Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Riskware.Application.32484.16969.exe

Overview

General Information

Sample name:SecuriteInfo.com.Riskware.Application.32484.16969.exe
Analysis ID:1467926
MD5:0c4ff697bf8bee358d876a64d19ab643
SHA1:d99a8bf2aaa11c7a89dd40bd485f5b2f570af1d4
SHA256:eaef7bca8697e9832e378f4afedf3504b1c72826514602a1d43eb4bfd0871532
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Creates files inside the system directory
Entry point lies outside standard sections
PE file contains sections with non-standard names
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeReversingLabs: Detection: 29%
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeVirustotal: Detection: 21%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

System Summary

barindex
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .ro#
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .<G^
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .[wS
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeFile created: C:\Windows\license.idJump to behavior
Source: classification engineClassification label: mal84.evad.winEXE@2/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2672:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeReversingLabs: Detection: 29%
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeVirustotal: Detection: 21%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe "C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSection loaded: cryptbase.dllJump to behavior
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic file information: File size 18314240 > 1048576
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: Raw size of .[wS is bigger than: 0x100000 < 0x113e600
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .[wS
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: _RDATA
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .ro#
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .<G^
Source: SecuriteInfo.com.Riskware.Application.32484.16969.exeStatic PE information: section name: .[wS
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeCode function: 0_3_0000019DE5714567 push es; iretd 0_3_0000019DE5714602
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeCode function: 0_3_0000019DE5712001 push es; ret 0_3_0000019DE5712080

