Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe

Overview

General Information

Sample name:SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
Analysis ID:1446233
MD5:c1367eaf2157e6a88432c899fc995104
SHA1:7fac3e298b902d04213a5bf39a7db6848d34d099
SHA256:50c87c9e9d89f20e6540b2f198244c1dc300026306c1b574d032c357f3f9e2af
Tags:exe

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Uses Windows timers to delay execution
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
Source: SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: sus21.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeWindow found: window name: TButtonJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exeUser Timer Set: Timeout: 100msJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
OS Credential Dumping11
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446233
Start date and time:2024-05-23 01:30:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
Detection:SUS
Classification:sus21.evad.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.658242850154929
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.38%
  • InstallShield setup (43055/19) 0.43%
  • Windows Screen Saver (13104/52) 0.13%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
File name:SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
File size:960'512 bytes
MD5:c1367eaf2157e6a88432c899fc995104
SHA1:7fac3e298b902d04213a5bf39a7db6848d34d099
SHA256:50c87c9e9d89f20e6540b2f198244c1dc300026306c1b574d032c357f3f9e2af
SHA512:7c99fff15b0550302cc22076bf0d39842b63285c91ec26612fad34128f50d514abebc26300c4ebe378107dd7ca50f68f20f12dc3fb22fe46e6ede23e78d7bbe4
SSDEEP:12288:ExxOzpB0WY2W3AgPHNQ4mD3+Ovqqt2lzbEOr21eL/LXPPnu5J6UnAG3n05RT2:QaAWY2W3AgPt23+Ov78zbEOieDLOf9n
TLSH:40159E32F2815837D1672A7D4C1BA2E56929BF543A286D8B3FFC1D4C5F396813C25293
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:82cc72230ddd2285
Entrypoint:0x4c9be8
Entrypoint Section:.itext
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x46C7D1BA [Sun Aug 19 05:14:34 2007 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:a97bda7fc8829c5ad2627d7e2cfa446c
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFF0h
mov eax, 004C81ACh
call 00007F4360A62F31h
mov eax, dword ptr [004CD2C8h]
mov eax, dword ptr [eax]
call 00007F4360AC95F5h
mov eax, dword ptr [004CD2C8h]
mov eax, dword ptr [eax]
mov edx, 004C9C48h
call 00007F4360AC909Ch
mov ecx, dword ptr [004CD1D0h]
mov eax, dword ptr [004CD2C8h]
mov eax, dword ptr [eax]
mov edx, dword ptr [004C77D4h]
call 00007F4360AC95E4h
mov eax, dword ptr [004CD2C8h]
mov eax, dword ptr [eax]
call 00007F4360AC972Ch
call 00007F4360A60CEFh
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xd40000x2f06.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xe60000xf200.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xd90000xc61c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xd80000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xd489c0x748.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xc73e40xc74007d8263a399e214f1211fb6a5d0c52b74False0.5125593044228356data6.546497020523588IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0xc90000xc600xe00d20cb3ad8d4a660d3a709ee558bdc991False0.556640625data5.9342846493895935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0xca0000x34a00x360045ab7352a460aae2e8b825663a11aee2False0.42180266203703703data4.314718184995612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0xce0000x52a80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0xd40000x2f060x300025ab783736c827f85d747af5c83d5debFalse0.3085123697916667data5.008321998953415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0xd70000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0xd80000x180x2004f0002177f85010cef45bf48736e0778False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xd90000xc61c0xc800bb7716916f3eb2b78a752599543a96d8False0.57623046875data6.6562768419321IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0xe60000xf2000xf200253fa09c7edadca0bc8478630312ed93False0.471042097107438data6.172107733720928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0xe6f580x134data0.38636363636363635
RT_CURSOR0xe708c0x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0xe71c00x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0xe72f40x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0xe74280x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0xe755c0x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0xe76900x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_CURSOR0xe77c40x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_BITMAP0xe78f80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
RT_BITMAP0xe7ac80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
RT_BITMAP0xe7cac0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
RT_BITMAP0xe7e7c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
RT_BITMAP0xe804c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
RT_BITMAP0xe821c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
RT_BITMAP0xe83ec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
RT_BITMAP0xe85bc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
RT_BITMAP0xe878c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
RT_BITMAP0xe895c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
RT_BITMAP0xe8b2c0x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.28061224489795916
RT_BITMAP0xe8cb40x188Device independent bitmap graphic, 24 x 24 x 4, image size 288CatalanSpain0.30357142857142855
RT_BITMAP0xe8e3c0x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.29081632653061223
RT_BITMAP0xe8fc40x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.3163265306122449
RT_BITMAP0xe914c0x110Device independent bitmap graphic, 24 x 14 x 4, image size 1680.40808823529411764
RT_BITMAP0xe925c0x110Device independent bitmap graphic, 24 x 14 x 4, image size 1680.4117647058823529
RT_BITMAP0xe936c0x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.2857142857142857
RT_BITMAP0xe94f40x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.5255102040816326
RT_ICON0xe967c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3588709677419355
RT_ICON0xe99640x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.581081081081081
RT_STRING0xe9a8c0xa8data0.5833333333333334
RT_STRING0xe9b340xc0data0.3229166666666667
RT_STRING0xe9bf40x164data0.46629213483146065
RT_STRING0xe9d580x1dcdata0.35714285714285715
RT_STRING0xe9f340x274data0.37420382165605093
RT_STRING0xea1a80x2a4data0.47633136094674555
RT_STRING0xea44c0x338data0.4211165048543689
RT_STRING0xea7840x248data0.4965753424657534
RT_STRING0xea9cc0x248data0.4777397260273973
RT_STRING0xeac140x1acdata0.5654205607476636
RT_STRING0xeadc00xccdata0.6764705882352942
RT_STRING0xeae8c0x114data0.6086956521739131
RT_STRING0xeafa00x358data0.433411214953271
RT_STRING0xeb2f80x3bcdata0.3891213389121339
RT_STRING0xeb6b40x374data0.3914027149321267
RT_STRING0xeba280x360data0.36342592592592593
RT_STRING0xebd880x354data0.41784037558685444
RT_STRING0xec0dc0xc0data0.625
RT_STRING0xec19c0x9cdata0.6282051282051282
RT_STRING0xec2380x348data0.42142857142857143
RT_STRING0xec5800x3e4data0.3614457831325301
RT_STRING0xec9640x2ecdata0.37566844919786097
RT_STRING0xecc500x304data0.3432642487046632
RT_RCDATA0xecf540x10data1.5
RT_RCDATA0xecf640x300data0.7278645833333334
RT_RCDATA0xed2640x5caDelphi compiled form 'TfrmCpuUtilization'0.4406207827260459
RT_RCDATA0xed8300x6fafDelphi compiled form 'TfrmGraph'0.6544367108530657
RT_RCDATA0xf47e00x72bDelphi compiled form 'TfrmLaunchExternalProgram'0.5155313351498637
RT_GROUP_CURSOR0xf4f0c0x14Lotus unknown worksheet or configuration, revision 0x11.25
RT_GROUP_CURSOR0xf4f200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xf4f340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0xf4f480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xf4f5c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xf4f700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xf4f840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0xf4f980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0xf4fac0x22dataEnglishUnited States1.0
RT_VERSION0xf4fd00x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79EnglishUnited States0.565625
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
gdi32.dllWidenPath, UnrealizeObject, TextOutA, StrokePath, StrokeAndFillPath, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextCharacterExtra, SetTextColor, SetTextAlign, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetArcDirection, SelectPalette, SelectObject, SelectClipRgn, SelectClipPath, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32W, GetTextExtentPoint32A, GetTextCharacterExtra, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBkMode, GetBkColor, GetBitmapBits, GdiFlush, ExtTextOutA, ExtSelectClipRgn, ExtCreatePen, ExcludeClipRect, EndPath, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEllipticRgnIndirect, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt, BeginPath, ArcTo, Arc
version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
kernel32.dlllstrcpyA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SystemTimeToFileTime, SizeofResource, SetThreadPriority, SetThreadLocale, SetProcessAffinityMask, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcessAffinityMask, GetProcAddress, GetPrivateProfileStringA, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateProcessA, CreateFileA, CreateEventA, CompareStringA, CloseHandle
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
ole32.dllCoTaskMemFree, CoTaskMemAlloc, CoCreateInstance
kernel32.dllSleep
ole32.dllCLSIDFromString
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
comdlg32.dllGetSaveFileNameA, GetOpenFileNameA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
CatalanSpain
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:19:31:37
Start date:22/05/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe"
Imagebase:0x400000
File size:960'512 bytes
MD5 hash:C1367EAF2157E6A88432C899FC995104
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:false

No disassembly