Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Microsoft.exe

Overview

General Information

Sample name:Microsoft.exe
Analysis ID:1448270
MD5:4479cc492fa443af1461ebd768dcd1c3
SHA1:5ebf1dbcd5e16bcd4695777a7931ff4dc13d586a
SHA256:e27d1bab901c1bb414d0849c5c132faa8c7c6a61357d9627a7d2785270034793
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected potential crypto function
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • Microsoft.exe (PID: 3976 cmdline: "C:\Users\user\Desktop\Microsoft.exe" MD5: 4479CC492FA443AF1461EBD768DCD1C3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Microsoft.exeReversingLabs: Detection: 18%
Source: Microsoft.exeVirustotal: Detection: 20%Perma Link
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: rlw.gov.ru
Source: global trafficDNS traffic detected: DNS query: cittrans.gov.ru
Source: C:\Users\user\Desktop\Microsoft.exeCode function: 0_2_004010000_2_00401000
Source: C:\Users\user\Desktop\Microsoft.exeCode function: 0_2_00402BD00_2_00402BD0
Source: C:\Users\user\Desktop\Microsoft.exeCode function: 0_2_00402D500_2_00402D50
Source: classification engineClassification label: mal48.winEXE@1/0@5/0
Source: Microsoft.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Microsoft.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Microsoft.exeReversingLabs: Detection: 18%
Source: Microsoft.exeVirustotal: Detection: 20%
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Microsoft.exeSection loaded: rasadhlp.dllJump to behavior
Source: Microsoft.exeStatic PE information: section name: .xdata
Source: Microsoft.exe, 00000000.00000002.2253219551.0000000000753000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Microsoft.exeAPI call chain: ExitProcess graph end nodegraph_0-259
Source: C:\Users\user\Desktop\Microsoft.exeAPI call chain: ExitProcess graph end nodegraph_0-264
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Microsoft.exe18%ReversingLabs
Microsoft.exe20%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
rlw.gov.ru0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
rlw.gov.ru
194.226.91.17
truefalseunknown
cittrans.gov.ru
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1448270
    Start date and time:2024-05-28 07:47:11 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Microsoft.exe
    Detection:MAL
    Classification:mal48.winEXE@1/0@5/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 2
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
    Entropy (8bit):3.4520654166235807
    TrID:
    • Win64 Executable (generic) (12005/4) 74.80%
    • Generic Win/DOS Executable (2004/3) 12.49%
    • DOS Executable Generic (2002/1) 12.47%
    • VXD Driver (31/22) 0.19%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
    File name:Microsoft.exe
    File size:81'920 bytes
    MD5:4479cc492fa443af1461ebd768dcd1c3
    SHA1:5ebf1dbcd5e16bcd4695777a7931ff4dc13d586a
    SHA256:e27d1bab901c1bb414d0849c5c132faa8c7c6a61357d9627a7d2785270034793
    SHA512:9616bb3025ec62bec858b282febc0c229f3bf6453daa850c0a47e55f3a7147f1142b113af750d02c87041942fbc467fb220be2a34d69d7b2b04bdfea9446e341
    SSDEEP:768:3+Smo5ThV4yLDU8uoB/qW1cGerHyKvu1YbTgocJm:3PR5TVL1cvrHyKvu1u
    TLSH:2C831B836680917FC5CFF5365902B9A653A63C0DCA98331EEBE0B2F5ED31E413A90257
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......c........../....". ....................@............................................... ............................
    Icon Hash:4cf4eb164f4c311f
    Entrypoint:0x401000
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
    DLL Characteristics:
    Time Stamp:0x63878A0D [Wed Nov 30 16:51:25 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:c780720f489db1bb1bd4cd626443ef53
    Instruction
    inc ecx
    push edi
    inc ecx
    push esi
    inc ecx
    push ebp
    inc ecx
    push esp
    push ebp
    push edi
    push esi
    push ebx
    dec eax
    sub esp, 000008B8h
    dec esp
    lea ebp, dword ptr [esp+00000220h]
    dec eax
    lea edx, dword ptr [esp+000002E8h]
    dec esp
    mov eax, ebp
    nop word ptr [eax+eax+00000000h]
    dec eax
    mov dword ptr [eax], 00000000h
    dec eax
    add eax, 08h
    dec eax
    cmp edx, eax
    jne 00007FDFCC5084B2h
    dec esp
    lea esp, dword ptr [esp+000003F0h]
    xor ecx, ecx
    dec eax
    mov eax, 00000000h
    mov byte ptr [eax], al
    add byte ptr [eax], al
    mov dword ptr [esp+000002F0h], 00000020h
    dec esp
    mov edx, esp
    dec eax
    mov dword ptr [esp+000002E8h], eax
    inc ecx
    mov eax, 00000104h
    call dword ptr [00006082h]
    xor edx, edx
    cmp byte ptr [esp+000003F0h], 00000000h
    je 00007FDFCC5084D3h
    nop word ptr [eax+eax+00h]
    dec eax
    add edx, 01h
    inc ecx
    cmp byte ptr [esp+edx], 00000000h
    jne 00007FDFCC5084B7h
    dec esp
    mov ecx, esp
    call dword ptr [0000608Ch]
    movzx edx, byte ptr [esp+000003F0h]
    test dl, dl
    je 00007FDFCC508A7Eh
    xor ebx, ebx
    dec esp
    mov eax, esp
    nop dword ptr [eax+00000000h]
    cmp dl, 0000005Ch
    dec eax
    cmove ebx, eax
    movzx edx, byte ptr [eax+01h]
    dec eax
    add eax, 01h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x70000x298.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x10c60.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x30.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x70d80x88.idata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1f800x2000c3a5634a965f53920c9712b3b80627c8False0.531494140625data5.701983356679127IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x30000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0x40000x2400x4002a3e4b5db64f36bf8c3f77836fed2d51False0.5859375data5.261669379505367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
    .pdata0x50000x300x200883a4072c197c3f342544940be152728False0.09765625data0.4107275827862831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
    .xdata0x60000x480x200c213a6b1d40dcdcf55d8be0df376f489False0.16796875data1.112780143712075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
    .idata0x70000x2980x4009deaaf603c81764623999dfaececea95False0.3017578125data2.527998666694306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x80000x10c600x10e00018a35621be7dfd2a2c1d3bb4fe5cbc1False0.08135127314814815data2.861460403564236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x80e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishUnited States0.07618596947829173
    RT_GROUP_ICON0x189100x14dataEnglishUnited States1.15
    RT_VERSION0x189280x334dataEnglishUnited States0.4378048780487805
    DLLImport
    KERNEL32.dllCloseHandle, CreateFileA, ExitProcess, GetFileSize, GetModuleFileNameA, ReadFile, SetCurrentDirectoryA, VirtualAlloc, VirtualProtect
    USER32.dllCharUpperBuffA
    WS2_32.dllWSAStartup, getaddrinfo, select, socket
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    May 28, 2024 07:48:15.891501904 CEST5034453192.168.2.61.1.1.1
    May 28, 2024 07:48:16.888448000 CEST5034453192.168.2.61.1.1.1
    May 28, 2024 07:48:16.922808886 CEST53503441.1.1.1192.168.2.6
    May 28, 2024 07:48:16.923104048 CEST53503441.1.1.1192.168.2.6
    May 28, 2024 07:48:16.929868937 CEST6522553192.168.2.61.1.1.1
    May 28, 2024 07:48:17.935818911 CEST6522553192.168.2.61.1.1.1
    May 28, 2024 07:48:18.935265064 CEST6522553192.168.2.61.1.1.1
    May 28, 2024 07:48:19.617230892 CEST53652251.1.1.1192.168.2.6
    May 28, 2024 07:48:19.617296934 CEST53652251.1.1.1192.168.2.6
    May 28, 2024 07:48:19.617331028 CEST53652251.1.1.1192.168.2.6
    May 28, 2024 07:48:50.520411968 CEST5365430162.159.36.2192.168.2.6
    May 28, 2024 07:48:51.006078005 CEST53602121.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    May 28, 2024 07:48:15.891501904 CEST192.168.2.61.1.1.10xd564Standard query (0)rlw.gov.ruA (IP address)IN (0x0001)false
    May 28, 2024 07:48:16.888448000 CEST192.168.2.61.1.1.10xd564Standard query (0)rlw.gov.ruA (IP address)IN (0x0001)false
    May 28, 2024 07:48:16.929868937 CEST192.168.2.61.1.1.10x4941Standard query (0)cittrans.gov.ruA (IP address)IN (0x0001)false
    May 28, 2024 07:48:17.935818911 CEST192.168.2.61.1.1.10x4941Standard query (0)cittrans.gov.ruA (IP address)IN (0x0001)false
    May 28, 2024 07:48:18.935265064 CEST192.168.2.61.1.1.10x4941Standard query (0)cittrans.gov.ruA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    May 28, 2024 07:48:16.922808886 CEST1.1.1.1192.168.2.60xd564No error (0)rlw.gov.ru194.226.91.17A (IP address)IN (0x0001)false
    May 28, 2024 07:48:16.923104048 CEST1.1.1.1192.168.2.60xd564No error (0)rlw.gov.ru194.226.91.17A (IP address)IN (0x0001)false
    May 28, 2024 07:48:19.617230892 CEST1.1.1.1192.168.2.60x4941Name error (3)cittrans.gov.runonenoneA (IP address)IN (0x0001)false
    May 28, 2024 07:48:19.617296934 CEST1.1.1.1192.168.2.60x4941Name error (3)cittrans.gov.runonenoneA (IP address)IN (0x0001)false
    May 28, 2024 07:48:19.617331028 CEST1.1.1.1192.168.2.60x4941Name error (3)cittrans.gov.runonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:01:48:04
    Start date:28/05/2024
    Path:C:\Users\user\Desktop\Microsoft.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\Microsoft.exe"
    Imagebase:0x400000
    File size:81'920 bytes
    MD5 hash:4479CC492FA443AF1461EBD768DCD1C3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:24.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:92.6%
      Total number of Nodes:27
      Total number of Limit Nodes:3
      execution_graph 246 401000 247 401030 246->247 247->247 248 401040 GetModuleFileNameA 247->248 249 401082 248->249 250 401093 CharUpperBuffA 248->250 249->250 254 4010ac 250->254 260 4010e9 250->260 251 401678 WSAStartup 252 401eb0 ExitProcess 251->252 253 40169c socket 251->253 267 4016d5 252->267 273 402f10 select 253->273 255 4024ad 254->255 257 4014c5 SetCurrentDirectoryA 254->257 254->260 259 4024b5 ExitProcess 255->259 257->260 258 4017c0 getaddrinfo 258->267 260->251 260->260 261 401d99 CreateFileA 261->252 262 401ded GetFileSize 261->262 262->259 263 401e0a VirtualAlloc 262->263 264 402bbb ExitProcess 263->264 263->267 265 4024c0 CloseHandle 272 4024eb 265->272 266 401e79 ReadFile 266->267 267->252 267->258 267->261 267->265 267->266 268 402f10 select 267->268 268->267 269 402b58 VirtualProtect 274 402f10 select 269->274 271 402b9c 271->252 272->269 272->272 273->267 274->271

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00401000 1 Function_00402F10 0->1 3 Function_00402BD0 0->3 4 Function_00402D50 0->4 2 Function_004070E0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2253094095.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2253072388.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253120642.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253141368.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253162226.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Microsoft.jbxd
      Similarity
      • API ID: BuffCharFileModuleNameUpper
      • String ID: $L5rq$exmime$http
      • API String ID: 2024523369-4033781917
      • Opcode ID: fda6a1ebeb8bbc88f0202863c705864052ecea1962c037d2e9480e84d60d6c06
      • Instruction ID: a7eae75b49dfe76f0e4b384eb9c34097596345727f328a9368a5c9fb50043dd5
      • Opcode Fuzzy Hash: fda6a1ebeb8bbc88f0202863c705864052ecea1962c037d2e9480e84d60d6c06
      • Instruction Fuzzy Hash: 5FD2B972609BC486EB708B15E4843EBB7A5F389B80F54812ACBCD17B99DB7DC195CB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 213 402f10-402f5c select
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2253094095.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2253072388.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253120642.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253141368.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253162226.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Microsoft.jbxd
      Similarity
      • API ID: select
      • String ID:
      • API String ID: 1274211008-0
      • Opcode ID: 2a4098458a8c2cb35fad1b7cac2d5629c39c79fed26ec4aa08ec1ed571751ffc
      • Instruction ID: f12ac92bff1b90914f4c94ed40f4158f28c41d847311acddae709b8a8fbd6bcc
      • Opcode Fuzzy Hash: 2a4098458a8c2cb35fad1b7cac2d5629c39c79fed26ec4aa08ec1ed571751ffc
      • Instruction Fuzzy Hash: 1BE04F72518A8186E750CF54F44530ABB70F3C6309F605125F78E02B68CB7EC1498F04

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 230 402d50-402d65 231 402d68-402d7d 230->231 231->231 232 402d7f-402ebc 231->232 233 402ec0-402ed1 232->233 233->233 234 402ed3-402ed8 233->234 235 402ee5-402ef5 234->235 236 402ee0 235->236 237 402ef7-402f05 235->237 236->235
      Memory Dump Source
      • Source File: 00000000.00000002.2253094095.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2253072388.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253120642.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253141368.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253162226.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Microsoft.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e0fbdace8097ad6a0b22db8b36f64628b62135057b020b2fe7f2f7e210d8aadb
      • Instruction ID: 51dad2888b17446189f75153c6636bb9b0c6803937f79e3226340b659f374049
      • Opcode Fuzzy Hash: e0fbdace8097ad6a0b22db8b36f64628b62135057b020b2fe7f2f7e210d8aadb
      • Instruction Fuzzy Hash: DE4179037287E455E7238E712610F2BBE60B79A744FCBB050EF82A2B91D539CC25D650

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 238 402bd0-402be3 239 402be8-402bfd 238->239 239->239 240 402bff-402cfa 239->240 241 402d00-402d11 240->241 241->241 242 402d13-402d18 241->242 243 402d25-402d35 242->243 244 402d20 243->244 245 402d37-402d43 243->245 244->243
      Memory Dump Source
      • Source File: 00000000.00000002.2253094095.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2253072388.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253120642.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253141368.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2253162226.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Microsoft.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 916d092a209338080c09f7482b56bd1e6b7769902148ba8868b49b6abee5b544
      • Instruction ID: 5b874d151858cf8b91a9a5c0710cbf7e44d03a968b00dec91ae8b55e95f59179
      • Opcode Fuzzy Hash: 916d092a209338080c09f7482b56bd1e6b7769902148ba8868b49b6abee5b544
      • Instruction Fuzzy Hash: F131881372C7E459E7234E313920E5BBE90B7A6704F8BA091EFC692B92D529CC25D750