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C8A6000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C891CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C8A70005 value: E9 CB 05 E5 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C88C05D0 value: E9 3A FA 1A 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C8A80005 value: E9 9B 07 DF FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C88707A0 value: E9 6A F8 20 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C6F40007 value: E9 AB 11 E0 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C6D411B0 value: E9 5E EE 1F 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C7010006 value: E9 BB 7F D0 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C6D17FC0 value: E9 4C 80 2F 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C6560007 value: E9 CB E3 E3 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C639E3D0 value: E9 3E 1C 1C 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C6570006 value: E9 AB 4D D3 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeMemory written: PID: 5640 base: 7FF8C62A4DB0 value: E9 5C B2 2C 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSpecial instruction interceptor: First address: 7FF7A6934E4B instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSpecial instruction interceptor: First address: 7FF7A6934E59 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtSetInformationThread: Direct from: 0x7FF7A5FB97A5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQuerySystemInformation: Direct from: 0x7FF7A690BBE9Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQueryInformationProcess: Direct from: 0x7FF7A692AA7FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D6517BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtMapViewOfSection: Direct from: 0x7FF7A5FF7A12Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtSetInformationProcess: Direct from: 0x7FF7A5F90AF3Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D9EAC7Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D5102AJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D37729Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Indirect: 0x7FF7A5D1926BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A691E611Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D69012Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQueryInformationProcess: Direct from: 0x7FF7A5D688A4Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A6000E99Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQuerySystemInformation: Direct from: 0x7FF7A5FA5352Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQueryInformationProcess: Direct from: 0x7FF7A5D4D59DJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5FAD723Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtQuerySystemInformation: Direct from: 0x7FF7A5E0FBE7Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exeNtProtectVirtualMemory: Direct from: 0x7FF7A5D71273Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
1
Credential API Hooking
41
Security Software Discovery
Remote Services1
Credential API Hooking
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Riskware.Application.32484.16969.exe29%ReversingLabs
SecuriteInfo.com.Riskware.Application.32484.16969.exe22%VirustotalBrowse
SecuriteInfo.com.Riskware.Application.32484.16969.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467926
Start date and time:2024-07-05 03:35:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Riskware.Application.32484.16969.exe
Detection:MAL
Classification:mal84.evad.winEXE@2/2@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Riskware.Application.32484.16969.exe, PID 5640 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):32
Entropy (8bit):4.726409765557392
Encrypted:false
SSDEEP:3:hMTjnxVcC:Wj3cC
MD5:EA7B0CD457C0A734A0284E21453618A2
SHA1:92F07EF9CE0C7A7BB62D0234FD90AD3D339772F0
SHA-256:ED1C562046D880087C713F921134C2B3DD6527657001C4AEF69C26F22D15883F
SHA-512:6C2E7EB8A58043898B3392DF1EF52E60E3A9E5FA97E132862D2A1F5389D95BDF1237FCEF5C55777DB2432907B2B680F93E100D6EAA240D50C5046474B1DF982B
Malicious:false
Reputation:low
Preview:RF55crVBGk36Q8fdlgwz7uSeI5NfCWyg
Process:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe
File Type:ASCII text, with CRLF, CR, LF line terminators
Category:dropped
Size (bytes):672
Entropy (8bit):2.2216070458174753
Encrypted:false
SSDEEP:6:jP32E3BKVLd323bC6/5ZccPPlCIK47o3Q+udCKRd6hd6LXb6hvsLt:jPmE8VLdmtfcUPe4EgJpmOLO5sLt
MD5:5BE192DC40CF711D35D45F63ACDF49A5
SHA1:414C88E9DC9693CA23EBBB06CEE4A1731DD5069A
SHA-256:D02BF8BABC61EC1909D025D42B378AE2968B1A96F9E32A452390FF50D584C9FD
SHA-512:5FF585E3EA89955B9497473B2CE578E45B6DF7090B3AEEFB42C1145788FF1998213D1BDC5DB361F3725D2CE31EBCAF47EC172B457A6E3BA13347143B4607CEC0
Malicious:false
Reputation:low
Preview:...... /$$$$$$ /$$ /$$ /$$ /$$.. /$$__ $$ | $$ | $$ |__/ | $$.. | $$ \__/ /$$$$$$ | $$ /$$$$$$ /$$$$$$$ /$$$$$$ /$$ /$$$$$$ | $$.. | $$ /$$__ $$| $$ /$$__ $$ /$$_____/|_ $$_/ | $$ |____ $$| $$.. | $$ | $$$$$$$$| $$| $$$$$$$$| $$$$$$ | $$ | $$ /$$$$$$$| $$.. | $$ $$| $$_____/| $$| $$_____/ \____ $$ | $$ /$$| $$ /$$__ $$| $$.. | $$$$$$/| $$$$$$$| $$| $$$$$$$ /$$$$$$$/ | $$$$/| $$| $$$$$$$| $$.. \______/ \_______/|__/ \_______/|_______/ \___/ |__/ \_______/|__/.... ?????:
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):7.855312946743356
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Riskware.Application.32484.16969.exe
File size:18'314'240 bytes
MD5:0c4ff697bf8bee358d876a64d19ab643
SHA1:d99a8bf2aaa11c7a89dd40bd485f5b2f570af1d4
SHA256:eaef7bca8697e9832e378f4afedf3504b1c72826514602a1d43eb4bfd0871532
SHA512:0f3bf070b3d9dbe84a647a45c7f8aa23d86afdae1d1040f61453c682063a16ffd1b84cb6535e94e88ac6d796bdbb12ae2db259644e67e046414f0da4fde464b0
SSDEEP:393216:P3sKAC+aPhfq9/NadGWRAoYdNk2Lyud2Q:tT35fs/MdGWD+NvLzt
TLSH:B50723D746D497EEC3520B3CA5822396BDD06396D9BFCB1C35CB58067090E4962CBE3A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...(.sf.........."....'.B....d....."..........@..........................................`................................
Icon Hash:c44c3161f8703335
Entrypoint:0x14102c222
Entrypoint Section:.[wS
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66730028 [Wed Jun 19 15:58:32 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:c480c23392c512d9b9dcd02aa12ba654
Instruction
push ecx
push ebp
pushfd
dec eax
mov ebp, 8B20DA09h
xchg al, ah
mov ebx, 8EB94890h
lahf
or eax, 12FE9203h
and edx, ebx
in eax, dx
sub bp, BE3Ah
inc eax
or ch, cl
call 00007FAE9CFC2FD4h
outsb
dec esi
pop ds
jne 00007FAE9CDE50CEh
jnc 00007FAE9CDE50C8h
mov edi, DB2DF10Ch
fsubr st(0), st(6)
push edx
popad
loop 00007FAE9CDE50EBh
pop edi
leave
lea ecx, dword ptr [esi+17F368B3h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x10708180xa0.[wS
IMAGE_DIRECTORY_ENTRY_RESOURCE0x20f00000x37a5d.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x20e84b00x5f94.[wS
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x20ef0000x100.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20e83700x140.[wS
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xfaf0000x98.<G^
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x441e80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x460000x138280x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x5a0000x30780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x5e0000x33540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
_RDATA0x620000x1f40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.ro#0x630000xf4b3d80x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.<G^0xfaf0000xab80xc00cb96c2556e85719682f7eb1add93a675False0.028645833333333332data0.1771584705487029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.[wS0xfb00000x113e4440x113e60073d82e5e70a1ab096161c5d2a2f7417eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x20ef0000x1000x20044b3cd5325b138330cf4874388c3e413False0.380859375data2.5343966587194195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x20f00000x37a5d0x37c00560fb36eb2f3911dc14b8c05a649b26dFalse0.5988342558856502data6.4075617182834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x20f02680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/mRussianRussia0.6143617021276596
RT_ICON0x20f06d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/mRussianRussia0.5704918032786885
RT_ICON0x20f10580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mRussianRussia0.5513602251407129
RT_ICON0x20f21000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/mRussianRussia0.5091286307053942
RT_ICON0x20f46a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/mRussianRussia0.49031648559282004
RT_ICON0x20f88d00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 3779 x 3779 px/mRussianRussia0.4822088724584104
RT_ICON0x20fdd580x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 3779 x 3779 px/mRussianRussia0.4578778642001261
RT_ICON0x21072000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mRussianRussia0.4202058440790252
RT_ICON0x2117a280xfcadPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia1.0004019479013682
RT_GROUP_ICON0x21276d80x84dataRussianRussia0.7272727272727273
RT_MANIFEST0x21277600x2fdXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (705), with CRLF line terminatorsEnglishUnited States0.5071895424836601
DLLImport
KERNEL32.dllSetConsoleScreenBufferSize
USER32.dllEnableWindow
COMCTL32.dllInitCommonControlsEx
WININET.dllInternetOpenUrlA
urlmon.dllURLDownloadToFileA
KERNEL32.dllGetSystemTimeAsFileTime
KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
Language of compilation systemCountry where language is spokenMap
RussianRussia
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Jul 5, 2024 03:36:56.042622089 CEST5363146162.159.36.2192.168.2.5
Jul 5, 2024 03:36:56.864295006 CEST53503861.1.1.1192.168.2.5

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:21:36:11
Start date:04/07/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe"
Imagebase:0x7ff7a4d80000
File size:18'314'240 bytes
MD5 hash:0C4FF697BF8BEE358D876A64D19AB643
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:21:36:11
Start date:04/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly