Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TSD_ESign_Window_7_V2.5.8.exe

Overview

General Information

Sample name:TSD_ESign_Window_7_V2.5.8.exe
Analysis ID:1447095
MD5:f28b80dd90a08f60c3b1e1853780e5c2
SHA1:fcc18510d38551a22b04b16467157a7da3c379a7
SHA256:94c898b8c78342205b126e8e90d1c2a2f4ca683f92d22213b82c5f24dfa5c8ec
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • TSD_ESign_Window_7_V2.5.8.exe (PID: 5660 cmdline: "C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe" MD5: F28B80DD90A08F60C3B1E1853780E5C2)
    • TSD_ESign_Window_7_V2.5.8.tmp (PID: 2020 cmdline: "C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp" /SL5="$203EE,7563488,777728,C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe" MD5: 597E3D6ECAED5553CFA6875DBF9D5354)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: TSD_ESign_Window_7_V2.5.8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: TSD_ESign_Window_7_V2.5.8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: >{app}\com.tsd.einvoice.host.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: >{app}\com.tsd.einvoice.core.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ESignLibrary.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002513000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\com.tsd.einvoice.core.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002521000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\com.tsd.einvoice.host.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002521000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\EinvoiceSignLib.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: 2{app}\EinvoiceSignLib.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: ,{app}\ESignLibrary.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownDNS traffic detected: query: 50.23.12.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: global trafficDNS traffic detected: DNS query: 50.23.12.20.in-addr.arpa
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2287199763.0000000002316000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://einvoice.com.vn/
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2083906504.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://einvoice.com.vn/0https://einvoice.com.vn/0https://einvoice.com.vn/
Source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://einvoice.com.vn/9jO
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2287199763.0000000002316000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://einvoice.com.vn/Ah1
Source: TSD_ESign_Window_7_V2.5.8.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2085354992.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2084953815.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000000.2087006183.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TSD_ESign_Window_7_V2.5.8.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2085354992.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2084953815.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000000.2087006183.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TSD_ESign_Window_7_V2.5.8.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: TSD_ESign_Window_7_V2.5.8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000000.2083390303.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs TSD_ESign_Window_7_V2.5.8.exe
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2084953815.0000000002679000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs TSD_ESign_Window_7_V2.5.8.exe
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2085354992.000000007FE35000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs TSD_ESign_Window_7_V2.5.8.exe
Source: TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2287199763.00000000022F8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs TSD_ESign_Window_7_V2.5.8.exe
Source: TSD_ESign_Window_7_V2.5.8.exeBinary or memory string: OriginalFileName vs TSD_ESign_Window_7_V2.5.8.exe
Source: TSD_ESign_Window_7_V2.5.8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean1.winEXE@3/2@2/0
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeFile created: C:\Users\user\AppData\Local\Temp\is-536DE.tmpJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: TSD_ESign_Window_7_V2.5.8.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeFile read: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe "C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeProcess created: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp "C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp" /SL5="$203EE,7563488,777728,C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeProcess created: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp "C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp" /SL5="$203EE,7563488,777728,C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe" Jump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpWindow found: window name: TMainFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpAutomated click: OK
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: TSD_ESign_Window_7_V2.5.8.exeStatic file information: File size 8394434 > 1048576
Source: TSD_ESign_Window_7_V2.5.8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: >{app}\com.tsd.einvoice.host.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: >{app}\com.tsd.einvoice.core.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ESignLibrary.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002513000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\com.tsd.einvoice.core.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002521000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\com.tsd.einvoice.host.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.0000000002521000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\EinvoiceSignLib.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: 2{app}\EinvoiceSignLib.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: ,{app}\ESignLibrary.pdb source: TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmp
Source: TSD_ESign_Window_7_V2.5.8.exeStatic PE information: section name: .didata
Source: TSD_ESign_Window_7_V2.5.8.tmp.0.drStatic PE information: section name: .didata
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeFile created: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpJump to dropped file
Source: C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmpProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Owner/User Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TSD_ESign_Window_7_V2.5.8.exe3%ReversingLabs
TSD_ESign_Window_7_V2.5.8.exe3%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
50.23.12.20.in-addr.arpa1%VirustotalBrowse
15.164.165.52.in-addr.arpa1%VirustotalBrowse
SourceDetectionScannerLabelLink
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%URL Reputationsafe
https://www.remobjects.com/ps0%URL Reputationsafe
https://www.innosetup.com/0%URL Reputationsafe
https://einvoice.com.vn/0https://einvoice.com.vn/0https://einvoice.com.vn/0%Avira URL Cloudsafe
https://einvoice.com.vn/0%Avira URL Cloudsafe
https://einvoice.com.vn/9jO0%Avira URL Cloudsafe
https://einvoice.com.vn/Ah10%Avira URL Cloudsafe
https://einvoice.com.vn/0%VirustotalBrowse
https://einvoice.com.vn/0https://einvoice.com.vn/0https://einvoice.com.vn/0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalseunknown
50.23.12.20.in-addr.arpa
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://einvoice.com.vn/Ah1TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2287199763.0000000002316000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUTSD_ESign_Window_7_V2.5.8.exefalse
  • URL Reputation: safe
unknown
https://www.remobjects.com/psTSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2085354992.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2084953815.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000000.2087006183.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TSD_ESign_Window_7_V2.5.8.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://einvoice.com.vn/0https://einvoice.com.vn/0https://einvoice.com.vn/TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2083906504.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2088903156.0000000003480000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://einvoice.com.vn/9jOTSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.innosetup.com/TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2085354992.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2084953815.0000000002590000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000000.2087006183.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TSD_ESign_Window_7_V2.5.8.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://einvoice.com.vn/TSD_ESign_Window_7_V2.5.8.exe, 00000000.00000003.2287199763.0000000002316000.00000004.00001000.00020000.00000000.sdmp, TSD_ESign_Window_7_V2.5.8.tmp, 00000002.00000003.2281772665.00000000024F6000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447095
Start date and time:2024-05-24 11:25:31 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:TSD_ESign_Window_7_V2.5.8.exe
Detection:CLEAN
Classification:clean1.winEXE@3/2@2/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmpWRnJsnI1Zq.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
    WRnJsnI1Zq.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
      SecuriteInfo.com.Trojan.StarterNET.7.17684.18588.exeGet hashmaliciousCrypt888Browse
        FakeWinlogon.7zGet hashmaliciousUnknownBrowse
          gMlTpkS9Oz.exeGet hashmaliciousUnknownBrowse
            https://mirror.leitecastro.com/gimp/gimp/v2.10/windows/gimp-2.10.38-setup.exeGet hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousAmadeyBrowse
                FAC_Agent_Setup_v5.2.exeGet hashmaliciousUnknownBrowse
                  FAC_Agent_Setup_v5.1.exe.7zGet hashmaliciousUnknownBrowse
                    FAC_Agent_Setup_v5.1.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3110400
                      Entropy (8bit):6.363423388609037
                      Encrypted:false
                      SSDEEP:49152:hdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjA333Df:yHDYsqiPRhINnq95FoHVBA333z
                      MD5:597E3D6ECAED5553CFA6875DBF9D5354
                      SHA1:0645C4C106132DC5BDB77ABBABE68F9AFA8C0CFA
                      SHA-256:B624055EA451566B673DB13F1E265DD439074008D0031D25885E7C6270E9D203
                      SHA-512:71F9E693BEE431A9AB39CC282C574B33C14BE81868B610252305C900AEF78D79C851541DB49A9CEF7AE9035E97703ABBAED6036F943A5BF546E85A5B58668F7B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 1%, Browse
                      Reputation:low
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,..0......`V,......`,...@..........................`0...........@......@....................-.......-..9.......T....................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc....T.......T..."-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.720366600008286
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Joe Sandbox View:
                      • Filename: WRnJsnI1Zq.exe, Detection: malicious, Browse
                      • Filename: WRnJsnI1Zq.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.Trojan.StarterNET.7.17684.18588.exe, Detection: malicious, Browse
                      • Filename: FakeWinlogon.7z, Detection: malicious, Browse
                      • Filename: gMlTpkS9Oz.exe, Detection: malicious, Browse
                      • Filename: , Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: FAC_Agent_Setup_v5.2.exe, Detection: malicious, Browse
                      • Filename: FAC_Agent_Setup_v5.1.exe.7z, Detection: malicious, Browse
                      • Filename: FAC_Agent_Setup_v5.1.exe, Detection: malicious, Browse
                      Reputation:high, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.962828763746405
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 98.45%
                      • Inno Setup installer (109748/4) 1.08%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      File name:TSD_ESign_Window_7_V2.5.8.exe
                      File size:8'394'434 bytes
                      MD5:f28b80dd90a08f60c3b1e1853780e5c2
                      SHA1:fcc18510d38551a22b04b16467157a7da3c379a7
                      SHA256:94c898b8c78342205b126e8e90d1c2a2f4ca683f92d22213b82c5f24dfa5c8ec
                      SHA512:475f710d44939434d751ba55a9ba57aa05bb270ed7311dfc6af207d85ba4b64ea60f169423a52941908d7179217df4a3de6703af67b046d2f8dcc2480a216b93
                      SSDEEP:196608:bF3TXBoAPGn7K12WypzOOzXAMQCBuEkZFCbFe:p37bGnRWAzk+bI
                      TLSH:B586233FB268763EC5AA1B3245B39660D97B7661A81A8D0F43F0484CCF265701E3FB56
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:2723212121212303
                      Entrypoint:0x4b5eec
                      Entrypoint Section:.itext
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6258476F [Thu Apr 14 16:10:23 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:1
                      File Version Major:6
                      File Version Minor:1
                      Subsystem Version Major:6
                      Subsystem Version Minor:1
                      Import Hash:e569e6f445d32ba23766ad67d1e3787f
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFA4h
                      push ebx
                      push esi
                      push edi
                      xor eax, eax
                      mov dword ptr [ebp-3Ch], eax
                      mov dword ptr [ebp-40h], eax
                      mov dword ptr [ebp-5Ch], eax
                      mov dword ptr [ebp-30h], eax
                      mov dword ptr [ebp-38h], eax
                      mov dword ptr [ebp-34h], eax
                      mov dword ptr [ebp-2Ch], eax
                      mov dword ptr [ebp-28h], eax
                      mov dword ptr [ebp-14h], eax
                      mov eax, 004B14B8h
                      call 00007F82E4DA0775h
                      xor eax, eax
                      push ebp
                      push 004B65E2h
                      push dword ptr fs:[eax]
                      mov dword ptr fs:[eax], esp
                      xor edx, edx
                      push ebp
                      push 004B659Eh
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      mov eax, dword ptr [004BE634h]
                      call 00007F82E4E43267h
                      call 00007F82E4E42DBAh
                      lea edx, dword ptr [ebp-14h]
                      xor eax, eax
                      call 00007F82E4DB6214h
                      mov edx, dword ptr [ebp-14h]
                      mov eax, 004C1D84h
                      call 00007F82E4D9B367h
                      push 00000002h
                      push 00000000h
                      push 00000001h
                      mov ecx, dword ptr [004C1D84h]
                      mov dl, 01h
                      mov eax, dword ptr [004238ECh]
                      call 00007F82E4DB7397h
                      mov dword ptr [004C1D88h], eax
                      xor edx, edx
                      push ebp
                      push 004B654Ah
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      call 00007F82E4E432EFh
                      mov dword ptr [004C1D90h], eax
                      mov eax, dword ptr [004C1D90h]
                      cmp dword ptr [eax+0Ch], 01h
                      jne 00007F82E4E4950Ah
                      mov eax, dword ptr [004C1D90h]
                      mov edx, 00000028h
                      call 00007F82E4DB7C8Ch
                      mov edx, dword ptr [004C1D90h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x3808.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xc70000x38080x3a00e1d984b6b06f50c28c8cfd09a0802f85False0.3194369612068966data4.510907568352122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc74380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.39361702127659576
                      RT_STRING0xc78a00x360data0.34375
                      RT_STRING0xc7c000x260data0.3256578947368421
                      RT_STRING0xc7e600x45cdata0.4068100358422939
                      RT_STRING0xc82bc0x40cdata0.3754826254826255
                      RT_STRING0xc86c80x2d4data0.39226519337016574
                      RT_STRING0xc899c0xb8data0.6467391304347826
                      RT_STRING0xc8a540x9cdata0.6410256410256411
                      RT_STRING0xc8af00x374data0.4230769230769231
                      RT_STRING0xc8e640x398data0.3358695652173913
                      RT_STRING0xc91fc0x368data0.3795871559633027
                      RT_STRING0xc95640x2a4data0.4275147928994083
                      RT_RCDATA0xc98080x10data1.5
                      RT_RCDATA0xc98180x2c4data0.6384180790960452
                      RT_RCDATA0xc9adc0x2cdata1.1818181818181819
                      RT_GROUP_ICON0xc9b080x14dataEnglishUnited States1.25
                      RT_VERSION0xc9b1c0x584dataEnglishUnited States0.29320113314447593
                      RT_MANIFEST0xca0a00x765XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39091389329107235
                      DLLImport
                      kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                      comctl32.dllInitCommonControls
                      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                      netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                      advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                      NameOrdinalAddress
                      TMethodImplementationIntercept30x4541a8
                      __dbk_fcall_wrapper20x40d0a0
                      dbkFCallWrapperAddr10x4be63c
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      May 24, 2024 11:26:54.163166046 CEST5351855162.159.36.2192.168.2.6
                      May 24, 2024 11:26:54.655759096 CEST5261753192.168.2.61.1.1.1
                      May 24, 2024 11:26:54.702935934 CEST53526171.1.1.1192.168.2.6
                      May 24, 2024 11:26:56.591170073 CEST5655453192.168.2.61.1.1.1
                      May 24, 2024 11:26:56.600403070 CEST53565541.1.1.1192.168.2.6
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      May 24, 2024 11:26:54.655759096 CEST192.168.2.61.1.1.10x3f9fStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                      May 24, 2024 11:26:56.591170073 CEST192.168.2.61.1.1.10xec94Standard query (0)50.23.12.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      May 24, 2024 11:26:54.702935934 CEST1.1.1.1192.168.2.60x3f9fName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                      May 24, 2024 11:26:56.600403070 CEST1.1.1.1192.168.2.60xec94Name error (3)50.23.12.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:05:26:18
                      Start date:24/05/2024
                      Path:C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"
                      Imagebase:0x400000
                      File size:8'394'434 bytes
                      MD5 hash:F28B80DD90A08F60C3B1E1853780E5C2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:2
                      Start time:05:26:18
                      Start date:24/05/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp" /SL5="$203EE,7563488,777728,C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"
                      Imagebase:0x400000
                      File size:3'110'400 bytes
                      MD5 hash:597E3D6ECAED5553CFA6875DBF9D5354
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      • Detection: 1%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      No disassembly