Windows
Analysis Report
SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe
Overview
General Information
Detection
Score: | 45 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe (PID: 3544 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win32.Risk ware.Smart Sniff.A.19 644.6917.e xe" MD5: EB6CC0CB208E5178FAFE9F43B738C125) smsniff.exe (PID: 2876 cmdline:
"C:\Progra m Files (x 86)\NirSof t\SmartSni ff\smsniff .exe" MD5: CC160FFCD2A395EC44B8F5BC53CC6233)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | Binary string: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Code function: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Dropped File: |
Source: | Code function: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File written: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Binary string: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Code function: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | File Volume queried: | ||
Source: | File Volume queried: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Binary or memory string: |
Source: | API call chain: | ||
Source: | API call chain: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 2 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 Registry Run Keys / Startup Folder | 1 Virtualization/Sandbox Evasion | LSASS Memory | 111 Security Software Discovery | Remote Desktop Protocol | 2 Clipboard Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 4 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 21 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | |||
21% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
33% | ReversingLabs | |||
25% | Virustotal | Browse | ||
7% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1472654 |
Start date and time: | 2024-07-13 15:24:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
Detection: | MAL |
Classification: | mal45.winEXE@3/12@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - Excluded domains from analysis
(whitelisted): client.wns.win dows.com, ocsp.digicert.com, s lscr.update.microsoft.com, ctl dl.windowsupdate.com, fe3cr.de livery.mp.microsoft.com - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26561 |
Entropy (8bit): | 4.870780828462824 |
Encrypted: | false |
SSDEEP: | 768:zg6lyTBzFqZkf17sQUQ4BS1UNbDOBA3a0F0q01br:DlyTBzFqZkf17sQUQaS1KHBK0ur |
MD5: | 979798509185A188C45E885B78B5CBFA |
SHA1: | C149FEFA69E7A7B0F955A4C722B82A97E5DE8775 |
SHA-256: | 6002DAE9114AAD50EC738209CC8A11FB8F90A3BABC0C7BB96F68F0D9339B9501 |
SHA-512: | 1B04B780837429D5CFA51D60E7573F3C1B79549521B8DA65FD90DE4C4DA4136F712A1E39CA295DAC21664707761CAF22216FFAB2080F95B2A93A639018434F8C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20812 |
Entropy (8bit): | 5.903854385231427 |
Encrypted: | false |
SSDEEP: | 384:aGrVVrBcshJtnc/4ELPEdCjy4lezoQFdO:aSDras7tobEmJesQFA |
MD5: | F260C23DCB482601F269114BAD23F5E8 |
SHA1: | E981C17F66FF58E5734C8D107BD3BB5478BFEE2B |
SHA-256: | B85B9142F234A4ECA85218E10E57CC0AEADEDC8DFFEE2DC0A009A68A03514D27 |
SHA-512: | 2CE69D0FECF5F90AEA57F0FBA1EE937F98D10BD3EA7D7BE7468ABD18CAF7480904D07C4C99DF19A7897AC873E11EE7C525A5755D8260E381B7B3EA30439F6C2C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 82432 |
Entropy (8bit): | 7.727057405384751 |
Encrypted: | false |
SSDEEP: | 1536:FMcHgL6sLX9hCg5QRtFmNQX1X2k74PJfBVqsO/uskqSh1zIfMOH3Ze:HALvLX9iRtFmNUVsPJfBJCHmh107Je |
MD5: | CC160FFCD2A395EC44B8F5BC53CC6233 |
SHA1: | 166B263558C266A3E6CD61BB99C4821D40E38203 |
SHA-256: | 219F4C201F2261BD84ADD6CDCCE06640DE9D073385F6860D572FCE3C71D43AC2 |
SHA-512: | F0256BAD94DC3D0AB2F1BDFF6B3B66079094EB724C487380439B81968A5E2CC57CA85410373D1EACF7F4AB6C27BE561C0E045177940E69061ECDBEA00B344D0D |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 47794 |
Entropy (8bit): | 6.440782556782655 |
Encrypted: | false |
SSDEEP: | 768:s/UpAHiGjRQ1kkjH918xnyzOp7OssT1pF/O71mJ/6gd2iZQAm6kRRS+NoJRneH:QUeHiWRgkkjH8nyWmJygdLeAyNxH |
MD5: | 95E89B1E4A5D8DEEC95A4CF33A573D2B |
SHA1: | 147283A4A65535FA17DDA67E0C0882C0BFF65A27 |
SHA-256: | C63D4002857E41E9AA9527A1C8BA3C7363E73D06907C1F6ECD54BD1F7A1728E9 |
SHA-512: | 3DE03C0800BC2BA470EDB566D5290790A229B52BBD7AE09E4D619F33746E36DBCEE73DEBCBB6E1FBB6E1C0DCE9F952E215363E6DEFE1738A96046ABDE2B1F9E5 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 207759 |
Entropy (8bit): | 6.698993058165191 |
Encrypted: | false |
SSDEEP: | 6144:GDoyfXoRtqUVMlP6mbyADulyTBzFq2f17sQUQaS1wBbvb:IoVtt+6KWlyTBzFq2f17sQUQaS1+n |
MD5: | B75B80DD602CA2EC5D7039F2E02D4FC5 |
SHA1: | EFA352EB2ACC629B2E83A3ED1E1FA9D40BEF6406 |
SHA-256: | 5A7B0310F0C9B035F3A40CFBEBC914CCF8CC2ED089FC910613F17A12406167F1 |
SHA-512: | 16DAFDB3696C453B0FA6907AD42F1944A39DF4470E40331A517CCF6030E46F473CAC0A2C9314F6A4C6C3AABE04AF3A8E6B82690099241C16D604DAD13BC19A44 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14336 |
Entropy (8bit): | 5.671184712017492 |
Encrypted: | false |
SSDEEP: | 192:i6JaVGQ+xI5EeuyvMmGpeWH2J5xprN+AxT7K72dwF7dBdcQOz:i6JaVh4I5rpPbT7+BdhO |
MD5: | 3809B1424D53CCB427C88CABAB8B5F94 |
SHA1: | BC74D911216F32A9CA05C0D9B61A2AECFC0D1C0E |
SHA-256: | 426EFD56DA4014F12EC8EE2E268F86B848BBCA776333D55482CB3EB71C744088 |
SHA-512: | 626A1C5EDD86A71579E42BAC8DF479184515E6796FA21CB4FAD6731BB775641D25F8EB8E86B939B9DB9099453E85C572C9EA7897339A3879A1B672BC9226FCEE |
Malicious: | false |
Antivirus: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7168 |
Entropy (8bit): | 4.75071058554672 |
Encrypted: | false |
SSDEEP: | 96:Z+rBC0x22epxPEvC4FkWE+in1/FMvsCGRfRFqCB5tXGhEl5VN:Z+FepxPE1r8/FtmCDtWg5v |
MD5: | 8262FBC2A172FF04146E7587649D7091 |
SHA1: | 628BE3FEDE2A79D4B321B12F979711CAF77E8A7E |
SHA-256: | AC53840D019B746AB5DABAA40D7720C9A4487C861B155926454BF8B10BD0963D |
SHA-512: | 8E11F1F1811A424B1AE5AB8E064D5313ADC118EE7607F6A6F9B9976647CA6C91496133D5575D4737386A1485F39CF6FD074DBFD619807F42FE148A640186F639 |
Malicious: | true |
Antivirus: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 932 |
Entropy (8bit): | 5.33966911681974 |
Encrypted: | false |
SSDEEP: | 24:UTdRvAVaL+hk183u41Sy1kBG5rMoIzuo1550GzC9oP:OnC2GDGWMFzD |
MD5: | 447B77047C6C123C2FE460F87499A76B |
SHA1: | BC65671F3B12F865D55BC4EDB4E5484AD645F0C7 |
SHA-256: | 3DDB5FEE1C54A48802E1DDEBCFCBF242D89E441C0813D4D83011D2C4E275BC59 |
SHA-512: | 143860D0459F6403E40F7407FDA7402E88CF0488C39BEFA01BD5640DF1448938F77957947D697DB07F4DAA0606508F3083CFDB196224846D2B6009B710EEF893 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26494 |
Entropy (8bit): | 1.9568109962493656 |
Encrypted: | false |
SSDEEP: | 24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz |
MD5: | CBE40FD2B1EC96DAEDC65DA172D90022 |
SHA1: | 366C216220AA4329DFF6C485FD0E9B0F4F0A7944 |
SHA-256: | 3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2 |
SHA-512: | 62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1347 |
Entropy (8bit): | 4.536485387352011 |
Encrypted: | false |
SSDEEP: | 24:8mW5/j2EydOE4JlRBnRtxW+Am634dw96yhyjCyjB6tUUeXqygm:8mWR9ydODl/rym44di6ysCyku+yg |
MD5: | BAE3A0FE9AC6C4A58DD7A7D8F06A5897 |
SHA1: | DDFBC959EA9FFF8BEEE6B76F5FBD822981F7DF76 |
SHA-256: | 854203A3BA66AE01C65710CDC214665AF996228FFCD32585F014BE6496A4CA1D |
SHA-512: | C859EA446ECD9943D54DB8281CF0FB9205634EE1E61AEB58797477842D089C6615A0FCC53B39A03487DB2B6DE2BA3649A87EF661E18AEB30DA3C747A11F97B8B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1347 |
Entropy (8bit): | 4.546423476027205 |
Encrypted: | false |
SSDEEP: | 24:8m5/AYcE8dOE4JlRBnRtCtbAm614dw96YhyjCyjB6tUUe3qygm:8mRAg8dODl/rCKmC4di6TCykueyg |
MD5: | 71C0B1379C51812F49AC17B4E0043F67 |
SHA1: | 435BBC0C184204DFE1E5BD5ADA63E4ABB8DD5F58 |
SHA-256: | 88C30B6B1D7CFE3B1F66504ED22B456F6B27424B9A6F61DDEC6648134A12729D |
SHA-512: | 01F6B1B2BC8CDD1DD0FEFE2878D38174708EA8CB5F7E47116EA7FDB74248E8EFF6A6DE1A505A8CBD9FC89409323C805363E8A14549484A885BAAA31B56DF81C6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1062 |
Entropy (8bit): | 3.385917045022051 |
Encrypted: | false |
SSDEEP: | 24:8hdOAOlZSphv4+dw96pdhyjCyjB62OUFqy:8hdOLlwfv4+di6piCyk2Xcy |
MD5: | 8ED23871731C1D07CD2664187A1BA15B |
SHA1: | CBE1F2B70E51FDA18CF0A798D95491D247D997E5 |
SHA-256: | B3B05C30CE463C666C046D2B4FA1CC97AEEF53CC5C5E9DEAE42959B0CE96C8B1 |
SHA-512: | 26F166C307FECE351CEFEB97D68BD506260D0FED693172ED143056C7F8F49AE3877F51CF6F1E70C5BC196C6F24F33DCD82C9DF6D6A2638DDF122A71D39333302 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.751912556521728 |
TrID: |
|
File name: | SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
File size: | 167'088 bytes |
MD5: | eb6cc0cb208e5178fafe9f43b738c125 |
SHA1: | 3bcc2a22df1ca7507173bce5c21414cc8955a6a3 |
SHA256: | 8af7d4215d7c784bc4e675a6e1ffaf82bf7780d3aa06d72eed6043f49024c83c |
SHA512: | ef190457d572d9a8cbd1d222b9e3eb53efc117821989434bd2490f96c1c8f422e93db2d437e3a8fd076e89d51cb88df8823e8d52c60e8aab8e96309987c1bfd4 |
SSDEEP: | 3072:Qd/vyWmJe456z8Ccsk7SdgUFxF4wQj3MQo5hUnuyJ0KvpYgo+LqH+cIxH:QXpztk7S+UfFm35ojUnuyJDTa+/H |
TLSH: | 82F3021A31C6E82BD563093114B7CBBBEBF78B0513201E974F60CF7E642539A7A265D2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L....q.H.................Z..........%2..... |
Icon Hash: | 0771ccf8d84d2907 |
Entrypoint: | 0x403225 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x481C71EA [Sat May 3 14:08:42 2008 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 099c0646ea7282d232219f8807883be0 |
Instruction |
---|
sub esp, 00000180h |
push ebx |
push ebp |
push esi |
xor ebx, ebx |
push edi |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409128h |
xor esi, esi |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407030h] |
push 00008001h |
call dword ptr [004070B4h] |
push ebx |
call dword ptr [0040727Ch] |
push 00000008h |
mov dword ptr [00423F58h], eax |
call 00007F820CFF199Eh |
mov dword ptr [00423EA4h], eax |
push ebx |
lea eax, dword ptr [esp+34h] |
push 00000160h |
push eax |
push ebx |
push 0041F450h |
call dword ptr [00407158h] |
push 004091B0h |
push 004236A0h |
call 00007F820CFF1655h |
call dword ptr [004070B0h] |
mov edi, 00429000h |
push eax |
push edi |
call 00007F820CFF1643h |
push ebx |
call dword ptr [0040710Ch] |
cmp byte ptr [00429000h], 00000022h |
mov dword ptr [00423EA0h], eax |
mov eax, edi |
jne 00007F820CFEEEACh |
mov byte ptr [esp+14h], 00000022h |
mov eax, 00429001h |
push dword ptr [esp+14h] |
push eax |
call 00007F820CFF1136h |
push eax |
call dword ptr [0040721Ch] |
mov dword ptr [esp+1Ch], eax |
jmp 00007F820CFEEF05h |
cmp cl, 00000020h |
jne 00007F820CFEEEA8h |
inc eax |
cmp byte ptr [eax], 00000020h |
je 00007F820CFEEE9Ch |
cmp byte ptr [eax], 00000022h |
mov byte ptr [eax+eax+00h], 00000000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x73a4 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2d000 | 0x41e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x28c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5934 | 0x5a00 | 663546ac41801daf2dc51f560ec05a56 | False | 0.6665364583333333 | data | 6.4568655778614685 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x1190 | 0x1200 | db16645055619c0cc73276ff5c3adb75 | False | 0.4448784722222222 | data | 5.177968128705381 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x1af98 | 0x400 | f0511f18783910813a0de0de02bc1206 | False | 0.552734375 | data | 4.702501941692098 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x24000 | 0x9000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x2d000 | 0x41e0 | 0x4200 | 4b7d066e286ca1e7ce71a0dbc29c27d6 | False | 0.6244673295454546 | data | 5.934949240842347 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x2d310 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.7213883677298312 |
RT_ICON | 0x2e3b8 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colors | English | United States | 0.6751066098081023 |
RT_ICON | 0x2f260 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colors | English | United States | 0.7851985559566786 |
RT_ICON | 0x2fb08 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colors | English | United States | 0.6560693641618497 |
RT_ICON | 0x30070 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8031914893617021 |
RT_ICON | 0x304d8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.3118279569892473 |
RT_ICON | 0x307c0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.36824324324324326 |
RT_DIALOG | 0x308e8 | 0x120 | data | English | United States | 0.5138888888888888 |
RT_DIALOG | 0x30a08 | 0x202 | data | English | United States | 0.4085603112840467 |
RT_DIALOG | 0x30c10 | 0xf8 | data | English | United States | 0.6290322580645161 |
RT_DIALOG | 0x30d08 | 0xa0 | data | English | United States | 0.60625 |
RT_DIALOG | 0x30da8 | 0xee | data | English | United States | 0.6302521008403361 |
RT_GROUP_ICON | 0x30e98 | 0x68 | data | English | United States | 0.6634615384615384 |
RT_MANIFEST | 0x30f00 | 0x2dd | XML 1.0 document, ASCII text, with very long lines (733), with no line terminators | English | United States | 0.5334242837653479 |
DLL | Import |
---|---|
KERNEL32.dll | CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA |
USER32.dll | EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 13, 2024 15:25:25.165733099 CEST | 53 | 54562 | 1.1.1.1 | 192.168.2.6 |
Click to jump to process
Target ID: | 0 |
Start time: | 09:25:02 |
Start date: | 13/07/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win32.Riskware.SmartSniff.A.19644.6917.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 167'088 bytes |
MD5 hash: | EB6CC0CB208E5178FAFE9F43B738C125 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:25:15 |
Start date: | 13/07/2024 |
Path: | C:\Program Files (x86)\NirSoft\SmartSniff\smsniff.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 82'432 bytes |
MD5 hash: | CC160FFCD2A395EC44B8F5BC53CC6233 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |