Edit tour

Windows Analysis Report
SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe

Overview

General Information

Sample name:SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
Analysis ID:1361567
MD5:d0247b698b14deb493d8cc4e797ab7d0
SHA1:db826dae8d96260375dd41a2469d130ab5fa5708
SHA256:cc2665ffd1bc1aecec30b5025eb73428f7921f0aba0b7b25a692f4918de6796e
Tags:exe
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1458067060.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      0.0.SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        There are no malicious signatures, click here to show all signatures.

        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.com
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.com/?register
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.com/?registerS
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.com/forum
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.com/forumS
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: http://www.kcsoftwares.comS
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/Jcl8087.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclAnsiStrings.
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclBase.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclCharsets.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclDateTime.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclFileUtils.pa
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclIniFiles.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclLogic.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMath.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMime.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclRTTI.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclResources.pa
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStreams.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStringConver
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStrings.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSynch.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysInfo.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysUtils.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnicode.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnitVersioni
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclWideStrings.
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclAppInst.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclConsole.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclMiscel.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclRegistry.pa
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclSecurity.pa
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclShell.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclWin32.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeString found in binary or memory: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/Snmp.pas
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000000.1458175643.0000000000567000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename2 vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000000.1458067060.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000000.1458067060.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameT vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeBinary or memory string: OriginalFilenameT vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeBinary or memory string: OriginalFilename2 vs SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: clean1.winEXE@1/1@0/0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeFile created: C:\Users\user\AppData\Roaming\KC Softwares\Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeMutant created: \Sessions\1\BaseNamedObjects\MutexNPA_UnitVersioning_5656
        Source: Yara matchFile source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1458067060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeWindow found: window name: TComboBoxJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeStatic file information: File size 1547776 > 1048576
        Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000002.2717413041.0000000000686000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000002.2717413041.0000000000686000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000002.2717667023.0000000002230000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeBinary or memory string: Shell_TrayWnd
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, 00000000.00000002.2717667023.0000000002230000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager2
        Source: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exeBinary or memory string: Shell_TrayWndTrayNotifyWndSV
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
        Valid AccountsWindows Management InstrumentationPath Interception1
        Process Injection
        1
        Masquerading
        OS Credential Dumping1
        Security Software Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Process Injection
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
        Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
        Local AccountsCronLogin HookLogin HookBinary PaddingNTDS1
        System Information Discovery
        Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 process2 2 Behavior Graph ID: 1361567 Sample: SecuriteInfo.com.TScope.Tro... Startdate: 13/12/2023 Architecture: WINDOWS Score: 1 4 SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe 5 4 2->4         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.kcsoftwares.comS0%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysUtils.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
          high
          https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclLogic.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
            high
            https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMath.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
              high
              https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnicode.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                high
                https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStringConverSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                  high
                  https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclSecurity.paSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                    high
                    https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclAnsiStrings.SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                      high
                      http://www.kcsoftwares.com/?registerSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                        high
                        https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclRTTI.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                          high
                          https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclMiscel.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                            high
                            https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/Jcl8087.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                              high
                              https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStrings.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                high
                                https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStreams.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                  high
                                  https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnitVersioniSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                    high
                                    https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclDateTime.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                      high
                                      https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysInfo.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                        high
                                        https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclRegistry.paSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                          high
                                          https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclCharsets.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                            high
                                            https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclAppInst.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                              high
                                              https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclShell.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                high
                                                http://www.kcsoftwares.com/forumSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                  high
                                                  http://www.kcsoftwares.com/forumSSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                    high
                                                    https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclIniFiles.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                      high
                                                      https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclBase.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                        high
                                                        https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclFileUtils.paSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                          high
                                                          https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMime.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                            high
                                                            http://www.kcsoftwares.com/?registerSSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                              high
                                                              https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclWideStrings.SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                high
                                                                http://www.kcsoftwares.comSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                  high
                                                                  https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSynch.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                    high
                                                                    https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclConsole.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                      high
                                                                      https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/Snmp.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                        high
                                                                        https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclResources.paSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                          high
                                                                          https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclWin32.pasSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                            high
                                                                            http://www.kcsoftwares.comSSecuriteInfo.com.TScope.Trojan.Delf.31343.392.exefalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            No contacted IP infos
                                                                            Joe Sandbox version:38.0.0 Ammolite
                                                                            Analysis ID:1361567
                                                                            Start date and time:2023-12-13 17:29:10 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 4m 15s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:6
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            Detection:CLEAN
                                                                            Classification:clean1.winEXE@1/1@0/0
                                                                            EGA Information:Failed
                                                                            HCA Information:
                                                                            • Successful, ratio: 100%
                                                                            • Number of executed functions: 1
                                                                            • Number of non-executed functions: 0
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Execution Graph export aborted for target SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe, PID 5656 because it is empty
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • VT rate limit hit for: SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            No simulations
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1083
                                                                            Entropy (8bit):5.514319335271087
                                                                            Encrypted:false
                                                                            SSDEEP:24:zbrYeV9LiAYeVuYeVguVmLrZYe6iSRx+C:zbrDjiADUDmuM3ZBCv+C
                                                                            MD5:D2432EF14322CE4DD3BAE963B40E1B83
                                                                            SHA1:5A0692DC1E08DAC8E190D34CB112739D236B2CC5
                                                                            SHA-256:E88E24BD720B86414677A0248C13B5FE5E188B820FE1419899E5DE86D2814CEF
                                                                            SHA-512:7532F5FEA1D255707229C1D2F377B1ABF9D8E06FE79C952872F77EECB01B7D2CA10BD21828914CD7A6D9B51F17A1A96477A0169FABFD3BFDCB6222CE2FD5B584
                                                                            Malicious:false
                                                                            Reputation:low
                                                                            Preview:Info.[23-12-13 17:30:12].CSIDL_HISTORY = C:\Users\user\AppData\Local\Microsoft\Windows\History\..Info.[23-12-13 17:30:12].CSIDL_INTERNET_CACHE = C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\..Info.[23-12-13 17:30:12].CSIDL_COOKIES = C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\..Info.[23-12-13 17:30:12].CSIDL_RECENT = C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\..Info.[23-12-13 17:30:12].CSIDL_PROGRAM_FILES = C:\Program Files (x86)\..Info.[23-12-13 17:30:12].CSIDL_PROFILE = C:\Users\user\..Info.[23-12-13 17:30:12].CSIDL_APPDATA = C:\Users\user\AppData\Roaming\..Info.[23-12-13 17:30:12].CSIDL_LOCAL_APPDATA = C:\Users\user\AppData\Local\..Info.[23-12-13 17:30:12].CSIDL_COMMON_APPDATA = C:\ProgramData\..Info.[23-12-13 17:30:12].CSIDL_WINDOWS = C:\Windows\..Info.[23-12-13 17:30:12].64Bits : Yes..Info.[23-12-13 17:30:12].Windows : 6.2 (Windows8)..Info.[23-12-13 17:30:12].KCleaner v1.2.5.44..Info.[23-12-13 17:30:12].C:\Users\user\Desktop\Sec
                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):5.980603784375396
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 87.62%
                                                                            • Win32 Executable Borland Delphi 7 (665061/41) 5.83%
                                                                            • Win32 Executable Borland Delphi 5 (451725/56) 3.96%
                                                                            • Win32 Executable Borland Delphi 6 (262906/60) 2.30%
                                                                            • Win32 Executable Delphi generic (14689/80) 0.13%
                                                                            File name:SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            File size:1'547'776 bytes
                                                                            MD5:d0247b698b14deb493d8cc4e797ab7d0
                                                                            SHA1:db826dae8d96260375dd41a2469d130ab5fa5708
                                                                            SHA256:cc2665ffd1bc1aecec30b5025eb73428f7921f0aba0b7b25a692f4918de6796e
                                                                            SHA512:1084389956a12fb36034b87e2f621bdc90617139298cc23f107dba856faf4bf13714abb5c7f0dedfabea6f2ae5dbe0218ad0dd61f4f58eb064067e755021280c
                                                                            SSDEEP:24576:oBadkIbL6qZvFL1FPo7BQU7KUYM/shsC0m5I3xXgaIvufnXxGXbL:oBADFM0SCt+Xg98Bq
                                                                            TLSH:18658D12F3D08C37D57615388C6B97985A29BE002E295E4B37E4BE4C5F3A7823D192DB
                                                                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                            Icon Hash:151b379de62c198e
                                                                            Entrypoint:0x4d1530
                                                                            Entrypoint Section:CODE
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                            DLL Characteristics:
                                                                            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:d361831fdbfe7016e0a4a5017defe96a
                                                                            Instruction
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            add esp, FFFFFFF0h
                                                                            push ebx
                                                                            mov eax, 004D1028h
                                                                            call 00007F8ABC77A5B8h
                                                                            mov ebx, dword ptr [004DFC08h]
                                                                            mov eax, dword ptr [ebx]
                                                                            call 00007F8ABC7EC67Fh
                                                                            mov eax, dword ptr [ebx]
                                                                            mov edx, 004D15BCh
                                                                            call 00007F8ABC7EC26Bh
                                                                            mov ecx, dword ptr [004DFD80h]
                                                                            mov eax, dword ptr [ebx]
                                                                            mov edx, dword ptr [004CD858h]
                                                                            call 00007F8ABC7EC678h
                                                                            mov ecx, dword ptr [004DFB68h]
                                                                            mov eax, dword ptr [ebx]
                                                                            mov edx, dword ptr [004C0620h]
                                                                            call 00007F8ABC7EC665h
                                                                            mov ecx, dword ptr [004DFC10h]
                                                                            mov eax, dword ptr [ebx]
                                                                            mov edx, dword ptr [004BF72Ch]
                                                                            call 00007F8ABC7EC652h
                                                                            mov ecx, dword ptr [004DFDE0h]
                                                                            mov eax, dword ptr [ebx]
                                                                            mov edx, dword ptr [004CBF1Ch]
                                                                            call 00007F8ABC7EC63Fh
                                                                            mov eax, dword ptr [ebx]
                                                                            call 00007F8ABC7EC6B8h
                                                                            pop ebx
                                                                            call 00007F8ABC777FD2h
                                                                            add bh, bh
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xe30000x2e8e.idata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf60000x8a600.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xda7c.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0xe70000x18.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            CODE0x10000xd05c80xd0600False0.510140550014997data6.559855882921018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            DATA0xd20000xdf1c0xe000False0.19121442522321427data2.43112121892072IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            BSS0xe00000x2fd90x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .idata0xe30000x2e8e0x3000False0.3518880208333333data4.900666766755118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .tls0xe60000x100x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rdata0xe70000x180x200False0.05078125data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                            .reloc0xe80000xda7c0xdc00False0.5550426136363636data6.642908808487044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xf60000x8a6000x8a600False0.28568731650858176data4.56756109878058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            UNICODEDATA0xf78640x723fdata0.36769583205115053
                                                                            UNICODEDATA0xfeaa40x7ebddata0.42552011095700415
                                                                            UNICODEDATA0x1069640x6a8data0.5985915492957746
                                                                            UNICODEDATA0x10700c0xaf7ddata0.4191430161380078
                                                                            UNICODEDATA0x111f8c0xd3cfdata0.4500857569666009
                                                                            UNICODEDATA0x11f35c0x14c5data0.6482979123565921
                                                                            RT_CURSOR0x1208240x134Targa image data 64 x 65536 x 1 +32 "\001"0.3961038961038961
                                                                            RT_CURSOR0x1209580x134data0.4642857142857143
                                                                            RT_CURSOR0x120a8c0x134data0.4805194805194805
                                                                            RT_CURSOR0x120bc00x134data0.38311688311688313
                                                                            RT_CURSOR0x120cf40x134data0.36038961038961037
                                                                            RT_CURSOR0x120e280x134data0.4090909090909091
                                                                            RT_CURSOR0x120f5c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                                                            RT_CURSOR0x1210900x134Targa image data 64 x 65536 x 1 +32 "\001"0.31493506493506496
                                                                            RT_CURSOR0x1211c40x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                                                            RT_BITMAP0x1212f80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                                                            RT_BITMAP0x1214c80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                                                            RT_BITMAP0x1216ac0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                                                            RT_BITMAP0x12187c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                                                            RT_BITMAP0x121a4c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                                                            RT_BITMAP0x121c1c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                                                            RT_BITMAP0x121dec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                                                            RT_BITMAP0x121fbc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                                            RT_BITMAP0x12218c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                                                            RT_BITMAP0x12235c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                                            RT_BITMAP0x12252c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
