Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
home21.exe

Overview

General Information

Sample name:home21.exe
Analysis ID:1467809
MD5:fdc0384ea73d7d57c04d471c6cbbad94
SHA1:730851524ec7a5d6bc9fd91048e2242c5a638d0c
SHA256:a62d5d4b2d07be105c461e40da79040336b7ccb625baa9274a6c816d9755fd6e
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses dynamic DNS services
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • home21.exe (PID: 1100 cmdline: "C:\Users\user\Desktop\home21.exe" MD5: FDC0384EA73D7D57C04D471C6CBBAD94)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.2934182935.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.1% probability
    Source: home21.exeJoe Sandbox ML: detected
    Source: home21.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI

    Networking

    barindex
    Source: unknownDNS query: name: winhomemodulo.ddns.net
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: winhomemodulo.ddns.net
    Source: global trafficDNS traffic detected: DNS query: google.com.br
    Source: home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://digitalbush.com/projects/masked-input-plugin/#license)
    Source: home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fontawesome.io
    Source: home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fontawesome.io/license/
    Source: home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/http
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/http/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/mime/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap/#
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/SV
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2941079350.000000000A1E2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/U
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://winhomemodulo.ddns.net/w2/openU
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.borland.com/namespaces/Types
    Source: home21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.borland.com/namespaces/Types-IWSDLPublish
    Source: home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.borland.com/rootpart.xml
    Source: home21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
    Source: home21.exe, 00000000.00000003.2941079350.000000000D64E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/editor/midasdemo/securityprefs.html

    System Summary

    barindex
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: Number of sections : 19 > 10
    Source: home21.exe, 00000000.00000000.2019638393.0000000006E5E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegDChJuA4ADf2691f80VUfJn88R4aWE.exe` vs home21.exe
    Source: home21.exe, 00000000.00000003.2941079350.000000000DA80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegDChJuA4ADf2691f80VUfJn88R4aWE.exe` vs home21.exe
    Source: home21.exe, 00000000.00000003.2941079350.000000000DA80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDlp Loper< vs home21.exe
    Source: home21.exeBinary or memory string: OriginalFilenamegDChJuA4ADf2691f80VUfJn88R4aWE.exe` vs home21.exe
    Source: home21.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: home21.exeStatic PE information: Section: ZLIB complexity 0.98944091796875
    Source: home21.exeStatic PE information: Section: ZLIB complexity 0.9931242028061225
    Source: home21.exeStatic PE information: Section: ZLIB complexity 0.9928385416666666
    Source: home21.exeStatic PE information: Section: ZLIB complexity 1.0045572916666667
    Source: home21.exeStatic PE information: Section: ZLIB complexity 0.9993225164654226
    Source: home21.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
    Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@4/0
    Source: C:\Users\user\Desktop\home21.exeMutant created: \Sessions\1\BaseNamedObjects\brkurschmogesk-fdsfsdfsd
    Source: Yara matchFile source: 00000000.00000003.2934182935.0000000009BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\home21.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\Desktop\home21.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\Desktop\home21.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\home21.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: oledlg.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: magnification.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: d3d9.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: security.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: colorui.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: mscms.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: coloradapterclient.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: compstui.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: inetres.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: thumbcache.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: olepro32.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: idndl.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: dcomp.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\home21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: home21.exeStatic file information: File size 22286864 > 1048576
    Source: home21.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x4db400
    Source: home21.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x506200
    Source: home21.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x75ae00
    Source: home21.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x372000
    Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name:
    Source: home21.exeStatic PE information: section name: .themida
    Source: home21.exeStatic PE information: section name: .boot
    Source: home21.exeStatic PE information: section name: entropy: 7.9097474746193965

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: RegmonClassJump to behavior
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: RegmonclassJump to behavior
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: FilemonclassJump to behavior
    Source: C:\Users\user\Desktop\home21.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\home21.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\home21.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
    Source: C:\Users\user\Desktop\home21.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\home21.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\home21.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\home21.exe TID: 6800Thread sleep time: -116000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\home21.exeLast function: Thread delayed
    Source: home21.exe, 00000000.00000003.2954093591.000000000AFE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet
    Source: home21.exe, 00000000.00000003.2954093591.000000000AFE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux
    Source: C:\Users\user\Desktop\home21.exeSystem information queried: ModuleInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\home21.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: regmonclass
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: procmon_window_class
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: filemonclass
    Source: C:\Users\user\Desktop\home21.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\home21.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\home21.exeProcess queried: DebugObjectHandleJump to behavior
    Source: C:\Users\user\Desktop\home21.exeMemory protected: page read and write | page write copy | page execute read | page execute and read and write | page guard | page no cache | page write combineJump to behavior
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndSVW
    Source: home21.exe, 00000000.00000003.2954093591.000000000AFE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: @Winapi@Windows@DOF_PROGMAN
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndU
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ReBarWindow32Shell_TrayWndMSTaskSwWClassMSTaskListWClassU
    Source: home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndReBarWindow32MSTaskSwWClassToolbarWindow32SV
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    33
    Virtualization/Sandbox Evasion
    OS Credential Dumping521
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory33
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media11
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Software Packing
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Process Injection
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets2
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    home21.exe8%ReversingLabs
    home21.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://fontawesome.io0%URL Reputationsafe
    http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
    http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
    http://tempuri.org/0%URL Reputationsafe
    http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens0%Avira URL Cloudsafe
    http://tempuri.org/U0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/soap/http0%Avira URL Cloudsafe
    http://fontawesome.io/license/0%Avira URL Cloudsafe
    http://www.borland.com/namespaces/Types-IWSDLPublish0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/soap/#0%Avira URL Cloudsafe
    http://digitalbush.com/projects/masked-input-plugin/#license)0%Avira URL Cloudsafe
    http://www.borland.com/namespaces/Types0%Avira URL Cloudsafe
    http://winhomemodulo.ddns.net/w2/openU0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/http/0%Avira URL Cloudsafe
    http://www.borland.com/rootpart.xml0%Avira URL Cloudsafe
    http://www.indyproject.org/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/mime/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/soap12/SV0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/soap/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    winhomemodulo.ddns.net
    64.226.97.61
    truetrue
      unknown
      google.com.br
      142.250.185.67
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://digitalbush.com/projects/masked-input-plugin/#license)home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://fontawesome.iohome21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://fontawesome.io/license/home21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.borland.com/namespaces/Types-IWSDLPublishhome21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.borland.com/namespaces/Typeshome21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/soap/httphome21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licenshome21.exe, 00000000.00000003.2941079350.0000000009BE0000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/soap/#home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/soap/encoding/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/http/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://winhomemodulo.ddns.net/w2/openUhome21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/Uhome21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/soap/envelope/home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.borland.com/rootpart.xmlhome21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2941079350.000000000A1E2000.00000004.00001000.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.indyproject.org/home21.exe, 00000000.00000003.2934863783.0000000007E50000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/mime/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/soap12/SVhome21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/wsdl/soap/home21.exe, 00000000.00000003.2934182935.000000000A5FB000.00000004.00001000.00020000.00000000.sdmp, home21.exe, 00000000.00000003.2934182935.0000000009BFB000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467809
        Start date and time:2024-07-04 19:52:11 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 47s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:home21.exe
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@1/0@4/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.184.195, 142.250.186.174, 142.250.110.84, 34.104.35.123
        • Excluded domains from analysis (whitelisted): clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: home21.exe
        TimeTypeDescription
        19:57:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run iCjrhgoi C:\Users\user\Desktop\iCjrhgoi.vbs
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        google.com.brhttps://www.google.com.br/url?q=//www.google.it/amp/s/newhopeaustralia.ubpages.com/fund-summary/Get hashmaliciousUnknownBrowse
        • 142.250.186.163
        http://www.google.it/amp/s/sites.google.com/view/park-concepts/homeGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
        • 142.250.181.227
        https://www.google.com.br/url?q=//www.google.it/amp/s/sites.google.com/view/park-concepts/homeGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
        • 142.250.186.99
        DETRANmediaintgeneral.com.Lnk.lnkGet hashmaliciousUnknownBrowse
        • 142.250.186.131
        itBEKxL3Gw.exeGet hashmaliciousUnknownBrowse
        • 142.250.190.35
        itBEKxL3Gw.exeGet hashmaliciousUnknownBrowse
        • 172.217.2.35
        deobfuscated.jsGet hashmaliciousUnknownBrowse
        • 142.250.65.163
        latam.jsGet hashmaliciousUnknownBrowse
        • 142.250.176.195
        latam.jsGet hashmaliciousUnknownBrowse
        • 142.251.32.99
        winhomemodulo.ddns.nethANEXOPDF.PDF40 234057.msiGet hashmaliciousUnknownBrowse
        • 64.226.97.61
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.984227577783788
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:home21.exe
        File size:22'286'864 bytes
        MD5:fdc0384ea73d7d57c04d471c6cbbad94
        SHA1:730851524ec7a5d6bc9fd91048e2242c5a638d0c
        SHA256:a62d5d4b2d07be105c461e40da79040336b7ccb625baa9274a6c816d9755fd6e
        SHA512:42dd62b7bfee73ae7f29493152ae53e3e4571211db26f3a753a1f1ccade407ec9e1d47fbe695926b3dad601101b22be37148dd8293add5bb79156715f9e03179
        SSDEEP:393216:GAfmQWN/5x1SoSbl8zqGGoXgSx7sEZ6YlN+o+D+2b67IYA356Z5s6CRLNU+hO:GemQw/5+ne10S6EZPlN+oUhOFM0SDI
        TLSH:6E27232792816D8BC73147B13C3786418C76FDB66E0266A9F31F8A95D0A264DCFF5B20
        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
        Icon Hash:0f0f1d65651f0f0f
        Entrypoint:0x759b318
        Entrypoint Section:.boot
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        DLL Characteristics:DYNAMIC_BASE
        Time Stamp:0x6686B5D1 [Thu Jul 4 14:46:41 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:d3d24e5069f79932cd77d9e04218b28c
        Instruction
        call 00007F5880DF9410h
        push ebx
        mov ebx, esp
        push ebx
        mov esi, dword ptr [ebx+08h]
        mov edi, dword ptr [ebx+10h]
        cld
        mov dl, 80h
        mov al, byte ptr [esi]
        inc esi
        mov byte ptr [edi], al
        inc edi
        mov ebx, 00000002h
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        jnc 00007F5880DF92ACh
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        jnc 00007F5880DF9313h
        xor eax, eax
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        jnc 00007F5880DF93A7h
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc eax, eax
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc eax, eax
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc eax, eax
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc eax, eax
        je 00007F5880DF92CAh
        push edi
        mov eax, eax
        sub edi, eax
        mov al, byte ptr [edi]
        pop edi
        mov byte ptr [edi], al
        inc edi
        mov ebx, 00000002h
        jmp 00007F5880DF925Bh
        mov eax, 00000001h
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc eax, eax
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        jc 00007F5880DF92ACh
        sub eax, ebx
        mov ebx, 00000001h
        jne 00007F5880DF92EAh
        mov ecx, 00000001h
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        adc ecx, ecx
        add dl, dl
        jne 00007F5880DF92C7h
        mov dl, byte ptr [esi]
        inc esi
        adc dl, dl
        jc 00007F5880DF92ACh
        push esi
        mov esi, edi
        sub esi, ebp
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x6b7b0000x9f.edata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x6b7c2e00x29c.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b7e0000xea80.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x750d0000x10.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x6b7d1400x18.tls
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xd630000x114c
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        0x10000xd1ca6c0x4db40065f8e435143ef5709b5551e1b4bfc04cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        0xd1e0000x90440x4000c939412785c38c0b018033072fc2eb0dFalse0.98944091796875data7.9097474746193965IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        0xd280000x2c8380xc4009ae5c681f69b84d14bac6ee2582298dcFalse0.9931242028061225data7.945724153368735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        0xd550000x8e7c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        0xd5e0000x4d680x600f0ec39462a110b002d0a5867f419ba62False0.9928385416666666data7.4716304226308266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        0xd630000x114c0x600035846931dec5b74f2a9aa5df893ae01False1.0045572916666667data7.74951284323692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        0xd650000x9f0x2009c3a7ed16b7e3d45e947ea348c879edaFalse0.2734375data2.3508425832682125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        0xd660000x1300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        0xd670000x5d0x2006200161ce3bd8a5c84114395f8eb142aFalse0.646484375data4.285469462549044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        0xd680000xdeb480x71e00fba2446837d54fc73b565b7752d613baFalse0.9993225164654226data7.984449823202342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        0xe470000x3ee0a3d0x5062009c70950db34266f2d1a99e6521d275d5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        0x4d280000x1e524510x75ae00dbb4c00dc15a3fc0ac14970a1808a3f8unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .edata0x6b7b0000x10000x2007897f667608ea1cbdf21f177bdd67403False0.26953125data2.0697916117157833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .idata0x6b7c0000x10000x60001606fc5a87a86f26b31c459f11bf834False0.4251302083333333data4.206559315528099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .tls0x6b7d0000x10000x20061e7af0b6caeb49b1853d1f8d9e0c0e4False0.048828125data0.19763312813451883IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x6b7e0000xec000xec0087076097e8ca518915f34831eaeabd6eFalse0.8070378707627118data7.44669354643019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .themida0x6b8d0000x60e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .boot0x719b0000x3720000x372000928cafad7b734bed11d56e8f2cab0b0funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .reloc0x750d0000x10000x1006172f6ef7b4a845a515987569b06b22False1.5GLS_BINARY_LSB_FIRST2.7334585933443494IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x6b7e1940x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6897163120567376
        RT_ICON0x6b7e60c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.5733606557377049
        RT_ICON0x6b7efa40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.4896810506566604
        RT_ICON0x6b8005c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.38392116182572616
        RT_ICON0x6b826140x9978PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9986000814498066
        RT_GROUP_ICON0x6b8bf9c0x4cdataEnglishUnited States0.7763157894736842
        RT_VERSION0x6b8bff80x49cdata0.4822033898305085
        RT_MANIFEST0x6b8c4a40x5d9XML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.4255177020708083
        DLLImport
        kernel32.dllGetModuleHandleA
        winmm.dllsndPlaySoundW
        oleacc.dllLresultFromObject
        wininet.dllInternetCloseHandle
        winspool.drvDocumentPropertiesW
        comdlg32.dllFindTextW
        comctl32.dllFlatSB_SetScrollInfo
        shell32.dllSHGetMalloc
        ws2_32.dllaccept
        URLMON.DLLURLDownloadToFileW
        user32.dllCopyImage
        version.dllGetFileVersionInfoSizeW
        oledlg.dllOleUIObjectPropertiesW
        oleaut32.dllSafeArrayPutElement
        advapi32.dllRegSetValueExW
        netapi32.dllNetWkstaGetInfo
        msvcrt.dllstrncmp
        winhttp.dllWinHttpGetIEProxyConfigForCurrentUser
        SHFolder.dllSHGetFolderPathW
        wsock32.dllgethostbyaddr
        ole32.dllStgCreateDocfileOnILockBytes
        gdi32.dllAddFontMemResourceEx
        Magnification.dllMagSetWindowSource
        NameOrdinalAddress
        TMethodImplementationIntercept30x467e3c
        __dbk_fcall_wrapper20x410ce8
        dbkFCallWrapperAddr10x1158640
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Jul 4, 2024 19:57:05.898905993 CEST53540271.1.1.1192.168.2.5
        Jul 4, 2024 19:57:05.947437048 CEST6083153192.168.2.51.1.1.1
        Jul 4, 2024 19:57:05.947563887 CEST5091153192.168.2.51.1.1.1
        Jul 4, 2024 19:57:05.972199917 CEST53574851.1.1.1192.168.2.5
        Jul 4, 2024 19:57:06.112750053 CEST53509111.1.1.1192.168.2.5
        Jul 4, 2024 19:57:06.171605110 CEST53608311.1.1.1192.168.2.5
        Jul 4, 2024 19:57:06.913850069 CEST4989153192.168.2.51.1.1.1
        Jul 4, 2024 19:57:06.913955927 CEST6512053192.168.2.51.1.1.1
        Jul 4, 2024 19:57:06.921125889 CEST53498911.1.1.1192.168.2.5
        Jul 4, 2024 19:57:06.926608086 CEST53651201.1.1.1192.168.2.5
        Jul 4, 2024 19:57:07.043795109 CEST53619381.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 4, 2024 19:57:05.947437048 CEST192.168.2.51.1.1.10x38f9Standard query (0)winhomemodulo.ddns.netA (IP address)IN (0x0001)false
        Jul 4, 2024 19:57:05.947563887 CEST192.168.2.51.1.1.10x2c76Standard query (0)winhomemodulo.ddns.net65IN (0x0001)false
        Jul 4, 2024 19:57:06.913850069 CEST192.168.2.51.1.1.10x6980Standard query (0)google.com.brA (IP address)IN (0x0001)false
        Jul 4, 2024 19:57:06.913955927 CEST192.168.2.51.1.1.10x9fb9Standard query (0)google.com.br65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 4, 2024 19:57:06.171605110 CEST1.1.1.1192.168.2.50x38f9No error (0)winhomemodulo.ddns.net64.226.97.61A (IP address)IN (0x0001)false
        Jul 4, 2024 19:57:06.921125889 CEST1.1.1.1192.168.2.50x6980No error (0)google.com.br142.250.185.67A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:13:52:58
        Start date:04/07/2024
        Path:C:\Users\user\Desktop\home21.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\home21.exe"
        Imagebase:0x2e0000
        File size:22'286'864 bytes
        MD5 hash:FDC0384EA73D7D57C04D471C6CBBAD94
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Borland Delphi
        Yara matches:
        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.2934182935.0000000009BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:false

        No disassembly