE01A8F444FDF |
SHA-512: | F6A2D2D988709701FE1650B508D577F7FB9CC2D3BE74105DAD69B77F12C6A09ADAF1C9068CC83EABC097FC4FE2E7AACDD3540705FE90B0429F9BE07EBA869E73 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1572864 |
Entropy (8bit): | 4.281869795510021 |
Encrypted: | false |
SSDEEP: | 12288:w6CTjgaAq08hFIOV3UHsJbHAXK98Zi6oF+fVzk8Q9kZdwwSOop:FijgaAq08hFIOVBhV9G |
MD5: | 17F129F8E6DE00C25CD528E0D16BC168 |
SHA1: | F6569C058D6C356C678E1F3221EE22E9B168991D |
SHA-256: | F7641787D38AE7BD7D458E49407DE490D0D6B40DBE95765A835769AA0AD61E98 |
SHA-512: | 42B1AD644C39218A3AAD4CAB397A5AECFD9EC2D85DA0B3F37A0DFF8F1B3D9F3B25782CB65D4EF09A104F50B465465578C0D9478E16F32CF640EBC16BE9A0C63F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24576 |
Entropy (8bit): | 3.87856479442937 |
Encrypted: | false |
SSDEEP: | 384:0+c53E0xxkIRu3svSRnc9SaPJSptQqg6XadgQYzZK/Ec05jYwq3:5q3Lxkku3qSRcSaPcptQq/XadgZK/4j8 |
MD5: | 7FEB9C560789913B1DA4D98C092567C3 |
SHA1: | E276451B355F9FD6A730C501E4F6A92FBDFDDE93 |
SHA-256: | 2C492747D011D32814EB4E343C1E8C11B96547A3E6C5F95EF4794F6C47DEABFA |
SHA-512: | 9EA328F57519E79BEDFAF7589D4BDE2F9A77716B30CC4B0B211C8E7919830AE40DCA86F8A9D9F6A2B247EB299F890C0421DEAB7176CD8CF7D06C6D7D8AC82B85 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 4.669136828130387 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.24282.9873.exe |
File size: | 32'768 bytes |
MD5: | 276da269917b96163da34a47c9115bff |
SHA1: | cbdcc8e312e55b70debca799abf3a75e56d7b595 |
SHA256: | 531230ec5fe046bb3a79cf89bf840a8db6978f356a793292149e1f7774f1bb94 |
SHA512: | be34bf3abf26315ee058c088e77bbe0c5b158c650367a18c9421ba858c063808f9965260ad2835e59659e9a263f38ed79bc968ae91fc899fe147b3c1bdf7a739 |
SSDEEP: | 192:EE93UvKgUC0RQ3z52bT0gaySzw2PAtu+hSn2InP0iSrhMDmaa4y+mZBdZDjk9ZwZ:Gvj0C5QT0/ySzHDCQ8hky+mlp0ba |
TLSH: | 3DE26C1BBCD14073E981C6B012B2DB1AD77F6A150352AE83DB046A5A2F31DE17D3B25B |
File Content Preview: | MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM.................l..........H(..... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x402848 |
Entrypoint Section: | .section |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00401D50h |
push 00404124h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 10h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
call dword ptr [00401038h] |
xor edx, edx |
mov dl, ah |
mov dword ptr [00406264h], edx |
mov ecx, eax |
and ecx, 000000FFh |
mov dword ptr [00406260h], ecx |
shl ecx, 08h |
add ecx, edx |
mov dword ptr [0040625Ch], ecx |
shr eax, 10h |
mov dword ptr [00406258h], eax |
push 00000000h |
call 00007F0CCCAB6CCFh |
pop ecx |
test eax, eax |
jne 00007F0CCCAB558Ah |
push 0000001Ch |
call 00007F0CCCAB561Fh |
pop ecx |
and dword ptr [ebp-04h], 00000000h |
call 00007F0CCCAB5FA7h |
call dword ptr [00401034h] |
mov dword ptr [00406744h], eax |
call 00007F0CCCAB6B77h |
mov dword ptr [00406238h], eax |
call 00007F0CCCAB6920h |
call 00007F0CCCAB6862h |
call 00007F0CCCAB641Ah |
mov eax, dword ptr [00406274h] |
mov dword ptr [00406278h], eax |
push eax |
push dword ptr [0040626Ch] |
push dword ptr [00406268h] |
call 00007F0CCCAB4E99h |
add esp, 0Ch |
mov dword ptr [ebp-1Ch], eax |
push eax |
call 00007F0CCCAB641Fh |
mov eax, dword ptr [ebp-14h] |
mov ecx, dword ptr [eax] |
mov ecx, dword ptr [ecx] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x7764 | 0x50 | .section |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0xd0 | .section |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.section | 0x1000 | 0x7000 | 0x7000 | False | 0.4290248325892857 | data | 5.118772479333782 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:49:41 |
Start date: | 03/07/2023 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen.24282.9873.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 32'768 bytes |
MD5 hash: | 276DA269917B96163DA34A47C9115BFF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 1 |
Start time: | 17:49:41 |
Start date: | 03/07/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6edaf0000 |
File size: | 625'664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 4 |
Start time: | 17:49:42 |
Start date: | 03/07/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x900000 |
File size: | 434'592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 0.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 100% |
Total number of Nodes: | 2 |
Total number of Limit Nodes: | 0 |
Graph
Callgraph
Control-flow Graph
C-Code - Quality: 65% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |