Windows
Analysis Report
SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe (PID: 5656 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.T Scope.Troj an.Delf.31 343.392.ex e MD5: D0247B698B14DEB493D8CC4E797AB7D0)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | Protocol Impersonation | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1361567 |
Start date and time: | 2023-12-13 17:29:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe |
Detection: | CLEAN |
Classification: | clean1.winEXE@1/1@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WMIADAP.exe, SIHCl ient.exe, conhost.exe - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, slscr.update.microsoft.co m, ctldl.windowsupdate.com, fe 3cr.delivery.mp.microsoft.com - Execution Graph export aborted
for target SecuriteInfo.com.T Scope.Trojan.Delf.31343.392.ex e, PID 5656 because it is empt y - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: Securi
teInfo.com.TScope.Trojan.Delf. 31343.392.exe
Process: | C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1083 |
Entropy (8bit): | 5.514319335271087 |
Encrypted: | false |
SSDEEP: | 24:zbrYeV9LiAYeVuYeVguVmLrZYe6iSRx+C:zbrDjiADUDmuM3ZBCv+C |
MD5: | D2432EF14322CE4DD3BAE963B40E1B83 |
SHA1: | 5A0692DC1E08DAC8E190D34CB112739D236B2CC5 |
SHA-256: | E88E24BD720B86414677A0248C13B5FE5E188B820FE1419899E5DE86D2814CEF |
SHA-512: | 7532F5FEA1D255707229C1D2F377B1ABF9D8E06FE79C952872F77EECB01B7D2CA10BD21828914CD7A6D9B51F17A1A96477A0169FABFD3BFDCB6222CE2FD5B584 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.980603784375396 |
TrID: |
|
File name: | SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe |
File size: | 1'547'776 bytes |
MD5: | d0247b698b14deb493d8cc4e797ab7d0 |
SHA1: | db826dae8d96260375dd41a2469d130ab5fa5708 |
SHA256: | cc2665ffd1bc1aecec30b5025eb73428f7921f0aba0b7b25a692f4918de6796e |
SHA512: | 1084389956a12fb36034b87e2f621bdc90617139298cc23f107dba856faf4bf13714abb5c7f0dedfabea6f2ae5dbe0218ad0dd61f4f58eb064067e755021280c |
SSDEEP: | 24576:oBadkIbL6qZvFL1FPo7BQU7KUYM/shsC0m5I3xXgaIvufnXxGXbL:oBADFM0SCt+Xg98Bq |
TLSH: | 18658D12F3D08C37D57615388C6B97985A29BE002E295E4B37E4BE4C5F3A7823D192DB |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 151b379de62c198e |
Entrypoint: | 0x4d1530 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | d361831fdbfe7016e0a4a5017defe96a |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
mov eax, 004D1028h |
call 00007F8ABC77A5B8h |
mov ebx, dword ptr [004DFC08h] |
mov eax, dword ptr [ebx] |
call 00007F8ABC7EC67Fh |
mov eax, dword ptr [ebx] |
mov edx, 004D15BCh |
call 00007F8ABC7EC26Bh |
mov ecx, dword ptr [004DFD80h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [004CD858h] |
call 00007F8ABC7EC678h |
mov ecx, dword ptr [004DFB68h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [004C0620h] |
call 00007F8ABC7EC665h |
mov ecx, dword ptr [004DFC10h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [004BF72Ch] |
call 00007F8ABC7EC652h |
mov ecx, dword ptr [004DFDE0h] |
mov eax, dword ptr [ebx] |
mov edx, dword ptr [004CBF1Ch] |
call 00007F8ABC7EC63Fh |
mov eax, dword ptr [ebx] |
call 00007F8ABC7EC6B8h |
pop ebx |
call 00007F8ABC777FD2h |
add bh, bh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xe3000 | 0x2e8e | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf6000 | 0x8a600 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe8000 | 0xda7c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xe7000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0xd05c8 | 0xd0600 | False | 0.510140550014997 | data | 6.559855882921018 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0xd2000 | 0xdf1c | 0xe000 | False | 0.19121442522321427 | data | 2.43112121892072 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0xe0000 | 0x2fd9 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xe3000 | 0x2e8e | 0x3000 | False | 0.3518880208333333 | data | 4.900666766755118 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xe6000 | 0x10 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xe7000 | 0x18 | 0x200 | False | 0.05078125 | data | 0.2069200177871819 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0xe8000 | 0xda7c | 0xdc00 | False | 0.5550426136363636 | data | 6.642908808487044 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0xf6000 | 0x8a600 | 0x8a600 | False | 0.28568731650858176 | data | 4.56756109878058 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
UNICODEDATA | 0xf7864 | 0x723f | data | 0.36769583205115053 | ||
UNICODEDATA | 0xfeaa4 | 0x7ebd | data | 0.42552011095700415 | ||
UNICODEDATA | 0x106964 | 0x6a8 | data | 0.5985915492957746 | ||
UNICODEDATA | 0x10700c | 0xaf7d | data | 0.4191430161380078 | ||
UNICODEDATA | 0x111f8c | 0xd3cf | data | 0.4500857569666009 | ||
UNICODEDATA | 0x11f35c | 0x14c5 | data | 0.6482979123565921 | ||
RT_CURSOR | 0x120824 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | 0.3961038961038961 | ||
RT_CURSOR | 0x120958 | 0x134 | data | 0.4642857142857143 | ||
RT_CURSOR | 0x120a8c | 0x134 | data | 0.4805194805194805 | ||
RT_CURSOR | 0x120bc0 | 0x134 | data | 0.38311688311688313 | ||
RT_CURSOR | 0x120cf4 | 0x134 | data | 0.36038961038961037 | ||
RT_CURSOR | 0x120e28 | 0x134 | data | 0.4090909090909091 | ||
RT_CURSOR | 0x120f5c | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | 0.4967532467532468 | ||
RT_CURSOR | 0x121090 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | 0.31493506493506496 | ||
RT_CURSOR | 0x1211c4 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | 0.38636363636363635 | ||
RT_BITMAP | 0x1212f8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x1214c8 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | 0.46487603305785125 | ||
RT_BITMAP | 0x1216ac | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x12187c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39870689655172414 | ||
RT_BITMAP | 0x121a4c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.4245689655172414 | ||
RT_BITMAP | 0x121c1c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5021551724137931 | ||
RT_BITMAP | 0x121dec | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5064655172413793 | ||
RT_BITMAP | 0x121fbc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x12218c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5344827586206896 | ||
RT_BITMAP | 0x12235c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x12252c | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.5208333333333334 | ||
RT_BITMAP | 0x1225ec | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.42857142857142855 | ||
RT_BITMAP | 0x1226cc | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.4955357142857143 | ||
RT_BITMAP | 0x1227ac | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.38392857142857145 | ||
RT_BITMAP | 0x12288c | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.4947916666666667 | ||
RT_BITMAP | 0x12294c | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.484375 | ||
RT_BITMAP | 0x122a0c | 0x6e0 | Device independent bitmap graphic, 180 x 18 x 4, image size 1656 | 0.39147727272727273 | ||
RT_BITMAP | 0x1230ec | 0x48 | Device independent bitmap graphic, 6 x 6 x 1, image size 24 | 0.5138888888888888 | ||
RT_BITMAP | 0x123134 | 0x40 | Device independent bitmap graphic, 7 x 4 x 1, image size 16 | 0.625 | ||
RT_BITMAP | 0x123174 | 0x48 | Device independent bitmap graphic, 6 x 6 x 1, image size 24 | 0.5138888888888888 | ||
RT_BITMAP | 0x1231bc | 0x40 | Device independent bitmap graphic, 7 x 4 x 1, image size 16 | 0.625 | ||
RT_BITMAP | 0x1231fc | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.42410714285714285 | ||
RT_BITMAP | 0x1232dc | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.5104166666666666 | ||
RT_BITMAP | 0x12339c | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.5 | ||
RT_BITMAP | 0x12347c | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.4870689655172414 | ||
RT_BITMAP | 0x123564 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | 0.4895833333333333 | ||
RT_BITMAP | 0x123624 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | 0.3794642857142857 | ||
RT_ICON | 0x123704 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1152 | French | France | 0.29573170731707316 |
RT_ICON | 0x123d6c | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | French | France | 0.41397849462365593 |
RT_ICON | 0x124054 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 288 | French | France | 0.48155737704918034 |
RT_ICON | 0x12423c | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | French | France | 0.527027027027027 |
RT_ICON | 0x124364 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | French | France | 0.5269189765458422 |
RT_ICON | 0x12520c | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | French | France | 0.6611010830324909 |
RT_ICON | 0x125ab4 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | French | France | 0.597926267281106 |
RT_ICON | 0x12617c | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | French | France | 0.23771676300578035 |
RT_ICON | 0x1266e4 | 0x42028 | Device independent bitmap graphic, 256 x 512 x 32, image size 270336 | French | France | 0.17579223007959285 |
RT_ICON | 0x16870c | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | French | France | 0.36566390041493774 |
RT_ICON | 0x16acb4 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | French | France | 0.45098499061913694 |
RT_ICON | 0x16bd5c | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | French | France | 0.48360655737704916 |
RT_ICON | 0x16c6e4 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | French | France | 0.28191489361702127 |
RT_DIALOG | 0x16cb4c | 0x52 | data | 0.7682926829268293 | ||
RT_STRING | 0x16cba0 | 0x364 | data | 0.43202764976958524 | ||
RT_STRING | 0x16cf04 | 0x6f0 | data | 0.20551801801801803 | ||
RT_STRING | 0x16d5f4 | 0x888 | data | 0.13782051282051283 | ||
RT_STRING | 0x16de7c | 0x8ac | data | 0.1346846846846847 | ||
RT_STRING | 0x16e728 | 0x7f0 | data | 0.15649606299212598 | ||
RT_STRING | 0x16ef18 | 0x8a0 | data | 0.14130434782608695 | ||
RT_STRING | 0x16f7b8 | 0xa6c | data | 0.10644677661169415 | ||
RT_STRING | 0x170224 | 0x6d4 | data | 0.20995423340961097 | ||
RT_STRING | 0x1708f8 | 0x2c4 | data | 0.3870056497175141 | ||
RT_STRING | 0x170bbc | 0x270 | data | 0.3301282051282051 | ||
RT_STRING | 0x170e2c | 0x13c | data | 0.5316455696202531 | ||
RT_STRING | 0x170f68 | 0x15c | data | 0.47126436781609193 | ||
RT_STRING | 0x1710c4 | 0x104 | data | 0.5769230769230769 | ||
RT_STRING | 0x1711c8 | 0x398 | data | 0.42717391304347824 | ||
RT_STRING | 0x171560 | 0x274 | data | 0.46337579617834396 | ||
RT_STRING | 0x1717d4 | 0x240 | data | 0.3454861111111111 | ||
RT_STRING | 0x171a14 | 0x120 | data | 0.5659722222222222 | ||
RT_STRING | 0x171b34 | 0x4ac | data | 0.391304347826087 | ||
RT_STRING | 0x171fe0 | 0x21c | data | 0.46111111111111114 | ||
RT_STRING | 0x1721fc | 0x12c | data | 0.5433333333333333 | ||
RT_STRING | 0x172328 | 0x234 | data | 0.46099290780141844 | ||
RT_STRING | 0x17255c | 0x344 | data | 0.4354066985645933 | ||
RT_STRING | 0x1728a0 | 0x568 | data | 0.3309248554913295 | ||
RT_STRING | 0x172e08 | 0x400 | data | 0.380859375 | ||
RT_STRING | 0x173208 | 0x484 | data | 0.31141868512110726 | ||
RT_STRING | 0x17368c | 0x418 | data | 0.3883587786259542 | ||
RT_STRING | 0x173aa4 | 0xe4 | data | 0.5570175438596491 | ||
RT_STRING | 0x173b88 | 0xb8 | data | 0.5706521739130435 | ||
RT_STRING | 0x173c40 | 0x374 | data | 0.4117647058823529 | ||
RT_STRING | 0x173fb4 | 0x574 | data | 0.28868194842406875 | ||
RT_STRING | 0x174528 | 0x470 | data | 0.35475352112676056 | ||
RT_STRING | 0x174998 | 0x3c8 | data | 0.37086776859504134 | ||
RT_RCDATA | 0x174d60 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x174d70 | 0x784 | data | 0.6200623700623701 | ||
RT_RCDATA | 0x1754f4 | 0x3fe6 | Delphi compiled form 'TAboutDlg' | 0.47083995598483924 | ||
RT_RCDATA | 0x1794dc | 0x4c09 | Delphi compiled form 'TMainDlg' | 0.35299255073208324 | ||
RT_RCDATA | 0x17e0e8 | 0x4da | Delphi compiled form 'TRegDlg' | 0.5499194847020934 | ||
RT_RCDATA | 0x17e5c4 | 0x1816 | Delphi compiled form 'TSettingsDlg' | 0.3227375932533247 | ||
RT_GROUP_CURSOR | 0x17fddc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0x17fdf0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe04 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe18 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0x17fe2c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe40 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe54 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe68 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x17fe7c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_ICON | 0x17fe90 | 0xbc | data | French | France | 0.5904255319148937 |
RT_VERSION | 0x17ff4c | 0x2c0 | data | French | France | 0.4602272727272727 |
RT_MANIFEST | 0x18020c | 0x245 | XML 1.0 document, ASCII text, with CRLF line terminators | 0.5249569707401033 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | SetSecurityDescriptorSacl, SetSecurityDescriptorOwner, SetSecurityDescriptorGroup, SetSecurityDescriptorDacl, RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegDeleteValueA, RegCreateKeyExA, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueA, LookupAccountSidW, IsValidSid, InitializeSecurityDescriptor, InitializeAcl, GetTokenInformation, GetSidSubAuthorityCount, GetSidSubAuthority, GetSidIdentifierAuthority, GetLengthSid, FreeSid, AllocateAndInitializeSid, AdjustTokenPrivileges, AddAccessAllowedAce |
kernel32.dll | lstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, VerLanguageNameA, UnmapViewOfFile, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryA, ReleaseMutex, ReadFile, OpenFileMappingA, MultiByteToWideChar, MulDiv, MoveFileExA, MoveFileA, MapViewOfFile, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesExW, GetFileAttributesA, GetExitCodeThread, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileW, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryW, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle, Beep |
version.dll | VerQueryValueA, GetFileVersionInfoSizeW, GetFileVersionInfoSizeA, GetFileVersionInfoW, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetNearestColor, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendNotifyMessageA, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostThreadMessageA, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRgn, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DrawAnimatedRects, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, AttachThreadInput, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
ole32.dll | OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize |
oleaut32.dll | GetErrorInfo, SysFreeString |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_LoadImageA, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
shell32.dll | Shell_NotifyIconA, ShellExecuteExA, ShellExecuteA |
wininet.dll | FindNextUrlCacheEntryExA, FindFirstUrlCacheEntryExA, FindCloseUrlCache, DeleteUrlCacheEntry |
shell32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListA |
kernel32.dll | GetVersionExA, CreateMutexA |
shell32.dll | SHEmptyRecycleBinA, SHQueryRecycleBinA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
French | France |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 17:30:11 |
Start date: | 13/12/2023 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.31343.392.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'547'776 bytes |
MD5 hash: | D0247B698B14DEB493D8CC4E797AB7D0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |