Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
Analysis ID:1446237
MD5:64f3e14650cfa8ad34d2bf90cd41e082
SHA1:0d82a34f554342d30bea3fa21ebd7ec8e1fc395c
SHA256:12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691
Tags:exe
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Creates a process in suspended mode (likely to inject code)
Drops PE files
Entry point lies outside standard sections
Found evasive API chain (may stop execution after checking a module file name)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Sigma detected: Use Short Name Path in Command Line
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\hcbnaf.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\hcbnaf.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\hcbnaf.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, ParentProcessId: 2408, ParentProcessName: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe" , ProcessId: 7224, ProcessName: hcbnaf.exe
Timestamp:05/23/24-01:33:48.292187
SID:2826825
Source Port:63921
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeAvira: detection malicious, Label: TR/Bublik.vdmcq
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeReversingLabs: Detection: 73%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: Z:\Projects\Loader\Release\Loader.pdb source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292308298.0000000001630000.00000040.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292336763.000000000165E000.00000004.00000020.00020000.00000000.sdmp, hcbnaf.exe, hcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmp, hcbnaf.exe, 0000000A.00000002.1351710808.0000000000A80000.00000040.00001000.00020000.00000000.sdmp

Networking

barindex
Source: TrafficSnort IDS: 2826825 ETPRO TROJAN DNS Query for known malicious URL thisaintpc .com 192.168.2.7:63921 -> 1.1.1.1:53
Source: unknownDNS traffic detected: query: thisaintpc.com replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeCode function: 0_2_01631000 EntryPoint,GetModuleHandleW,ExitProcess,HeapCreate,HeapAlloc,HeapAlloc,HeapAlloc,GetModuleFileNameW,GetTempPathW,wsprintfW,CreateFileW,GetFileSize,lstrlenW,lstrlenW,RtlAllocateHeap,ReadFile,lstrcmpW,lstrlenW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindCloseChangeNotification,CloseHandle,GetTempPathW,ShellExecuteW,CloseHandle,DeleteFileW,InternetOpenW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,HttpQueryInfoW,HeapAlloc,InternetReadFile,CreateFileW,WriteFile,CloseHandle,GetCurrentDirectoryW,wsprintfW,0_2_01631000
Source: global trafficDNS traffic detected: DNS query: thisaintpc.com
Source: hcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thisaintpc.com/
Source: hcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thisaintpc.com/Y
Source: hcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thisaintpc.com/downloads/tehb.exe
Source: hcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thisaintpc.com/downloads/tehb.exew
Source: hcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thisaintpc.com/o

System Summary

barindex
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .k+g
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .IQ"
Source: hcbnaf.exe.0.drStatic PE information: section name: .k+g
Source: hcbnaf.exe.0.drStatic PE information: section name: .IQ"
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: Number of sections : 11 > 10
Source: hcbnaf.exe.0.drStatic PE information: Number of sections : 11 > 10
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal92.winEXE@3/1@1/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeFile created: C:\Users\user~1\AppData\Local\Temp\hcbnaf.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeReversingLabs: Detection: 73%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess created: C:\Users\user\AppData\Local\Temp\hcbnaf.exe "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess created: C:\Users\user\AppData\Local\Temp\hcbnaf.exe "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic file information: File size 6920232 > 1048576
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: Raw size of .K0f is bigger than: 0x100000 < 0x695200
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: Z:\Projects\Loader\Release\Loader.pdb source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292308298.0000000001630000.00000040.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292336763.000000000165E000.00000004.00000020.00020000.00000000.sdmp, hcbnaf.exe, hcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmp, hcbnaf.exe, 0000000A.00000002.1351710808.0000000000A80000.00000040.00001000.00020000.00000000.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .K0f
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: real checksum: 0x6a504a should be: 0x6a46b4
Source: hcbnaf.exe.0.drStatic PE information: real checksum: 0x6a504a should be: 0x6a635f
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .k+g
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .4kl
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .htext
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .jhn
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .IQ"
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeStatic PE information: section name: .K0f
Source: hcbnaf.exe.0.drStatic PE information: section name: .k+g
Source: hcbnaf.exe.0.drStatic PE information: section name: .4kl
Source: hcbnaf.exe.0.drStatic PE information: section name: .htext
Source: hcbnaf.exe.0.drStatic PE information: section name: .jhn
Source: hcbnaf.exe.0.drStatic PE information: section name: .IQ"
Source: hcbnaf.exe.0.drStatic PE information: section name: .K0f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeFile created: C:\Users\user\AppData\Local\Temp\hcbnaf.exeJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: FE0005 value: E9 8B 2F 78 76 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 77762F90 value: E9 7A D0 87 89 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: FF0005 value: E9 2B BA 73 76 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 7772BA30 value: E9 DA 45 8C 89 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 1450008 value: E9 8B 8E 32 76 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 77778E90 value: E9 80 71 CD 89 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 1470005 value: E9 8B 4D 5C 74 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 75A34D90 value: E9 7A B2 A3 8B Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 1480005 value: E9 EB EB 5C 74 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 75A4EBF0 value: E9 1A 14 A3 8B Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 1490005 value: E9 8B 8A 14 75 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 765D8A90 value: E9 7A 75 EB 8A Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 14A0005 value: E9 2B 02 16 75 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeMemory written: PID: 2408 base: 76600230 value: E9 DA FD E9 8A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 8D0005 value: E9 8B 2F E9 76 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 77762F90 value: E9 7A D0 16 89 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 8E0005 value: E9 2B BA E4 76 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 7772BA30 value: E9 DA 45 1B 89 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 8F0008 value: E9 8B 8E E8 76 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 77778E90 value: E9 80 71 17 89 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 910005 value: E9 8B 4D 12 75 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 75A34D90 value: E9 7A B2 ED 8A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 920005 value: E9 EB EB 12 75 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 75A4EBF0 value: E9 1A 14 ED 8A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 930005 value: E9 8B 8A CA 75 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 765D8A90 value: E9 7A 75 35 8A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 940005 value: E9 2B 02 CC 75 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeMemory written: PID: 7224 base: 76600230 value: E9 DA FD 33 8A Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\hcbnaf.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_10-50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-50
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292336763.0000000001687000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*{
Source: hcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
Source: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe, 00000000.00000002.1292336763.0000000001687000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exeProcess created: C:\Users\user\AppData\Local\Temp\hcbnaf.exe "C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe" Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
1
Credential API Hooking
1
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe74%ReversingLabsWin32.Trojan.Bublik
SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe100%AviraTR/Bublik.vdmcq
SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\hcbnaf.exe100%AviraTR/Bublik.vdmcq
C:\Users\user\AppData\Local\Temp\hcbnaf.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://thisaintpc.com/downloads/tehb.exew0%Avira URL Cloudsafe
https://thisaintpc.com/o0%Avira URL Cloudsafe
https://thisaintpc.com/downloads/tehb.exe0%Avira URL Cloudsafe
https://thisaintpc.com/0%Avira URL Cloudsafe
https://thisaintpc.com/Y0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
thisaintpc.com
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://thisaintpc.com/downloads/tehb.exehcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://thisaintpc.com/ohcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://thisaintpc.com/downloads/tehb.exewhcbnaf.exe, 0000000A.00000002.1351512511.000000000097E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://thisaintpc.com/hcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://thisaintpc.com/Yhcbnaf.exe, 0000000A.00000002.1351512511.00000000009C6000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1446237
    Start date and time:2024-05-23 01:32:43 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 4s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:18
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
    Detection:MAL
    Classification:mal92.winEXE@3/1@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:modified
    Size (bytes):6920400
    Entropy (8bit):7.9700445985573785
    Encrypted:false
    SSDEEP:98304:uCSa4v3dAm8U5ipZ1G7aLxZf1w51p6LDCv4olr4yWWsfTjyJmMoEKQpogf2+:ula4/N8BpmCDf251Xv4oNn6/yprp3X
    MD5:0EA5B0BE7C9A24CB1FEEEEB73EDF66E7
    SHA1:91E61FBF177CD5DEA5AAE3815D39E0BC64BD5A31
    SHA-256:ABDF37699169CD5F6D4D17A322855B9F7B86BF6E241A13BC765431D45871143A
    SHA-512:305CAB940846AE7A192ACC09033926A0D006AB1835CC552A48AB03592B82C71FE0B1EEF88BBD7F48BAF311C0B83651CD1C667D401470A0E56FC4DE651ED36827
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: Joe Sandbox ML, Detection: 100%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..R.....................j..............p....@..........................p......JPj...@..................................O.......@...'...................0..$...................................P ..@.............<.P............................text...+V.......................... ..`.rdata...#...p......................@..@.data...@...........................@....k+g...../..........................@..@.4kl................................@..@.htext..............................`....jhn......;......................... ..`.IQ"..........<.....................@....K0f.....Qi...<..Ri................. ..`.reloc..$....0.......\i.............@..@.rsrc....'...@...(...di.............@..@........................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.970065574881821
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
    File size:6'920'232 bytes
    MD5:64f3e14650cfa8ad34d2bf90cd41e082
    SHA1:0d82a34f554342d30bea3fa21ebd7ec8e1fc395c
    SHA256:12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691
    SHA512:dd136047e2c33b42a72bffa39d280ab63f6b189368bc6b6ff8475731c517d644c6ccd4ae4a8f30c54ad28f9db69838b70c1a4a195dc0b66f47d09f2e0c692161
    SSDEEP:98304:uCSa4v3dAm8U5ipZ1G7aLxZf1w51p6LDCv4olr4yWWsfTjyJmMoEKQpogf2D:ula4/N8BpmCDf251Xv4oNn6/yprp3S
    TLSH:3166236722165042D9FE8539C533FDA972F713AACE81C87DA8EA6DC136129E5F213D03
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..R.....................j...............p....@..........................p......JPj...@................................
    Icon Hash:1898898999ad81ab
    Entrypoint:0xd4e4e2
    Entrypoint Section:.K0f
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x521CD031 [Tue Aug 27 16:13:37 2013 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:5b778f66a47f8346c46ccfa23e46ce8d
    Instruction
    call 00007F1E787A7DCFh
    xor eax, 09665E9Fh
    cmc
    jmp 00007F1E787F953Dh
    cmp ch, FFFFFFBCh
    add esi, 00000006h
    test edi, 30CC23F0h
    cmc
    mov byte ptr [ecx], dl
    mov edx, dword ptr [edi]
    cmc
    stc
    add edi, 00000004h
    xor edx, ebx
    add edx, 3C1F4298h
    jmp 00007F1E787626B7h
    jne 00007F1E78699C09h
    mov eax, dword ptr [ebp+00h]
    jmp 00007F1E786B1F0Bh
    push edi
    ret
    push dword ptr [esp+04h]
    popfd
    lea esp, dword ptr [esp+08h]
    call 00007F1E787F88ABh
    jnle 00007F1E7873977Bh
    in al, 00h
    lahf
    jmp far 1BECh : B15214AEh
    xchg eax, ebp
    scasb
    out dx, al
    pop esi
    cmp dl, dl
    jns 00007F1E78739749h
    mov dl, 62h
    pop edx
    push ecx
    iretd
    cmp al, byte ptr [ecx]
    cmp dword ptr [ebx+4800C1A9h], ebp
    jbe 00007F1E787396D3h
    xchg eax, ecx
    push eax
    add al, 79h
    mov al, byte ptr [5250FACDh]
    adc ecx, ecx
    ror bh, cl
    xchg byte ptr [ebx], al
    stosd
    out dx, al
    add byte ptr [edi-198A9051h], FFFFFF86h
    or bh, byte ptr [esi+452F511Eh]
    jp 00007F1E7873977Dh
    jnle 00007F1E78739755h
    loop 00007F1E787396FBh
    push edx
    fisub dword ptr [ebx+eax*4+2DCDD283h]
    jmp far ED7Ah : 0000A4D8h
    jne 00007F1E7873974Dh
    sub byte ptr [ebp-13h], bl
    cwde
    mov eax, dword ptr [A91937D9h]
    mov byte ptr [861DC986h], al
    sub al, D7h
    aas
    sbb esp, dword ptr [240FC21Dh]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x8a4f180xa0.K0f
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa640000x27fe.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xa630000x624.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa620500x40.K0f
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3cc0000x50.IQ"
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x562b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x70000x23de0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xa0000x19400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .k+g0xc0000x2fcc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .4kl0xf0000x9020x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .htext0x100000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .jhn0x110000x3ba2ba0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .IQ"0x3cc0000x4c80x60097bdb7fd16894d067ac7f4d39fa30591False0.050130208333333336data0.2997123812097957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .K0f0x3cd0000x6951a00x6952001444e0e6a4398a7b788ed19238848817unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0xa630000x6240x800d8022ba733aed05e58e0913b432d3ef1False0.412109375data3.5452268336503416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xa640000x27fe0x28006570e289327dc0a25f58affdff18de29False0.36162109375data5.3191968263487155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xa640e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.3504149377593361
    RT_GROUP_ICON0xa666900x14dataRussianRussia1.15
    RT_MANIFEST0xa666a40x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
    DLLImport
    gdiplus.dllGdiplusShutdown
    KERNEL32.dllGetStringTypeW
    USER32.dllDispatchMessageW
    GDI32.dllSetPixel
    KERNEL32.dllGetSystemTimeAsFileTime
    USER32.dllCharUpperBuffW
    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
    Language of compilation systemCountry where language is spokenMap
    RussianRussia
    EnglishUnited States
    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    05/23/24-01:33:48.292187UDP2826825ETPRO TROJAN DNS Query for known malicious URL thisaintpc .com6392153192.168.2.71.1.1.1
    TimestampSource PortDest PortSource IPDest IP
    May 23, 2024 01:33:48.292186975 CEST6392153192.168.2.71.1.1.1
    May 23, 2024 01:33:48.346134901 CEST53639211.1.1.1192.168.2.7
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    May 23, 2024 01:33:48.292186975 CEST192.168.2.71.1.1.10x381bStandard query (0)thisaintpc.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    May 23, 2024 01:33:48.346134901 CEST1.1.1.1192.168.2.70x381bName error (3)thisaintpc.comnonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:19:33:35
    Start date:22/05/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad3.28161.23146.13969.exe"
    Imagebase:0x450000
    File size:6'920'232 bytes
    MD5 hash:64F3E14650CFA8AD34D2BF90CD41E082
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:10
    Start time:19:33:41
    Start date:22/05/2024
    Path:C:\Users\user\AppData\Local\Temp\hcbnaf.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user~1\AppData\Local\Temp\hcbnaf.exe"
    Imagebase:0xaa0000
    File size:6'920'400 bytes
    MD5 hash:0EA5B0BE7C9A24CB1FEEEEB73EDF66E7
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 100%, Avira
    • Detection: 100%, Joe Sandbox ML
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:52.7%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:95.5%
      Total number of Nodes:22
      Total number of Limit Nodes:1

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_01631000 1 Function_01631350 0->1

      Control-flow Graph

      APIs
      • GetModuleHandleW.KERNEL32(00000000), ref: 01631013
      • ExitProcess.KERNEL32 ref: 01631020
      • HeapCreate.KERNELBASE(00000000,00002000,00000000), ref: 0163102E
      • HeapAlloc.KERNEL32(00000000,00000008,00002000), ref: 01631041
      • HeapAlloc.KERNEL32(?,00000008,00002000), ref: 0163104C
      • GetModuleFileNameW.KERNEL32(00000000,?,00002000), ref: 01631056
      • GetTempPathW.KERNEL32(00001000,?), ref: 01631064
      • wsprintfW.USER32 ref: 0163107A
      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 01631096
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1292308298.0000000001630000.00000040.00001000.00020000.00000000.sdmp, Offset: 01630000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1630000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$AllocCreateFileModule$ExitHandleNamePathProcessTempwsprintf
      • String ID: N$%s%s$%s\%s$/downloads/tehb.exe$Updates downloader$application/*$hcbnaf.exe$hgnddkje.exe$open$text/*$thisaintpc.com
      • API String ID: 4101224454-3431848593
      • Opcode ID: 7c7894694580c0e58bc199d09414db6a755d26a623cea0f7d9a865b7aed1df84
      • Instruction ID: a0e6e08374acbaba47dc1ad90824bbb28309346525bbf28922585cde0f446dc8
      • Opcode Fuzzy Hash: 7c7894694580c0e58bc199d09414db6a755d26a623cea0f7d9a865b7aed1df84
      • Instruction Fuzzy Hash: 8CA17471900218BFEB219FA5ED99EEFBF7AFF49750F104018F605A2190C7705A68DBA0

      Execution Graph

      Execution Coverage:59%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:22
      Total number of Limit Nodes:1

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00A81000 1 Function_00A81350 0->1

      Control-flow Graph

      APIs
      • GetModuleHandleW.KERNEL32(00000000), ref: 00A81013
      • ExitProcess.KERNEL32 ref: 00A81020
      • HeapCreate.KERNELBASE(00000000,00002000,00000000), ref: 00A8102E
      • HeapAlloc.KERNEL32(00000000,00000008,00002000), ref: 00A81041
      • HeapAlloc.KERNEL32(?,00000008,00002000), ref: 00A8104C
      • GetModuleFileNameW.KERNEL32(00000000,?,00002000), ref: 00A81056
      • GetTempPathW.KERNEL32(00001000,?), ref: 00A81064
      • wsprintfW.USER32 ref: 00A8107A
      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00A81096
      Strings
      Memory Dump Source
      • Source File: 0000000A.00000002.1351710808.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_10_2_a80000_hcbnaf.jbxd
      Similarity
      • API ID: Heap$AllocCreateFileModule$ExitHandleNamePathProcessTempwsprintf
      • String ID: N$%s%s$%s\%s$/downloads/tehb.exe$Updates downloader$application/*$hcbnaf.exe$hgnddkje.exe$open$text/*$thisaintpc.com
      • API String ID: 4101224454-3431848593
      • Opcode ID: 8e36a22ec50e65adbf491062ac7f1c2d7da2df792ebd08039d16ed25d8a41906
      • Instruction ID: 663e3f0a83dd7bc08d0de6641ec2bf6bf829e8218e910891640992265402cfae
      • Opcode Fuzzy Hash: 8e36a22ec50e65adbf491062ac7f1c2d7da2df792ebd08039d16ed25d8a41906
      • Instruction Fuzzy Hash: D4A11171901218BFDB22ABE1DC49FEEBFB9FF09750F204155F605A61A0C7705A42DBA0