                                                                            RT_BITMAP0x1225ec0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
                                                                            RT_BITMAP0x1226cc0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
                                                                            RT_BITMAP0x1227ac0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.38392857142857145
                                                                            RT_BITMAP0x12288c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4947916666666667
                                                                            RT_BITMAP0x12294c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.484375
                                                                            RT_BITMAP0x122a0c0x6e0Device independent bitmap graphic, 180 x 18 x 4, image size 16560.39147727272727273
                                                                            RT_BITMAP0x1230ec0x48Device independent bitmap graphic, 6 x 6 x 1, image size 240.5138888888888888
                                                                            RT_BITMAP0x1231340x40Device independent bitmap graphic, 7 x 4 x 1, image size 160.625
                                                                            RT_BITMAP0x1231740x48Device independent bitmap graphic, 6 x 6 x 1, image size 240.5138888888888888
                                                                            RT_BITMAP0x1231bc0x40Device independent bitmap graphic, 7 x 4 x 1, image size 160.625
                                                                            RT_BITMAP0x1231fc0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42410714285714285
                                                                            RT_BITMAP0x1232dc0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5104166666666666
                                                                            RT_BITMAP0x12339c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.5
                                                                            RT_BITMAP0x12347c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                                                            RT_BITMAP0x1235640xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4895833333333333
                                                                            RT_BITMAP0x1236240xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.3794642857142857
                                                                            RT_ICON0x1237040x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152FrenchFrance0.29573170731707316
                                                                            RT_ICON0x123d6c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512FrenchFrance0.41397849462365593
                                                                            RT_ICON0x1240540x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288FrenchFrance0.48155737704918034
                                                                            RT_ICON0x12423c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128FrenchFrance0.527027027027027
                                                                            RT_ICON0x1243640xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsFrenchFrance0.5269189765458422
                                                                            RT_ICON0x12520c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsFrenchFrance0.6611010830324909
                                                                            RT_ICON0x125ab40x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsFrenchFrance0.597926267281106
                                                                            RT_ICON0x12617c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsFrenchFrance0.23771676300578035
                                                                            RT_ICON0x1266e40x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336FrenchFrance0.17579223007959285
                                                                            RT_ICON0x16870c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600FrenchFrance0.36566390041493774
                                                                            RT_ICON0x16acb40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224FrenchFrance0.45098499061913694
                                                                            RT_ICON0x16bd5c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400FrenchFrance0.48360655737704916
                                                                            RT_ICON0x16c6e40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088FrenchFrance0.28191489361702127
                                                                            RT_DIALOG0x16cb4c0x52data0.7682926829268293
                                                                            RT_STRING0x16cba00x364data0.43202764976958524
                                                                            RT_STRING0x16cf040x6f0data0.20551801801801803
                                                                            RT_STRING0x16d5f40x888data0.13782051282051283
                                                                            RT_STRING0x16de7c0x8acdata0.1346846846846847
                                                                            RT_STRING0x16e7280x7f0data0.15649606299212598
                                                                            RT_STRING0x16ef180x8a0data0.14130434782608695
                                                                            RT_STRING0x16f7b80xa6cdata0.10644677661169415
                                                                            RT_STRING0x1702240x6d4data0.20995423340961097
                                                                            RT_STRING0x1708f80x2c4data0.3870056497175141
                                                                            RT_STRING0x170bbc0x270data0.3301282051282051
                                                                            RT_STRING0x170e2c0x13cdata0.5316455696202531
                                                                            RT_STRING0x170f680x15cdata0.47126436781609193
                                                                            RT_STRING0x1710c40x104data0.5769230769230769
                                                                            RT_STRING0x1711c80x398data0.42717391304347824
                                                                            RT_STRING0x1715600x274data0.46337579617834396
                                                                            RT_STRING0x1717d40x240data0.3454861111111111
                                                                            RT_STRING0x171a140x120data0.5659722222222222
                                                                            RT_STRING0x171b340x4acdata0.391304347826087
                                                                            RT_STRING0x171fe00x21cdata0.46111111111111114
                                                                            RT_STRING0x1721fc0x12cdata0.5433333333333333
                                                                            RT_STRING0x1723280x234data0.46099290780141844
                                                                            RT_STRING0x17255c0x344data0.4354066985645933
                                                                            RT_STRING0x1728a00x568data0.3309248554913295
                                                                            RT_STRING0x172e080x400data0.380859375
                                                                            RT_STRING0x1732080x484data0.31141868512110726
                                                                            RT_STRING0x17368c0x418data0.3883587786259542
                                                                            RT_STRING0x173aa40xe4data0.5570175438596491
                                                                            RT_STRING0x173b880xb8data0.5706521739130435
                                                                            RT_STRING0x173c400x374data0.4117647058823529
                                                                            RT_STRING0x173fb40x574data0.28868194842406875
                                                                            RT_STRING0x1745280x470data0.35475352112676056
                                                                            RT_STRING0x1749980x3c8data0.37086776859504134
                                                                            RT_RCDATA0x174d600x10data1.5
                                                                            RT_RCDATA0x174d700x784data0.6200623700623701
                                                                            RT_RCDATA0x1754f40x3fe6Delphi compiled form 'TAboutDlg'0.47083995598483924
                                                                            RT_RCDATA0x1794dc0x4c09Delphi compiled form 'TMainDlg'0.35299255073208324
                                                                            RT_RCDATA0x17e0e80x4daDelphi compiled form 'TRegDlg'0.5499194847020934
                                                                            RT_RCDATA0x17e5c40x1816Delphi compiled form 'TSettingsDlg'0.3227375932533247
                                                                            RT_GROUP_CURSOR0x17fddc0x14Lotus unknown worksheet or configuration, revision 0x11.25
                                                                            RT_GROUP_CURSOR0x17fdf00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe040x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe180x14Lotus unknown worksheet or configuration, revision 0x11.25
                                                                            RT_GROUP_CURSOR0x17fe2c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe400x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe540x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe680x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_CURSOR0x17fe7c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                                            RT_GROUP_ICON0x17fe900xbcdataFrenchFrance0.5904255319148937
                                                                            RT_VERSION0x17ff4c0x2c0dataFrenchFrance0.4602272727272727
                                                                            RT_MANIFEST0x18020c0x245XML 1.0 document, ASCII text, with CRLF line terminators0.5249569707401033
                                                                            DLLImport
                                                                            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                                                            user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                                                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                            oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                            kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                            advapi32.dllSetSecurityDescriptorSacl, SetSecurityDescriptorOwner, SetSecurityDescriptorGroup, SetSecurityDescriptorDacl, RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegDeleteValueA, RegCreateKeyExA, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueA, LookupAccountSidW, IsValidSid, InitializeSecurityDescriptor, InitializeAcl, GetTokenInformation, GetSidSubAuthorityCount, GetSidSubAuthority, GetSidIdentifierAuthority, GetLengthSid, FreeSid, AllocateAndInitializeSid, AdjustTokenPrivileges, AddAccessAllowedAce
                                                                            kernel32.dlllstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, VerLanguageNameA, UnmapViewOfFile, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryA, ReleaseMutex, ReadFile, OpenFileMappingA, MultiByteToWideChar, MulDiv, MoveFileExA, MoveFileA, MapViewOfFile, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesExW, GetFileAttributesA, GetExitCodeThread, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileW, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryW, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle, Beep
                                                                            version.dllVerQueryValueA, GetFileVersionInfoSizeW, GetFileVersionInfoSizeA, GetFileVersionInfoW, GetFileVersionInfoA
                                                                            gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetNearestColor, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                                                            user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendNotifyMessageA, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostThreadMessageA, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRgn, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DrawAnimatedRects, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, AttachThreadInput, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                            kernel32.dllSleep
                                                                            oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                                            ole32.dllOleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize
                                                                            oleaut32.dllGetErrorInfo, SysFreeString
                                                                            comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_LoadImageA, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                                                            shell32.dllShell_NotifyIconA, ShellExecuteExA, ShellExecuteA
                                                                            wininet.dllFindNextUrlCacheEntryExA, FindFirstUrlCacheEntryExA, FindCloseUrlCache, DeleteUrlCacheEntry
                                                                            shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA
                                                                            kernel32.dllGetVersionExA, CreateMutexA
                                                                            shell32.dllSHEmptyRecycleBinA, SHQueryRecycleBinA
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            FrenchFrance
                                                                            No network behavior found

                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            • File
                                                                            • Registry

                                                                            Click to dive into process behavior distribution

                                                                            Target ID:0
                                                                            Start time:17:30:11
                                                                            Start date:13/12/2023
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
                                                                            Imagebase:0x400000
                                                                            File size:1'547'776 bytes
                                                                            MD5 hash:D0247B698B14DEB493D8CC4E797AB7D0
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:Borland Delphi
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1458067060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                            Reputation:low
                                                                            Has exited:false
                                                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                            Executed Functions

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2717279617.0000000000455000.00000020.00000001.01000000.00000003.sdmp, Offset: 00455000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_455000_SecuriteInfo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de13a59cd454c34a8b1c18102be8ad69c0152a419b23f2b8b62810e2790b4366
                                                                            • Instruction ID: 02cb68867bed69d201cb327df44387d6ec5e6f462c6b7b455b862e0dce3096f5
                                                                            • Opcode Fuzzy Hash: de13a59cd454c34a8b1c18102be8ad69c0152a419b23f2b8b62810e2790b4366
                                                                            • Instruction Fuzzy Hash: 61111976904148BFDB00DF99DC84EAA37B8AB18354F108226FD14DB2A1D778E940DBA9
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%