Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Analysis ID:1467262
MD5:2808310786effc87a4359c778a73a7ee
SHA1:525f278678ad73a34c368f0afc4558ed0454f076
SHA256:33d9753ee9b3920352b743d72adfd62c969ab0619eb5673151f478ebdfa197a5
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe (PID: 6692 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe" MD5: 2808310786EFFC87A4359C778A73A7EE)
    • conhost.exe (PID: 6688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe (PID: 2700 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe MD5: 2808310786EFFC87A4359C778A73A7EE)
      • conhost.exe (PID: 3692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WerFault.exe (PID: 1684 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1036 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.pdb0 source: WER20ED.tmp.dmp.8.dr
Source: Binary string: ABC.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.pdbMZ@ source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: C:\Users\admin\Downloads\Disable WD (1)\ABC\ABC\obj\Release\ABC.pdb source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: Binary string: System.Core.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000000.00000002.2011623866.0000000003071000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000004.00000002.2415110679.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 0_2_013637500_2_01363750
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 0_2_01362E800_2_01362E80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 0_2_01362B380_2_01362B38
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 4_2_010E37504_2_010E3750
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 4_2_010E2E804_2_010E2E80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeCode function: 4_2_010E2B384_2_010E2B38
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1036
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000000.00000000.2005958310.0000000000C32000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameABC.exe( vs SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000000.00000002.2011110867.000000000138E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000004.00000002.2415110679.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameABC.exe( vs SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeBinary or memory string: OriginalFilenameABC.exe( vs SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: classification engineClassification label: mal52.winEXE@5/7@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe.logJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3692:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2700
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6688:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\745b9392-496b-44cd-8c79-53334d19ac0eJump to behavior
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Process Where ProcessID = 6692
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process.Handle=&quot;6692&quot;::GetOwner
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Process Where ProcessID = 2700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process.Handle=&quot;2700&quot;::GetOwner
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeReversingLabs: Detection: 39%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1036
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mscorlib.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.pdb0 source: WER20ED.tmp.dmp.8.dr
Source: Binary string: ABC.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.pdbMZ@ source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.pdb source: WER20ED.tmp.dmp.8.dr
Source: Binary string: C:\Users\admin\Downloads\Disable WD (1)\ABC\ABC\obj\Release\ABC.pdb source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Source: Binary string: System.Core.ni.pdbRSDS source: WER20ED.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdb source: WER20ED.tmp.dmp.8.dr
Source: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeStatic PE information: 0xFE70109B [Thu Apr 9 21:52:27 2105 UTC]
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 1360000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 2EB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 10E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: 4A20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe TID: 1200Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
Virtualization/Sandbox Evasion
Security Account Manager41
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467262 Sample: SecuriteInfo.com.Trojan.AVK... Startdate: 03/07/2024 Architecture: WINDOWS Score: 52 20 Multi AV Scanner detection for submitted file 2->20 22 Machine Learning detection for sample 2->22 7 SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe 2 2->7         started        process3 file4 18 SecuriteInfo.com.T...18071.13447.exe.log, CSV 7->18 dropped 10 SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe 1 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 WerFault.exe 21 16 10->14         started        16 conhost.exe 10->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe39%ReversingLabsByteCode-MSIL.Hacktool.EvilGDefByp
SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
  • URL Reputation: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000000.00000002.2011623866.0000000003071000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, 00000004.00000002.2415110679.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467262
Start date and time:2024-07-03 23:29:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Detection:MAL
Classification:mal52.winEXE@5/7@0/0
EGA Information:
  • Successful, ratio: 50%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 17
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe, PID 2700 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
TimeTypeDescription
17:30:35API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):1.0968912524126482
Encrypted:false
SSDEEP:192:WaAB2U5vbs80BU/Nh3Jxaac0zuiFWZ24IO8LbB:DAB2avbMBU/NfxaQzuiFWY4IO8XB
MD5:810471E6462F417EFC151D03C6C7CFF2
SHA1:3938381B0D88CF7490BE485816697A31FE20802D
SHA-256:E8D08A8EBCC62149BE444005F4487F52AC6C870419FDBD57FAE5973A4CADC7C9
SHA-512:1E2E815D15A4EC24EADAA0AB9CFC9CA49B2B3E34BD64478E04593D8D874901434BA9AEB25B429346D16E7F3B140BA545A9E7765879DFC194556D4DD264B71FC1
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.5.1.5.7.9.5.6.6.4.8.5.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.5.1.5.7.9.6.5.2.4.2.3.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.7.d.d.5.9.e.-.8.b.1.8.-.4.5.d.d.-.b.2.d.7.-.3.8.0.d.4.b.e.2.e.8.7.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.d.d.b.d.2.2.c.-.7.6.2.a.-.4.e.8.f.-.a.c.5.7.-.0.0.6.4.5.5.3.6.f.a.c.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...A.V.K.i.l.l.N.E.T...1...1.8.0.7.1...1.3.4.4.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.B.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.8.c.-.0.0.0.1.-.0.0.1.4.-.8.0.b.d.-.6.9.2.5.9.0.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.4.1.d.0.c.e.2.5.d.b.f.c.c.a.e.2.b.3.7.0.1.5.0.8.9.f.e.0.5.2.8.0.0.0.0.0.0.0.0.!.0.0.0.0.5.2.5.f.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Wed Jul 3 21:29:55 2024, 0x1205a4 type
Category:dropped
Size (bytes):182351
Entropy (8bit):3.92375323297168
Encrypted:false
SSDEEP:1536:qcNV/YpN4uE2aOwOnLTguuZYnSVXuJMAb4UstTdN2+yvCD/mOuBojRskM:qca4uEqwOnLTguuZGy+oNj2+y2jsk
MD5:E1AF11E02FF690085615C0FEBA89ED1B
SHA1:1B7E20890DE5BDFF4ECE7A8672E5FD988459634C
SHA-256:5D5038C6776B1455AA6CC476F8D2796E86A42617DA7A7B35D659E0922E97B76A
SHA-512:7B98CAFBAC0B1C543BDB71F8CE7AE79EDB5C415615F0C9E63741278981C34A810E8633BF694B0259AEB1B06D2AA4B93C106AE79B7051CE1861F290E3175788F7
Malicious:false
Reputation:low
Preview:MDMP..a..... .........f....................................<... ............@..........`.......8...........T............(..w...........\...........H ..............................................................................eJ....... ......GenuineIntel............T.............f.............................@..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):6474
Entropy (8bit):3.7326975038348666
Encrypted:false
SSDEEP:96:RSIU6o7wVetbpC86p1YZvQE/pZG5aM4UB89bpSvsfdojm:R6l7wVeJpC86bYZvyprB89bpssfdojm
MD5:5A7DED512758190AEF33B3DD95F1EF9E
SHA1:F4D52F88E9E2BD90A40C874FA43425A790DA32C9
SHA-256:1CCD0D3EE652F2B1FE1ED87076DD425B9A06D8F465A92F9AE531C879BC6F733F
SHA-512:E47CE737E7579A9A719CFF3E9A0DB32297E82317E62374C737206DF86D833226F7CF8F8CAD17C641C9CC91A7A4089AED595FF3FDAA049C5AE2927519F0D8AB27
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.7.0.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4885
Entropy (8bit):4.573024903466656
Encrypted:false
SSDEEP:48:cvIwWl8zsBJg77aI9JWWpW8VY2+Ym8M4JanTfdFFl3+q8vqnTfd5Pguod:uIjfTI7L37VdJCKiPguod
MD5:B6579F8FE09BD1BC0E171776A143E10B
SHA1:33428729A52FFBB949F62571956BF08691B9DF2D
SHA-256:C861A6F8FFD8A6793B452CA1D7C8E2477137C1C0C30A6CFB149ED299ED449775
SHA-512:0E76A795CCFB77C457340865765D9C0A7A983666B72D90420BDA75D6BAE5222BE7B69C4715FACEC50E94711CE9212E0095A8664C9DFAB85B37905ED65992DC47
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="395312" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
File Type:CSV text
Category:dropped
Size (bytes):443
Entropy (8bit):5.351576856885998
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTADzzAbDLIP12MUAvvrTL2MDpdGlD/SJx:Q3La/KDLI4MWuPTAWzAbDLI4MNldKZav
MD5:134F0668B8F37D560B4D8C617407BA79
SHA1:819571730A25D180A1F85F9991E7D00EE1927E1B
SHA-256:3705F978CF66225BC42AFA9C69006C3B81CB92DD77C08400E9C68FC35F140D57
SHA-512:F523F2F7CFB2EAF7E06D44C3E4824E5F89E61B08B7C15EB90BBB0D86F48ABDE43CF7578D64EE1BFC1F3EF66DD50B9A33E02BC5940A81E6E982EF5A29C7421274
Malicious:true
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421901170606553
Encrypted:false
SSDEEP:6144:tSvfpi6ceLP/9skLmb0OTFWSPHaJG8nAgeMZMMhA2fX4WABlEnNh0uhiTw:UvloTFW+EZMM6DFyf03w
MD5:E46C8C8BBE28DB32AF043EDC7C80559D
SHA1:A33771DE9E6EABCC7F56DB23F745F6F4BA5D7573
SHA-256:A27583522E3A6DE57D38C09025343A63FD24B99E08D824BAF9000F64EFBCE3DA
SHA-512:23E73CB299207D0716C973739D306CB3E7CE670C04826E4F0CEF967EC46A7EA7CAB388FE34796897268E4D538BB5B8C3BC85D9CE88A1C25ACE799EA1DBCE9AE6
Malicious:false
Reputation:low
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...%................................................................................................................................................................................................................................................................................................................................................$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
File Type:ASCII text, with CRLF, LF line terminators
Category:dropped
Size (bytes):161
Entropy (8bit):4.782912680724035
Encrypted:false
SSDEEP:3:WNEDkFrA7fws9qDgE+fMB4ZWv2rmD+oURrTKUE2gFFFrTKUE2ZKYQ5o:WsTbZ0DMHov2r5lKUe/F3KU/KZe
MD5:78BC86DDC54340834D55D50A02A65B68
SHA1:5FE10B581F51CA729EAB9EEB808126D64B9F3634
SHA-256:1F3FAF1FE3F1D5EFE7315609B77B3EB075958A153018E13228A4DFF2A2DFC515
SHA-512:2C5CB3DD794D581D6E5B96BB1C62EBFCF2DC0CCCD145079BEC9B85AC202B37AB6B1C955C61298ACF9E50B38C1821A38208FBEEF0C37C8BF2765309842B4EFCE6
Malicious:false
Reputation:low
Preview:.Unhandled Exception: System.IndexOutOfRangeException: Index was outside the bounds of the array... at sxz.Program.ds().. at sxz.Program.Main(String[] args).
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.355902899609938
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
File size:13'824 bytes
MD5:2808310786effc87a4359c778a73a7ee
SHA1:525f278678ad73a34c368f0afc4558ed0454f076
SHA256:33d9753ee9b3920352b743d72adfd62c969ab0619eb5673151f478ebdfa197a5
SHA512:02348e663f215ff6cf37cccea7ea4da3c53362aa75a1a0a88279b9a0acbf60deb30829b47ff7ce1ae97c43ca52b7e09ca90cbb621fee2da1a0ddcc65677c0d67
SSDEEP:384:RWaw77Ke8FeO+DK32XzUzxcRx8ptYcFwVc03K:2KFqIUxItYcFwVc6K
TLSH:C052088BE3C50177D4BA077728F34312973566664D9B8D6B388C90873F6254B93633E6
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....p..........."...0.. ..........2>... ...@....@.. ....................................`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x403e32
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xFE70109B [Thu Apr 9 21:52:27 2105 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3de00x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x10e4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3d4c0x38.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x1e380x200055d4011e41700e858a04d05c5998b748False0.52294921875data5.5705851013495185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x40000x10e40x12007f8ae6511f691f9b882c136912eb787fFalse0.3669704861111111data4.93096460282298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000xc0x200c4f51d5ad3b8c4a12f54f631fdf45c90False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x40900x2ecdata0.4358288770053476
RT_MANIFEST0x438c0xd53XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.38463793608912344
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:17:29:54
Start date:03/07/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe"
Imagebase:0xc30000
File size:13'824 bytes
MD5 hash:2808310786EFFC87A4359C778A73A7EE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:17:29:54
Start date:03/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:17:29:54
Start date:03/07/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AVKillNET.1.18071.13447.exe
Imagebase:0x770000
File size:13'824 bytes
MD5 hash:2808310786EFFC87A4359C778A73A7EE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:17:29:54
Start date:03/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:8
Start time:17:29:55
Start date:03/07/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1036
Imagebase:0xd50000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:7.7%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 2333 13643cf 2334 1364453 CreateProcessWithTokenW 2333->2334 2336 136453e 2334->2336

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 219 1362e80-1362ee6 221 1362f30-1362f32 219->221 222 1362ee8-1362ef3 219->222 223 1362f34-1362f4d 221->223 222->221 224 1362ef5-1362f01 222->224 231 1362f4f-1362f5b 223->231 232 1362f99-1362f9b 223->232 225 1362f24-1362f2e 224->225 226 1362f03-1362f0d 224->226 225->223 227 1362f11-1362f20 226->227 228 1362f0f 226->228 227->227 230 1362f22 227->230 228->227 230->225 231->232 234 1362f5d-1362f69 231->234 233 1362f9d-1362ff5 232->233 243 1362ff7-1363002 233->243 244 136303f-1363041 233->244 235 1362f8c-1362f97 234->235 236 1362f6b-1362f75 234->236 235->233 237 1362f77 236->237 238 1362f79-1362f88 236->238 237->238 238->238 240 1362f8a 238->240 240->235 243->244 246 1363004-1363010 243->246 245 1363043-136305b 244->245 253 13630a5-13630a7 245->253 254 136305d-1363068 245->254 247 1363012-136301c 246->247 248 1363033-136303d 246->248 250 1363020-136302f 247->250 251 136301e 247->251 248->245 250->250 252 1363031 250->252 251->250 252->248 256 13630a9-13630fa 253->256 254->253 255 136306a-1363076 254->255 257 1363078-1363082 255->257 258 1363099-13630a3 255->258 264 1363100-136310e 256->264 259 1363086-1363095 257->259 260 1363084 257->260 258->256 259->259 262 1363097 259->262 260->259 262->258 265 1363117-1363177 264->265 266 1363110-1363116 264->266 273 1363187-136318b 265->273 274 1363179-136317d 265->274 266->265 276 136318d-1363191 273->276 277 136319b-136319f 273->277 274->273 275 136317f 274->275 275->273 276->277 278 1363193 276->278 279 13631a1-13631a5 277->279 280 13631af-13631b3 277->280 278->277 279->280 281 13631a7-13631aa call 13601fc 279->281 282 13631b5-13631b9 280->282 283 13631c3-13631c7 280->283 281->280 282->283 287 13631bb-13631be call 13601fc 282->287 284 13631d7-13631db 283->284 285 13631c9-13631cd 283->285 289 13631dd-13631e1 284->289 290 13631eb-13631ef 284->290 285->284 288 13631cf-13631d2 call 13601fc 285->288 287->283 288->284 289->290 293 13631e3 289->293 294 13631f1-13631f5 290->294 295 13631ff 290->295 293->290 294->295 296 13631f7 294->296 297 1363200 295->297 296->295 297->297
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2011062737.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl
    • API String ID: 0-682378881
    • Opcode ID: 64429f87cc75c5a56f304606cfaea77a78725e951528863966b1dac3956298dc
    • Instruction ID: 996929331a34ebcdd8b651022f2db256246b4a99788903ce4ea510d2ff7774ea
    • Opcode Fuzzy Hash: 64429f87cc75c5a56f304606cfaea77a78725e951528863966b1dac3956298dc
    • Instruction Fuzzy Hash: 82B14F70E10209CFDB14DFA9C98579EBBF6BF88318F14C529D419AB258EB749846CB81

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 298 1363750-13637b6 300 1363800-1363802 298->300 301 13637b8-13637c3 298->301 303 1363804-136381d 300->303 301->300 302 13637c5-13637d1 301->302 304 13637f4-13637fe 302->304 305 13637d3-13637dd 302->305 310 136381f-136382b 303->310 311 1363869-136386b 303->311 304->303 306 13637e1-13637f0 305->306 307 13637df 305->307 306->306 309 13637f2 306->309 307->306 309->304 310->311 312 136382d-1363839 310->312 313 136386d-1363885 311->313 314 136385c-1363867 312->314 315 136383b-1363845 312->315 320 1363887-1363892 313->320 321 13638cf-13638d1 313->321 314->313 316 1363847 315->316 317 1363849-1363858 315->317 316->317 317->317 319 136385a 317->319 319->314 320->321 323 1363894-13638a0 320->323 322 13638d3-13638eb 321->322 329 1363935-1363937 322->329 330 13638ed-13638f8 322->330 324 13638a2-13638ac 323->324 325 13638c3-13638cd 323->325 327 13638b0-13638bf 324->327 328 13638ae 324->328 325->322 327->327 331 13638c1 327->331 328->327 333 1363939-13639ac 329->333 330->329 332 13638fa-1363906 330->332 331->325 334 1363908-1363912 332->334 335 1363929-1363933 332->335 342 13639b2-13639c0 333->342 336 1363916-1363925 334->336 337 1363914 334->337 335->333 336->336 339 1363927 336->339 337->336 339->335 343 13639c2-13639c8 342->343 344 13639c9-1363a29 342->344 343->344 351 1363a2b-1363a2f 344->351 352 1363a39-1363a3d 344->352 351->352 353 1363a31 351->353 354 1363a3f-1363a43 352->354 355 1363a4d-1363a51 352->355 353->352 354->355 356 1363a45 354->356 357 1363a53-1363a57 355->357 358 1363a61-1363a65 355->358 356->355 357->358 359 1363a59 357->359 360 1363a67-1363a6b 358->360 361 1363a75-1363a79 358->361 359->358 360->361 362 1363a6d 360->362 363 1363a7b-1363a7f 361->363 364 1363a89-1363a8d 361->364 362->361 363->364 365 1363a81-1363a84 call 13601fc 363->365 366 1363a8f-1363a93 364->366 367 1363a9d 364->367 365->364 366->367 369 1363a95-1363a98 call 13601fc 366->369 371 1363a9e 367->371 369->367 371->371
    Memory Dump Source
    • Source File: 00000000.00000002.2011062737.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c5f028e18dbe6b9b3d763ede590b8505d6995d0a7f946712a37be3dafd4e733f
    • Instruction ID: 1c3832853191721ce6358a00045ccfbe0b3bc45a4033d03be23181869edc75e9
    • Opcode Fuzzy Hash: c5f028e18dbe6b9b3d763ede590b8505d6995d0a7f946712a37be3dafd4e733f
    • Instruction Fuzzy Hash: 8BB14C70E102098FEB10CFA9C9857DDBFF6BF88718F14C529D419A7298EB749885CB81

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 118 13643d0-1364461 120 1364472-1364479 118->120 121 1364463-136446f 118->121 122 1364484-136448b 120->122 123 136447b-1364481 120->123 121->120 124 1364496-136453c CreateProcessWithTokenW 122->124 125 136448d-1364493 122->125 123->122 127 1364545-136458e 124->127 128 136453e-1364544 124->128 125->124 132 13645a0-13645a7 127->132 133 1364590-1364596 127->133 128->127 134 13645be 132->134 135 13645a9-13645b8 132->135 133->132 137 13645bf 134->137 135->134 137->137
    APIs
    • CreateProcessWithTokenW.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 01364529
    Memory Dump Source
    • Source File: 00000000.00000002.2011062737.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateProcessTokenWith
    • String ID:
    • API String ID: 1742259849-0
    • Opcode ID: d113d829e11545b129d8d8b08408126e6146ea400c140d324532a839d62392e2
    • Instruction ID: 2264bacb88d8397d31916af30d553ce02deb17a5f35c4b12af66b116f813b875
    • Opcode Fuzzy Hash: d113d829e11545b129d8d8b08408126e6146ea400c140d324532a839d62392e2
    • Instruction Fuzzy Hash: 8451F4B1C00229DFDB24CF59C844BDDBBB5BB48314F14C4AAE919B7254DB71AA89CF90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 98 13643cf-1364461 100 1364472-1364479 98->100 101 1364463-136446f 98->101 102 1364484-136448b 100->102 103 136447b-1364481 100->103 101->100 104 1364496-13644c2 102->104 105 136448d-1364493 102->105 103->102 106 13644cd-136453c CreateProcessWithTokenW 104->106 105->104 107 1364545-136458e 106->107 108 136453e-1364544 106->108 112 13645a0-13645a7 107->112 113 1364590-1364596 107->113 108->107 114 13645be 112->114 115 13645a9-13645b8 112->115 113->112 117 13645bf 114->117 115->114 117->117
    APIs
    • CreateProcessWithTokenW.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 01364529
    Memory Dump Source
    • Source File: 00000000.00000002.2011062737.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateProcessTokenWith
    • String ID:
    • API String ID: 1742259849-0
    • Opcode ID: f8e70f261d66bef91bc9f94d964f2e9034403f67be472df35379ceaf03d2fbb9
    • Instruction ID: 183a8e1af8986ffbde52190b54a176738dc6ef5b4562835f551abb4d42ef924b
    • Opcode Fuzzy Hash: f8e70f261d66bef91bc9f94d964f2e9034403f67be472df35379ceaf03d2fbb9
    • Instruction Fuzzy Hash: 8B5103B1C00229DFDB24CF59C844BDDBBB5BB48314F14C4AAE919B7214DB709A89CF90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2011062737.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl
    • API String ID: 0-682378881
    • Opcode ID: 5d26fbd758ed94a85378f2863fb59c6b0f351d9370c3df10d6545a098a785c61
    • Instruction ID: 48cafc43b49611b8206b66f25660371515588aee57cd0087111d44c089140cc8
    • Opcode Fuzzy Hash: 5d26fbd758ed94a85378f2863fb59c6b0f351d9370c3df10d6545a098a785c61
    • Instruction Fuzzy Hash: F0917070E00209DFDF14CFA9C9817DEBBF6AF88318F15C529E415A7298DB349845CB91
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl
    • API String ID: 0-682378881
    • Opcode ID: 8ae4dd8a83102dfb5868120b4a6b13b2390ce93b2718e66777908dd50064f003
    • Instruction ID: 747ce7313b8f29dbc06e2183e4f894a29aca4dd1ef1ce93af7bda02488f9d089
    • Opcode Fuzzy Hash: 8ae4dd8a83102dfb5868120b4a6b13b2390ce93b2718e66777908dd50064f003
    • Instruction Fuzzy Hash: E6B13E70E002098FDF54CFAAC9997DEBFF2BF88314F148169E855AB254EB749845CB81
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: aeeea0e31e9fb1289330e448aacff60eba470b036f8ac897f5b5a1df8911e60f
    • Instruction ID: e1a4375dd5031b01526ff10281f9497adfbcea9944ce28816b3208e1efcf2f38
    • Opcode Fuzzy Hash: aeeea0e31e9fb1289330e448aacff60eba470b036f8ac897f5b5a1df8911e60f
    • Instruction Fuzzy Hash: A6B15D70E002098FDF54CFAAD9897DDBFF2BF88314F188169D455AB294EB749885CB81
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl$\Vl
    • API String ID: 0-415357090
    • Opcode ID: bd278f58d64fda3bddd5cc93bac50213090b33fc33f8365606d04e70c03b08da
    • Instruction ID: 3241ac96ba20ff19ffaedc8a849b8dccadd3ef0e000f413205491350c83af33e
    • Opcode Fuzzy Hash: bd278f58d64fda3bddd5cc93bac50213090b33fc33f8365606d04e70c03b08da
    • Instruction Fuzzy Hash: CD7129B1E002099FDB14CFAAC98979EBFF2BF88314F148129D455AB354EB749842CF91
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl$\Vl
    • API String ID: 0-415357090
    • Opcode ID: 7e1014f804b0af57f662dd92a03d47799e1bf1fb50c95b1cdec6238c5a0c6788
    • Instruction ID: ec0127f40dcc062114453445b39a8395fd58000c19debc876d1e19f05b77487e
    • Opcode Fuzzy Hash: 7e1014f804b0af57f662dd92a03d47799e1bf1fb50c95b1cdec6238c5a0c6788
    • Instruction Fuzzy Hash: FC7117B1E002099FDB14CFAAC98979EBFF1BF88314F148129D455AB354EB749846CF91
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: \Vl
    • API String ID: 0-682378881
    • Opcode ID: 90224ba0b36ba5637a5f53e0eeb10e3d700559505aa6d2ef43dd25857ef0355d
    • Instruction ID: 71bb807b1a2dc2fb64ff98468196f3f6b9e1d22a0173d56eda3094d2ec0460a3
    • Opcode Fuzzy Hash: 90224ba0b36ba5637a5f53e0eeb10e3d700559505aa6d2ef43dd25857ef0355d
    • Instruction Fuzzy Hash: 64B14C70E00209CFDB54CFAAC9897DEBFF1BF88314F148169E855AB254EB749846CB91
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID: 0-3916222277
    • Opcode ID: cd6b6290352d9729a7be61614f828eac8a4091230105fb268b9644368cd0e3b0
    • Instruction ID: ea161839b3d6cbb8c8f63ef83910f4fa3531f078ad62966f0aa4d2c391124962
    • Opcode Fuzzy Hash: cd6b6290352d9729a7be61614f828eac8a4091230105fb268b9644368cd0e3b0
    • Instruction Fuzzy Hash: AD415971E0024B8FCF05EBB4C8145EEFBB1EF95304B15865AD584BB241EB746A86CB90
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b5a829b5dec1a9e3d3c07e035b0f08b5dc286c09e62744ed9a1725f96b88f189
    • Instruction ID: 5190e804e70e4ed8d821176132c95ebe2dd248aa6fb9925e47508281b4fcd8a8
    • Opcode Fuzzy Hash: b5a829b5dec1a9e3d3c07e035b0f08b5dc286c09e62744ed9a1725f96b88f189
    • Instruction Fuzzy Hash: C9B14E70E00209CFDB60CFAAD9897DDBFF1BF48314F188169D495AB254EB749885CB92
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0f51bb16156071a3468935216dc790791a84d8baaa0df80ca919a24303bedd86
    • Instruction ID: dd7bbb5be5b6777910eac1b2821042e5a9d2d5f6445fe667eb6e624763ec9ce8
    • Opcode Fuzzy Hash: 0f51bb16156071a3468935216dc790791a84d8baaa0df80ca919a24303bedd86
    • Instruction Fuzzy Hash: C6319070B00219CFDB65AB79C458BBE7BF2AB88704F14846DE485A7358DFB58C42CB91
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c993b426606af8c5232a05054d447a192c3d1f787c65323c66fb69c93fccd8f5
    • Instruction ID: ee515e420433396ad383697060506f4ba7b8a5b5f5d04deceb1b73fd24b14297
    • Opcode Fuzzy Hash: c993b426606af8c5232a05054d447a192c3d1f787c65323c66fb69c93fccd8f5
    • Instruction Fuzzy Hash: 5341FFB0D003499FDB10CFAAC484ADEBFF1FF48304F24842AE409AB250DB75A946CB91
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 275da1ade62d39e655d37b32d8efcdfa3617555d2fa0623e9be8e0803b53fc3d
    • Instruction ID: acbcb36f3b737f4c236e37ed25872cd5bed5a89bbf0488d85fa161bc84d34827
    • Opcode Fuzzy Hash: 275da1ade62d39e655d37b32d8efcdfa3617555d2fa0623e9be8e0803b53fc3d
    • Instruction Fuzzy Hash: 7241DEB0D003499FDB14DFAAC484ADEBFF5FF48314F248429E809AB250DB75A946CB91
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f90e71491fa8b2bdcebcf8e8f140ad6f277f13f5f43ddf5349b2c37ef3c4a73c
    • Instruction ID: 48db9b78c1b6f16209b78cd0b21588f26591c1e3ad993e17d3ae80ea2badb04d
    • Opcode Fuzzy Hash: f90e71491fa8b2bdcebcf8e8f140ad6f277f13f5f43ddf5349b2c37ef3c4a73c
    • Instruction Fuzzy Hash: 1BF012303007018FDB793BB6961C66A7AE4EE856463144479E9C2C6258FF7AD442CBA1
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0a3fdb0dc54c890c7089e766acfc853b002f145cc7e4f634c43e1b8b3e1198fd
    • Instruction ID: e44b9b87cdb98ca5d98656683471c7825736fea5ddeaa7c2d87f05c89bcde42a
    • Opcode Fuzzy Hash: 0a3fdb0dc54c890c7089e766acfc853b002f145cc7e4f634c43e1b8b3e1198fd
    • Instruction Fuzzy Hash: 98F0A7317007008FDB7D37719A1C26B3AE19E8120630544BDE9C2C6299FE7AC4518BA1
    Memory Dump Source
    • Source File: 00000004.00000002.2414979819.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d490156f222347394d41f321bde9ecc04932ae19cde9bf05e137f75d33d48982
    • Instruction ID: 24c0f6827b05623d0be7c810d23c5f30ecd16ada340aae0adf3954773f62ffcb
    • Opcode Fuzzy Hash: d490156f222347394d41f321bde9ecc04932ae19cde9bf05e137f75d33d48982
    • Instruction Fuzzy Hash: 26E0C273F100105FC745A7B8E4966FD3BA5DFDA325B5400AAE045DB3A6DE25CC035780