Windows
Analysis Report
SecuriteInfo.com.Win32.Trojan.PSE.1TYMTF4.2360.8338.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Win32.Trojan.PSE.1TYMTF4.2360.8338.exe (PID: 5712 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.W in32.Troja n.PSE.1TYM TF4.2360.8 338.exe MD5: 7A11BD87C3E54EE1C792F41B68CF9BE1) WerFault.exe (PID: 6564 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 712 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2) WerFault.exe (PID: 2820 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 712 -s 252 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00498926 | |
Source: | Code function: | 0_2_00432A90 | |
Source: | Code function: | 0_2_0044A510 | |
Source: | Code function: | 0_2_0049C7FC | |
Source: | Code function: | 0_2_004547B0 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Static file information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_0045D100 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_0049115C |
Source: | Code function: | 0_2_0041D884 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
38% | ReversingLabs | |||
36% | Virustotal | Browse | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1366090 |
Start date and time: | 2023-12-22 09:39:43 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win32.Trojan.PSE.1TYMTF4.2360.8338.exe |
Detection: | MAL |
Classification: | mal60.winEXE@3/9@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, We rFault.exe, WMIADAP.exe, SIHCl ient.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 104.208.16.94, 20. 189.173.21 - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, login.live.com, slscr.upd ate.microsoft.com, blobcollect or.events.data.trafficmanager. net, onedsblobprdwus16.westus. cloudapp.azure.com, ctldl.wind owsupdate.com, umwatson.events .data.microsoft.com, fe3cr.del ivery.mp.microsoft.com, onedsb lobprdcus16.centralus.cloudapp .azure.com
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.6843972037410334 |
Encrypted: | false |
SSDEEP: | 96:dYFaJa0+CUs1hMyok7JfXQXIDcQDc6XDcEhcw3lP+HbHg6ZAX/d5FMT2SlPkpXmD:GGa0zUl0drDLpUjEzuiF5Z24IO8bV |
MD5: | 7767493C3FFA95544669B791B1B9484D |
SHA1: | 707435C91F5609BCFB7824E4AE3C6BBE7CFDB136 |
SHA-256: | B40E514B2DAE022B7AD06FA2A411E15AC888A0822D43FE465621AC5DEB966766 |
SHA-512: | F3F50E626269EA15F3F5AF274D7A0327C4C9BA1FE9A55BEEDE8EDF5A46330C2491A245BBDEBC2896EAF8638BAF27B0E645E4A6D9608431CE7B0A2474A9FB96D5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.6845189957218711 |
Encrypted: | false |
SSDEEP: | 96:PEvF7a0+Cxgs1hMyoI7JfdQXIDcQvc6QcEVcw3cE/f+HbHg6ZAX/d5FMT2SlPkp9:cvZa0zxgT0BU/4jEzuiF5Z24IO8bV |
MD5: | 1581A3D6DF041BFF3760EC346256B65D |
SHA1: | 6B4182A77B2C6A119DB2EC9B0799E1C79546F324 |
SHA-256: | 72820B40F107D6DD718EE62904D9069669B7E3F906B1AF46C4A4A36CFBA5BCC0 |
SHA-512: | 69E9EB363352C1FD2FEF84250ADE6CABB40B55FF1BBB2BE461DF574E66EDFE8EBDB348E7065C3FF51AFC03853036F195DB3538E722274CA976A762927766D520 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18578 |
Entropy (8bit): | 1.9353820097179273 |
Encrypted: | false |
SSDEEP: | 96:5E8DE3YBeYLTaQ6F/5i7n9lQ49yrYI6Rhe5WIkWI5oIQUIZeWOJ2:x3Be1h3OcCBGJhZDOJ2 |
MD5: | CC2F1899F256436A9828744098030300 |
SHA1: | 1768B77C2AE1892FB4BF52F5372172FD27A267F4 |
SHA-256: | BC294CC1DDAF525B87A4A62A217AC5EF9059A0A193F0BE2C0F8DD9F003BEA6E3 |
SHA-512: | E6F5F566ED53358BFED5120A9D0F0AFF6A14E76B4A335F3703F278AF80ACED269849947C2C0E71D58ECE2A8B7FD1EEFDE0CDAFCFC616D57B8B043AB2C1A67470 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8504 |
Entropy (8bit): | 3.704986039478841 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ4N6Mil46YEI1SU9K5gmfIglGmpDG89bXLsfudm:R6lXJK6MiK6YEqSU9K5gmfXlbXQf1 |
MD5: | 1E65A5F3E61B0FE953A03E04FD1898EE |
SHA1: | 496D31CFA2970FA9970798341F3969D8B113DDAE |
SHA-256: | 4B3CA4C728417F2ECF145D894AD4A65AB0A986DA63C7B0154DF423619788CF74 |
SHA-512: | 01482B0E2A90C82F43356B622E4F1174F6520984149573E9F9FFE1C4232DE9354538730930495371AAFDBB782E09C206AC6F2358A660AB9123D3E90007B2CF81 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4828 |
Entropy (8bit): | 4.607208793846622 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs+uJg77aI93EWpW8VYhWYm8M4JGaOqFM+q8vUO1E+5+bUd:uIjfJI7hd7VOfJBoV8E+5+bUd |
MD5: | 6ED305B4548BC8C32BBD4BE1C923BB86 |
SHA1: | D413886E26C3EBCD9FE1E33D65A2F1100EC2C3EA |
SHA-256: | 09B19A04039104D75C3F1F34F160ADAD244E6B7E7A451A0CEF76DC95C713731A |
SHA-512: | 494213A957088563EFA7C77D8B559C24AA0C5B8730AFAA81B99D9D3F3094650A34F6A6C11FB4ADCDD2C69743FC6668BC37BDFE234D0E4D44BB5DFA13BF9688C1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18710 |
Entropy (8bit): | 1.9749235234993834 |
Encrypted: | false |
SSDEEP: | 96:5e8/E3YeYLTaQdLg1wki7ndI40EEoEb5WIkWItoI4TheeNtjwV2sB:zre13JO6htTheeNpw4s |
MD5: | 6F3D39D83FA9528DCBF710890FDE2A7D |
SHA1: | 13C0CAEE7E66C6516500508DA8A99C92B9323A5C |
SHA-256: | DF98C1AA0BFFA0F8FDB87989905050E151FB4DD9A6EE600F003BEB3D57E665C3 |
SHA-512: | 8427CC86BA7EE0B417BF702C148AB27E4829C7A13D53B25CB2201436D3ACCDD9CE20FCE0FB4ECC8D96D37857733318B18E87BEB17046DF167C324E09F9DEC7CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8492 |
Entropy (8bit): | 3.7085925425638866 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ4/6x46YEIDSU9EegmfIC6prx89bZLsfoTm:R6lXJY6+6YEcSU9EegmfBRZQfx |
MD5: | 26F27877C2E90EA0030B64B30E51C0B3 |
SHA1: | 4AA55FA483EA948A39C5AD4C8591BEFE5216A26E |
SHA-256: | 3ED79B40C9730C6BA0DF9068470B529397BB7D489DD2B27361D7B148F706CCD2 |
SHA-512: | 999F417AEC2E86CF13D5C4A4571BE80642CABE97CC6DA24C00B53889094F735D14B5862ABC12C3C9643B377CA70A90A2BE0603686D1E7CB12FDBA4B965331E1E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4824 |
Entropy (8bit): | 4.607725293440294 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs+uJg77aI93EWpW8VYjvYm8M4JGgFb+q8R/E+5+bUd:uIjfJI7hd7VsyJN+E+5+bUd |
MD5: | 8DE134EC21CBADC54C1173C80A4ECEA5 |
SHA1: | 3CCE143B2E09DD7332B1434FF88C8F7239656B0A |
SHA-256: | 6F87E3AA72C7F659A8BBE621DECF47F6C6C7431FFBBA1B6F0A0291165D5A5B7F |
SHA-512: | 2382D3B5CE0A895CBE710E05290841B4B62547064F13958B4E6B4FA206DD1C940B93F2E24E1D2B7495EEDF5782F1EA41D31C6A8097183BDE2C6E19D3640F3873 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421755575217419 |
Encrypted: | false |
SSDEEP: | 6144:FSvfpi6ceLP/9skLmb0OTIWSPHaJG8nAgeMZMMhA2fX4WABlEnNZ0uhiTw:MvloTIW+EZMM6DFyT03w |
MD5: | 002AF8B03CDF750FB4DD692259426F38 |
SHA1: | CED9038FD5500DDAD333C54A7276B9225E65AC84 |
SHA-256: | C58A3E3349E9EDB99C0756054406F084CDAA901DF0FB7A15839AB56740BA6E62 |
SHA-512: | FCB2FAD7771D69E18DCE25DA990D5698BE426B79273854DFC1CB7F418A2614C0EDBCDA079FE79C53B296DBF4870202DD6222259322B5568E0B5B26A644D63C57 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.353451322831142 |
TrID: |
|
File name: | SecuriteInfo.com.Win32.Trojan.PSE.1TYMTF4.2360.8338.exe |
File size: | 1'220'608 bytes |
MD5: | 7a11bd87c3e54ee1c792f41b68cf9be1 |
SHA1: | b3ced53a95b39b346927c42ca58f881677b7eb8f |
SHA256: | baef0df0350146bd74555bd687f67f6b2be5eb0e3209e8293a6d33225906f84e |
SHA512: | 458401fd8f477292f489c8969128b148563dc6bc8165b6af757498e4d97784d098ad740bd53de9229f6da77f4be6c6cf28ab27a177404ca6a82277ad8799a344 |
SSDEEP: | 12288:7YizhtuzGLEUM5QPKbl1e0qbPNEqYyyL:7YizhtuiWoKR1e0CV1Yd |
TLSH: | 7C457D16F75200D5D207513229F3133937799B930A29FBE3DB99CE6D2E72366AD32281 |
File Content Preview: | MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM................................... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x48ecff |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 004C7AF8h |
push 0049115Ch |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 58h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
call dword ptr [004B1194h] |
xor edx, edx |
mov dl, ah |
mov dword ptr [0051F324h], edx |
mov ecx, eax |
and ecx, 000000FFh |
mov dword ptr [0051F320h], ecx |
shl ecx, 08h |
add ecx, edx |
mov dword ptr [0051F31Ch], ecx |
shr eax, 10h |
mov dword ptr [0051F318h], eax |
push 00000001h |
call 00007F687C2464D3h |
pop ecx |
test eax, eax |
jne 00007F68B0ED5BBAh |
push 0000001Ch |
call 00007F68D9CB63D3h |
pop ecx |
call 00007F68392264D3h |
test eax, eax |
jne 00007F68B0ED5BBAh |
push 00000010h |
call 00007F68D9CB63D3h |
pop ecx |
xor esi, esi |
mov dword ptr [ebp-04h], esi |
call 00007F687D2064D3h |
call dword ptr [004B1300h] |
mov dword ptr [00520B44h], eax |
call 00007F684B1F64D3h |
mov dword ptr [0051F2E0h], eax |
call 00007F68FE1D64D3h |
call 00007F68451C64D3h |
call 00007F68540A64D3h |
mov dword ptr [ebp-30h], esi |
lea eax, dword ptr [ebp-5Ch] |
push eax |
call dword ptr [004B1248h] |
call 00007F68ED1C64D3h |
mov dword ptr [ebp-64h], eax |
test byte ptr [ebp-30h], 00000001h |
je 00007F68B0ED5BB8h |
movzx eax, word ptr [ebp+00h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd0b78 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x121000 | 0x5f30 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb1000 | 0x7f0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb0000 | 0xb0000 | False | 0.4167258522727273 | DIY-Thermocam raw data (Lepton 3.x), scale 0-199, spot sensor temperature 731709760.000000, unit celsius, color scheme 0, calibration: offset -255088476028928.000000, slope 38774585650963597903265792.000000 | 6.582151904200077 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xb1000 | 0x23000 | 0x23000 | False | 0.2443359375 | data | 4.358326476642518 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xd4000 | 0x4d000 | 0x4d000 | False | 0.06546456473214286 | data | 1.3194057986163656 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x121000 | 0x6000 | 0x6000 | False | 0.21712239583333334 | data | 3.539452466912043 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:40:34 |
Start date: | 22/12/2023 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.PSE.1TYMTF4.2360.8338.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'220'608 bytes |
MD5 hash: | 7A11BD87C3E54EE1C792F41B68CF9BE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 09:40:34 |
Start date: | 22/12/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xef0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 09:41:08 |
Start date: | 22/12/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xef0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 0.1% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 60% |
Total number of Nodes: | 5 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |