Windows
Analysis Report
SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen2.17733.19589.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen2.17733.19589.exe (PID: 6892 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.T rojan.TR.C rypt.XPACK .Gen2.1773 3.19589.ex e MD5: 5EFD09E264D82EF4620C4F7B0A85ABF6) WerFault.exe (PID: 6976 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 892 -s 212 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process created: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_00401000 |
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | 1 Input Capture | 21 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
21% | ReversingLabs | |||
23% | Virustotal | Browse | ||
100% | Avira | TR/Crypt.XPACK.Gen2 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1267260 |
Start date and time: | 2023-07-05 15:16:45 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen2.17733.19589.exe |
Detection: | MAL |
Classification: | mal60.winEXE@2/6@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): WerFault.exe, s vchost.exe - Excluded IPs from analysis (wh
itelisted): 20.189.173.22 - Excluded domains from analysis
(whitelisted): login.live.com , blobcollector.events.data.tr afficmanager.net, onedsblobprd wus17.westus.cloudapp.azure.co m, ctldl.windowsupdate.com, wa tson.telemetry.microsoft.com
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.6801966530099174 |
Encrypted: | false |
SSDEEP: | 192:v6Un7Rc2kHBUZMXLtajE/u7sIS274It6oC:iUn7Rc2sBUZMXLtajE/u7sIX4It6oC |
MD5: | 926846D496661963A2360A2453637A01 |
SHA1: | 04AE83883537ADDA269C90ED0AE6D39984BF6C63 |
SHA-256: | A25AEA39A4B659D1216C19E98D54D32D8D864E7225105F6806CC29D26A69FF18 |
SHA-512: | 5F0F94573E710AA97B1D6B240619D5DCDFE4249F3C85D9C9EFCF521EC9E1C94580B2FA95BCFE1623EF0677BF2F6642DA6CD8CE473AD551DE3C364E9111B028BC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18046 |
Entropy (8bit): | 2.192081923839058 |
Encrypted: | false |
SSDEEP: | 96:5P8i/8qGYJOsxS0NleGi7kOeU7REdlOKeWInWIf4IQ+U45:2iPUs8IeGOdV9OsKH+U4 |
MD5: | 7E38118F4A7A7D08806B92C36AB1E784 |
SHA1: | D421C0E78DC3991359F7E3F7C5C696F995119DEF |
SHA-256: | 9AEAB7529A398B579C37158A5CA5DADE2DBD3400C961BEA8E3F3CBC8F2FCEA33 |
SHA-512: | A9BE41DB36F2F4DF753D17204EEC1C795389723CBA4EF8AFE2149B752D55927F4DCFFFF687F5DD570793092FBEA2C901A400D587F6BCDA5CDC9E0146BFD8DAF1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8500 |
Entropy (8bit): | 3.711344419296894 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiTh+6J6YeknSU7gmf9JHSf+prv89bKYsfWum:RrlsNiTY6J6Y/nSU7gmf95SDKLfG |
MD5: | 5AB9B85CC2559768EB900A6A395D0FA5 |
SHA1: | 95DBA7766C70E5CE515FE065B72A66B5DAD008D8 |
SHA-256: | 9BAA0D346FE634C75AD8E6F69DF2BA45DB1050DD8302A17245DDC0E8F97B0953 |
SHA-512: | B12E23D31EE2AF5321840A4C8F46F9EF3E1A62F90E42CABFA0D3253AB1312E9828A79177C4C7DB1D2C352A39D806AFFB9DD160402D737ED5C95B48351F2DABFF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4828 |
Entropy (8bit): | 4.610678478939415 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zs3JgtWI9kaWgc8sqYj5ys8fm8M4JsAabzZF39+q8zOrzcUtLT+0Tjd:uITfZvbgrsqYIRJ+zhxzcI+2jd |
MD5: | D0D2F37B3458DE9B6182C406D28F4BDB |
SHA1: | 45A41CD38E995B305FEF19A3996B31EECAF0936A |
SHA-256: | 45D9745D96FCD29EF487CF08BABA5011F059C56ED4F04F5D7A8C7AB312CFDA0A |
SHA-512: | 1029157DE4A2E848DDE4E9AD232BE16648E333833ECD732B1E5987E0B592D73AB996F64ED5E04E75711BE44B3F5CFC0E840AA64E35BAFE729CC5AD09B77FF524 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1572864 |
Entropy (8bit): | 4.308286156310566 |
Encrypted: | false |
SSDEEP: | 12288:MN01CIqWGYnJyDcf049RrV+xFxAccptUjCdEwsLH+O8zGEzwcC:O01CIqWGYnQDcfXCFw |
MD5: | 8692F417315955AEBDC6A63FC4B73690 |
SHA1: | D3566F3E71DD36A168BD9BB181507EABED7561D2 |
SHA-256: | 1B603AA8C6A8423ACA0149FB334F210C4B6DE13A1E389371730F8DD7D90710CB |
SHA-512: | 8BE5AEEDCD113082E4ED36F481FFB3CA48B1EC1A9D7F652EB29A85A4C26781E5FD878A85F10166A96E33D96E96AE6F4DA445B87B85F7C66480216529CE7E9465 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24576 |
Entropy (8bit): | 3.922611466074455 |
Encrypted: | false |
SSDEEP: | 384:yzLgq225K5ljaMygnVVeeDzeW1NKZtjOexFa1FsoSwXfhaYiXqfR/DWwsfWedXTE:6XKQg/eeDzeYNYtjnHansoSwZaYiXqff |
MD5: | 628C81B6865E3B4A4BE21A816FF83E19 |
SHA1: | 89C81A97282F948BEA187920EEBA314CA13BC9C8 |
SHA-256: | 2054D8FB31C2A4CBB5F2C5A83221444337E1D78061E4FF59741A38A4EE033966 |
SHA-512: | 508CD5AEDA449F3224B74B53BCDACB55233F1D69C5FB9EBFACDF0362339A771D073B55FCF19A9900D525D35CE9E04126CB8FAD94EE14B6CF9C603D6290B1212E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.267588745689266 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen2.17733.19589.exe |
File size: | 1'744'896 bytes |
MD5: | 5efd09e264d82ef4620c4f7b0a85abf6 |
SHA1: | 3d9ea5fe3da30fac9f4f7d98f6c383d66e3d44fc |
SHA256: | 2159fc4f158d8ee0c5887e542c992f715c61fb40c5a3688e02a679f56899a8cf |
SHA512: | b3ae460bda11991d87e046923ec92c63b308f1b786467ecba29edd4f40493c4ee29eb9a8106937d1ecb0563cac064a6f23879c5e3a04e08b2fa84d0d97690ba8 |
SSDEEP: | 49152:IOPD1g2+jLbFHbas9oQDMqq4db9IvxNpZhLSa4LYl:XZOHxbasjMqq4db9Iv1ZhLSa40l |
TLSH: | D285BF1C7322D0BAEDCB39B82E444DC5A8C8EC1DDD3564602A5A2E4F79F4B39560A377 |
File Content Preview: | MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM.....................\............. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x401000 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
push 00000000h |
call 00007F06A08AE585h |
mov dword ptr [00403330h], eax |
push dword ptr [00403330h] |
call 00007F06567FE585h |
push eax |
call 00007F069A8AE585h |
call 00007F05B88AE585h |
push ebp |
mov ebp, esp |
add esp, FFFFFFB4h |
mov dword ptr [ebp-30h], 00000030h |
mov dword ptr [ebp-2Ch], 00000003h |
mov dword ptr [ebp-28h], 0040120Bh |
mov dword ptr [ebp-24h], 00000000h |
mov dword ptr [ebp-20h], 0000001Eh |
push dword ptr [ebp+08h] |
pop dword ptr [ebp-1Ch] |
mov dword ptr [ebp-10h], 00000010h |
mov dword ptr [ebp-0Ch], 00000000h |
mov dword ptr [ebp-08h], 00403222h |
push 000001F4h |
push dword ptr [ebp+08h] |
call 00007F06408AE585h |
mov dword ptr [ebp-18h], eax |
mov dword ptr [ebp-04h], eax |
push 00007F00h |
push 00000000h |
call 00007F063A8AE585h |
mov dword ptr [ebp-14h], eax |
lea eax, dword ptr [ebp-30h] |
push eax |
call 00007F064C8AE585h |
push 0004000Dh |
push dword ptr [00403330h] |
push 00001B64h |
call 00007F05BE8AE585h |
push 00000001h |
push 00000000h |
push 00000000h |
push 00403217h |
push dword ptr [00403330h] |
call 00007F05F289E585h |
mov dword ptr [00403334h], eax |
push 00000001h |
push dword ptr [00403334h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x20b0 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4000 | 0x1a5030 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0xa8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1000 | 0x1000 | False | 0.3134765625 | data | 4.155869112895119 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2000 | 0x1000 | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x3000 | 0x1000 | 0x1000 | False | 0.119384765625 | data | 1.4023279082966735 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4000 | 0x1a6000 | 0x1a6000 | False | 0.6541823256072274 | data | 7.28217295288949 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:17:47 |
Start date: | 05/07/2023 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.Crypt.XPACK.Gen2.17733.19589.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'744'896 bytes |
MD5 hash: | 5EFD09E264D82EF4620C4F7B0A85ABF6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 3 |
Start time: | 15:17:48 |
Start date: | 05/07/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1070000 |
File size: | 434'592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 100% |
Total number of Nodes: | 2 |
Total number of Limit Nodes: | 0 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |