Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
testvec.exe

Overview

General Information

Sample name:testvec.exe
Analysis ID:1448272
MD5:7e0c85852b2cd932626fcf284ca72978
SHA1:c8ccf6e20cde537f3da64aebd1f80b144a4c8e0a
SHA256:9a977571296ae1548c32df94be75eec2a414798bee7064b0bf44859e886a0cfa
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • testvec.exe (PID: 7752 cmdline: "C:\Users\user\Desktop\testvec.exe" MD5: 7E0C85852B2CD932626FCF284CA72978)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: testvec.exeVirustotal: Detection: 6%Perma Link
Source: testvec.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: testvec.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: testvec.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: testvec.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: testvec.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: testvec.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: testvec.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: testvec.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: testvec.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: testvec.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_004010000_2_00401000
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_004024A00_2_004024A0
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00402A100_2_00402A10
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_004026300_2_00402630
Source: testvec.exeStatic PE information: invalid certificate
Source: testvec.exe, 00000000.00000000.1323388326.0000000000407000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTEST.EXED vs testvec.exe
Source: testvec.exe, 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTEST.EXED vs testvec.exe
Source: testvec.exeBinary or memory string: OriginalFilenameTEST.EXED vs testvec.exe
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\testvec.exeFile created: C:\Users\user\AppData\Local\Temp\loader.logJump to behavior
Source: testvec.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\testvec.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: testvec.exeVirustotal: Detection: 6%
Source: C:\Users\user\Desktop\testvec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\testvec.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\testvec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\testvec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\testvec.exeSection loaded: profapi.dllJump to behavior
Source: testvec.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: testvec.exeStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00407144 push rdi; retf 0_2_0040714F
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00407124 push rsi; retf 0_2_00407137
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00407164 push rbp; retf 0_2_00407177
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_0040714C push rsi; retf 0_2_00407157
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_0040712C push rsi; retf 0_2_00407137
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00407174 push rbp; retf 0_2_00407177
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_0040713C push rbp; retf 0_2_0040713F
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_0040711C push rsi; retf 0_2_00407127
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: testvec.exe, 00000000.00000002.1323850520.00000000006F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\testvec.exeAPI call chain: ExitProcess graph end nodegraph_0-284
Source: C:\Users\user\Desktop\testvec.exeAPI call chain: ExitProcess graph end nodegraph_0-294
Source: C:\Users\user\Desktop\testvec.exeAPI call chain: ExitProcess graph end nodegraph_0-287
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\testvec.exeCode function: 0_2_00402880 CreateFileA,GetLocalTime,GetDateFormatA,WriteFile,WriteFile,FlushFileBuffers,FlushFileBuffers,WriteFile,FlushFileBuffers,GetTimeFormatA,WriteFile,FlushFileBuffers,0_2_00402880
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
testvec.exe8%ReversingLabs
testvec.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1448272
Start date and time:2024-05-28 07:48:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:testvec.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):4.08024962025428
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:testvec.exe
File size:89'392 bytes
MD5:7e0c85852b2cd932626fcf284ca72978
SHA1:c8ccf6e20cde537f3da64aebd1f80b144a4c8e0a
SHA256:9a977571296ae1548c32df94be75eec2a414798bee7064b0bf44859e886a0cfa
SHA512:04e38c62d83f963e7ba6859269f060fa8b530072cb9d816a0d5320db3f1f4a61db6f820e7ae33c212a0ff7c70aac0f4f670e26f81c1973ca8e168326e311e057
SSDEEP:768:h8JqGaVJ2wSS9KnDUyLDU8uoB/qW1cGerHyKvu1YbTgocJOsr4+9iocUf2hb:9kS9KBL1cvrHyKvu1Gsr4siDUf
TLSH:ED936F93A680A03FC9CFF6365912B9A317A53C0CD954371EE791B2F4DE31E403A90267
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......]........../...... ....................@....................................." ....`... ............................
Icon Hash:4cf4eb164f4c311f
Entrypoint:0x401000
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x5DE0FDFE [Fri Nov 29 11:16:14 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:cd7d90d884561e880b8d39a2eaa4c342
Signature Valid:false
Signature Issuer:CN=TrustLand Ltd. Root CA, OU=TrustLand Ltd. Root CA, O=TrustLand Ltd., L=Europe, C=UK, DC=trustland, DC=com
Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
Error Number:-2146762487
Not Before, Not After
  • 29/11/2019 12:35:54 28/11/2022 12:35:54
Subject Chain
  • CN=TrustLand Ltd. Code Signing Authority, OU=TrustLand Ltd. Code Signing Authority, O=TrustLand Ltd.
Version:3
Thumbprint MD5:73D9BCC701F7B3064441374B78DA44F7
Thumbprint SHA-1:8A6F25D4B6D35D8B31080BF273585C84BC698DCE
Thumbprint SHA-256:6FFDC787567050D60E3FC86F33B8934E730FF32698526E9F27DE98E43EBD8D5E
Serial:73B17D4E80A3FDF5AA6AF2480C46418F4CE747F4
Instruction
inc ecx
push edi
inc ecx
push esi
inc ecx
push ebp
inc ecx
push esp
push ebp
push edi
push esi
push ebx
dec eax
sub esp, 000006B8h
inc ebp
xor ecx, ecx
inc ebp
xor eax, eax
xor ecx, ecx
mov edx, 00000028h
dec eax
lea esi, dword ptr [esp+00000510h]
dec eax
mov dword ptr [esp+20h], esi
call dword ptr [00006159h]
test eax, eax
js 00007F08D903B588h
mov ecx, 00000001h
xor eax, eax
dec eax
mov edx, esi
dec eax
sub ecx, esi
cmp byte ptr [esp+00000510h], 00000000h
je 00007F08D903B1CDh
nop word ptr [eax+eax+00000000h]
nop dword ptr [eax]
dec eax
lea eax, dword ptr [edx+ecx]
dec eax
add edx, 01h
cmp byte ptr [edx], 00000000h
jne 00007F08D903B1A5h
mov eax, eax
mov ecx, 00000041h
dec eax
lea edx, dword ptr [00002F8Dh]
inc ecx
mov eax, 0000005Ch
dec eax
add eax, esi
jmp 00007F08D903B1C3h
nop word ptr [eax+eax+00000000h]
inc ecx
mov eax, ecx
movzx ecx, byte ptr [edx+01h]
dec eax
add eax, 01h
dec eax
add edx, 01h
inc esp
mov byte ptr [eax-01h], al
test cl, cl
jne 00007F08D903B19Bh
dec eax
mov dword ptr [esp+30h], 00000000h
inc ebp
xor ecx, ecx
inc ecx
mov eax, 00000005h
dec eax
mov ecx, esi
mov dword ptr [esp+28h], 20000102h
mov edx, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x70000x360.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x10bf8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x48.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x13e000x1f30.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x71140xb0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1f600x20001a2109352808517e8b18462d8629dfbaFalse0.54833984375data5.70720079667084IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x30000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x40000x2e00x400ea334197dbeb12e5933b240fd07d010cFalse0.740234375data6.237217583105469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.pdata0x50000x480x200d437eadcec7949db39492b86db2952acFalse0.13671875data0.6094161052416324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.xdata0x60000x740x20005424220bf68dbc01beaf59a20f5ca4aFalse0.21484375data1.6219178152915887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.idata0x70000x3600x40096cadc0bb624679e53291c6e705417c7False0.369140625data3.165294663901878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x80000x10bf80x10c00bfd0e301d1bde78ee9e730fd7fb11feeFalse0.08169601212686567data2.864648863579679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x80e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishUnited States0.07618596947829173
RT_GROUP_ICON0x189100x14dataEnglishUnited States1.15
RT_VERSION0x189280x2d0dataEnglishUnited States0.4722222222222222
DLLImport
KERNEL32.dllCreateFileA, ExitProcess, FlushFileBuffers, GetDateFormatA, GetFileSize, GetLocalTime, GetModuleFileNameA, GetTimeFormatA, ReadFile, SetStdHandle, Sleep, VirtualAlloc, VirtualProtect, WriteFile
SHFOLDER.dllSHGetFolderPathA
USER32.dllCharUpperBuffA
WS2_32.dllWSAStartup, getaddrinfo
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:48:54
Start date:28/05/2024
Path:C:\Users\user\Desktop\testvec.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\testvec.exe"
Imagebase:0x400000
File size:89'392 bytes
MD5 hash:7E0C85852B2CD932626FCF284CA72978
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:17.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:96.7%
    Total number of Nodes:60
    Total number of Limit Nodes:6
    execution_graph 283 401000 SHGetFolderPathA 284 40140d ExitProcess 283->284 285 40103b CreateFileA 283->285 287 401418 ExitProcess 285->287 288 4010eb 285->288 343 402880 GetLocalTime GetDateFormatA 288->343 290 4010f0 348 402800 290->348 292 401104 WSAStartup 294 401402 ExitProcess 292->294 295 401162 GetModuleFileNameA 292->295 296 401191 CharUpperBuffA 295->296 297 402478 295->297 296->297 301 4011ce 296->301 299 402471 300 402880 9 API calls 328 401423 300->328 301->299 302 402800 2 API calls 301->302 301->328 303 4012e4 302->303 304 402800 2 API calls 303->304 305 4012f4 304->305 307 402800 2 API calls 305->307 306 402800 WriteFile FlushFileBuffers 306->328 308 401300 307->308 310 402800 2 API calls 308->310 309 402800 2 API calls 311 401575 getaddrinfo 309->311 312 40130c 310->312 317 401b74 311->317 311->328 313 402800 2 API calls 312->313 314 401314 313->314 316 402800 2 API calls 314->316 315 402800 WriteFile FlushFileBuffers 315->317 318 401320 CreateFileA GetFileSize VirtualAlloc 316->318 317->315 319 402800 2 API calls 317->319 320 401391 318->320 318->328 321 401b94 Sleep 319->321 322 4013cc ReadFile 320->322 320->328 321->311 322->320 323 4013f7 ExitProcess 322->323 324 4022aa 325 402800 2 API calls 324->325 326 4022b6 325->326 327 402800 2 API calls 326->327 329 4022bf 327->329 328->300 328->306 328->309 328->311 328->324 337 401ba4 328->337 330 402800 2 API calls 329->330 330->337 331 4023c5 332 4023ca VirtualProtect 331->332 333 402880 9 API calls 332->333 334 4023f6 333->334 335 402800 2 API calls 334->335 336 402402 335->336 338 402800 2 API calls 336->338 337->331 337->332 337->337 339 40242c 338->339 340 402800 2 API calls 339->340 341 402438 SetStdHandle SetStdHandle 340->341 342 402469 ExitProcess 341->342 344 4028ef WriteFile FlushFileBuffers WriteFile FlushFileBuffers GetTimeFormatA 343->344 346 402996 WriteFile FlushFileBuffers 344->346 346->290 350 40280c WriteFile FlushFileBuffers 348->350 350->292

    Callgraph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID: ExitFileProcess$BuffCharCreateFolderModuleNamePathStartupUpper
    • String ID: $ Retry$.BIN$: LAUNCH$: Launch... $: Try: $Basename: $Decrypting $Failed: $Input file: $\AppData\\Local\\Temp\\loader.log$azure.microsoft.com$http
    • API String ID: 102095214-2876707994
    • Opcode ID: 41087516d0a7382021d80091c5f23595a174f3f87c4c0fd34dc92d1fe67bf54a
    • Instruction ID: 95658e137f340f4a494c528737d3ef8c2698eceb53be4511814140567903336b
    • Opcode Fuzzy Hash: 41087516d0a7382021d80091c5f23595a174f3f87c4c0fd34dc92d1fe67bf54a
    • Instruction Fuzzy Hash: 0FA2DE72719BD086DB308B25E4447AABBA0F789B84F44812ADFCD67B99DB3DC145CB04

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 203 402880-4028e9 GetLocalTime GetDateFormatA 204 4029f0-4029f3 203->204 205 4028ef-4028fa 203->205 207 40290d-402994 WriteFile FlushFileBuffers WriteFile FlushFileBuffers GetTimeFormatA 204->207 206 402900-40290b 205->206 206->206 206->207 208 402a00-402a03 207->208 209 402996-4029ac 207->209 211 4029bd-4029ec WriteFile FlushFileBuffers 208->211 210 4029b0-4029bb 209->210 210->210 210->211
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID: File$BuffersFlushWrite$FormatTime$DateLocal
    • String ID:
    • API String ID: 349335677-0
    • Opcode ID: e52f5cf739d24a76ee28413ae1b9debb60832dc5f2c890d1e61afade3f67b619
    • Instruction ID: 71c8b01572e34755489ba76d4023017d1ad8c2c004aaeb0349453908e2991f0c
    • Opcode Fuzzy Hash: e52f5cf739d24a76ee28413ae1b9debb60832dc5f2c890d1e61afade3f67b619
    • Instruction Fuzzy Hash: E33181B2614A8485E7208F51F91479ABB60F389789F484132DF8D277D8CFBDC549C748

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 212 402800-40280a 213 402870-402873 212->213 214 40280c-40280f 212->214 216 402833-402860 WriteFile FlushFileBuffers 213->216 214->213 215 402811-40281a 214->215 217 40282e-402831 215->217 217->216 218 402820-402829 217->218 218->216 219 40282b 218->219 219->217
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID: File$BuffersFlushWrite
    • String ID:
    • API String ID: 1012034594-0
    • Opcode ID: a97c07eda4a0a53a70f4e141aca702407c86102d821ce71e9a9899db51a7829b
    • Instruction ID: a597425ef4634b2b882578b8714d0733edaf96c88882fa2e568bbfde784e65fe
    • Opcode Fuzzy Hash: a97c07eda4a0a53a70f4e141aca702407c86102d821ce71e9a9899db51a7829b
    • Instruction Fuzzy Hash: 06F082AA51AA4084EB11EB51D50C7656720A346785FC4C223CB4E227D08BBCC545C749

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 232 402a10-402d77 233 402d80-402d8b 232->233 234 402d8e-402daf 233->234 235 402dc0-402dc3 234->235 236 402db1-402db8 234->236 237 402dc6-402e15 235->237 236->234 238 402e17-402e28 237->238 239 402e2a-402e32 237->239 238->238 238->239 240 402e40-402e61 239->240 241 402e34-402e3b 239->241 242 402e80-402e90 240->242 241->237 243 402e70-402e7d 242->243 244 402e92 242->244 243->242 245 402e97-402e9a 244->245 246 402e9d-402eaf 245->246 246->246 247 402eb1-402eb4 246->247 248 402eb6-402efc 247->248 248->248 249 402efe-402f05 248->249 249->245 250 402f07-402f17 249->250 251 402f19-402f25 250->251 252 402f2a-402f3d 250->252 251->233
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ec13ac4e99fbb62a0ce8a52716004b121548a743d60f6041e31b6fed0c80df13
    • Instruction ID: 32dee86cc3c6679ca2ae3ede7a95360dd6cf43dec582ea4ea53ff3567f8040fb
    • Opcode Fuzzy Hash: ec13ac4e99fbb62a0ce8a52716004b121548a743d60f6041e31b6fed0c80df13
    • Instruction Fuzzy Hash: C8B1397260ABC485DBA1CB05F9447DAB3A4F788784F50822ADACD57B88EF7DC195CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 253 402630-402645 254 402650-402665 253->254 254->254 255 402667-4027af 254->255 256 4027b0-4027c1 255->256 256->256 257 4027c3-4027c8 256->257 258 4027d5-4027e5 257->258 259 4027d0 258->259 260 4027e7-4027f5 258->260 259->258
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ee30d71fabf80c46d13d5c6313867e08a1b0bf766293a02cf630f90dcdd7dff0
    • Instruction ID: c94b62c77fb9e09193b4c7fdfaa43efc77afbaacc5cf42c774524456296f9277
    • Opcode Fuzzy Hash: ee30d71fabf80c46d13d5c6313867e08a1b0bf766293a02cf630f90dcdd7dff0
    • Instruction Fuzzy Hash: 4B418A0372C7E414E7238E712610F6BBE60B7AA744F8BB091EF82A2B91D579CC25D650

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 261 4024a0-4024be 262 4024c0-4024d5 261->262 262->262 263 4024d7-4025dd 262->263 264 4025e0-4025f1 263->264 264->264 265 4025f3-4025f8 264->265 266 402605-402615 265->266 267 402600 266->267 268 402617-402623 266->268 267->266
    Memory Dump Source
    • Source File: 00000000.00000002.1323776146.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1323764687.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323788325.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323810145.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1323821040.0000000000408000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_testvec.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 91a772e3fdd01b62430eaf906795f9e9889f0cf0c30ccbdf12ce755e7dd1a436
    • Instruction ID: 6851c6e90eb0b784e851e34f065c2ab92b56c3cb298fc26e4bc8e7469b2f4c10
    • Opcode Fuzzy Hash: 91a772e3fdd01b62430eaf906795f9e9889f0cf0c30ccbdf12ce755e7dd1a436
    • Instruction Fuzzy Hash: CB31771372C7E459E7234E312920F5BBE90B39A744FCBA091EFC652B92D629CC25D750