Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_55.exe

Overview

General Information

Sample name:LisectAVT_2403002B_55.exe
Analysis ID:1481595
MD5:9420d134bc3579423a69e90821311cdc
SHA1:45060ea8a7a17b627f0203ecbaa7c20f6cfbe5e4
SHA256:3b38b9cf3821288e19450b9b4df1d4e79b20643c7bf7608ce3de97c35b9a0c99
Tags:CoinMinerexe
Infos:

Detection

Xmrig
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Detected Stratum mining protocol
Potential thread-based time evasion detected
Query firmware table information (likely to detect VMs)
Abnormal high CPU Usage
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • LisectAVT_2403002B_55.exe (PID: 5508 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_55.exe" MD5: 9420D134BC3579423A69E90821311CDC)
    • conhost.exe (PID: 3404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 1464 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 1464, ProcessName: svchost.exe
    No Snort rule has matched
    Timestamp:2024-07-25T11:40:58.384154+0200
    SID:2022930
    Source Port:443
    Destination Port:62255
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T11:39:57.135683+0200
    SID:2022930
    Source Port:443
    Destination Port:49704
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T11:39:09.076683+0200
    SID:2826930
    Source Port:62256
    Destination Port:13333
    Protocol:TCP
    Classtype:Crypto Currency Mining Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LisectAVT_2403002B_55.exeAvira: detected
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability

    Bitcoin Miner

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP
    Source: global trafficTCP traffic: 192.168.2.8:62256 -> 5.75.158.61:13333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"471slrhbcpv57qf3azqudhxen28bj8gmk2n28psjetwdtddasixko5k3bhe27esav97mbsw4jonrmfopeqzkuckl7hfxve4","pass":"5sgkywkl87","agent":"xmrig/6.20.0-c3pool (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/gpu","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":118.66160745084512,"cn/2":118.66160745084512,"cn/r":118.66160745084512,"cn/fast":237.32321490169025,"cn/half":237.32321490169025,"cn/xao":118.66160745084512,"cn/rto":118.66160745084512,"cn/rwz":158.21547660112682,"cn/zls":158.21547660112682,"cn/double":59.33080372542256,"cn/ccx":209.72809013108005,"cn-lite/1":297.86113159835634,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":83.39802595098149,"cn-pico":1809.9870298313876,"cn-pico/tlo":1809.9870298313876,"cn/upx2":0.0,"cn/gpu":15.664303681683055,"rx/0":581.4741035856573,"rx/wow":0.0,"rx/arq":2612.577484503099,"rx/graft":614.562524970036,"rx/sfx":581.4741035856573,"rx/keva":0.0,"panthera":372.83901269111624,"argon2/chukwa":0.0,"argon2/chukwav2":1052.7885146327997,"argon2/ninja":0.0,"ghostrider":216.09798775153106}}}.
    Source: LisectAVT_2403002B_55.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: global trafficTCP traffic: 192.168.2.8:62256 -> 5.75.158.61:13333
    Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeProcess Stats: CPU usage > 49%
    Source: LisectAVT_2403002B_55.exe, 00000000.00000000.1446829608.00007FF698A7C000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMpUXSrv.exe0 vs LisectAVT_2403002B_55.exe
    Source: LisectAVT_2403002B_55.exeBinary or memory string: OriginalFilenameMpUXSrv.exe0 vs LisectAVT_2403002B_55.exe
    Source: classification engineClassification label: mal72.evad.mine.winEXE@3/0@1/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3404:120:WilError_03
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_55.exe "C:\Users\user\Desktop\LisectAVT_2403002B_55.exe"
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: explorerframe.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
    Source: LisectAVT_2403002B_55.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: LisectAVT_2403002B_55.exeStatic file information: File size 2023951 > 1048576
    Source: LisectAVT_2403002B_55.exeStatic PE information: Raw size of GOOD is bigger than: 0x100000 < 0x1e7c00
    Source: LisectAVT_2403002B_55.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: initial sampleStatic PE information: section where entry point is pointing to: GOOD
    Source: LisectAVT_2403002B_55.exeStatic PE information: section name: GOOD
    Source: LisectAVT_2403002B_55.exeStatic PE information: section name: GOOD
    Source: LisectAVT_2403002B_55.exeStatic PE information: section name: GOOD entropy: 7.938608752319478
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: Initial fileSignature Results: Thread-based counter
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_55.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: LisectAVT_2403002B_55.exe, 00000000.00000002.3889777794.000001D59E37A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: conhost.exe, 00000001.00000002.3889970993.00000294A69E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: conhost.exe, 00000001.00000002.3889970993.00000294A69E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: conhost.exe, 00000001.00000002.3889970993.00000294A69E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
    Source: conhost.exe, 00000001.00000002.3889970993.00000294A69E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    2
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Software Packing
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS11
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    LisectAVT_2403002B_55.exe100%AviraHEUR/AGEN.1357980
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    auto.c3pool.org
    5.75.158.61
    truetrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      5.75.158.61
      auto.c3pool.orgGermany
      24940HETZNER-ASDEtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1481595
      Start date and time:2024-07-25 11:38:13 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 15s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:LisectAVT_2403002B_55.exe
      Detection:MAL
      Classification:mal72.evad.mine.winEXE@3/0@1/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: LisectAVT_2403002B_55.exe
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      5.75.158.61LisectAVT_2403002A_416.exeGet hashmaliciousXmrigBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        auto.c3pool.orgLisectAVT_2403002A_416.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        K4gsPJGEi4.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        x00zm3KVwb.exeGet hashmaliciousXmrigBrowse
        • 88.198.117.174
        4xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
        • 5.161.70.189
        UO2z4n1Sxx.exeGet hashmaliciousUnknownBrowse
        • 88.198.117.174
        4xHN38uqxB.exeGet hashmaliciousXmrigBrowse
        • 88.198.117.174
        c3p.exeGet hashmaliciousXmrigBrowse
        • 88.198.117.174
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        HETZNER-ASDELisectAVT_2403002B_59.dllGet hashmaliciousEmotetBrowse
        • 78.47.204.80
        LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
        • 159.69.118.212
        Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
        • 95.217.240.177
        LisectAVT_2403002C_47.exeGet hashmaliciousSmokeLoaderBrowse
        • 188.40.141.211
        LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
        • 128.140.125.116
        Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
        • 195.201.57.90
        LisectAVT_2403002C_67.exeGet hashmaliciousPureLog Stealer, VidarBrowse
        • 128.140.125.116
        LisectAVT_2403002C_81.exeGet hashmaliciousVidarBrowse
        • 128.140.125.116
        LisectAVT_2403002A_416.exeGet hashmaliciousXmrigBrowse
        • 5.75.158.61
        LisectAVT_2403002A_180.exeGet hashmaliciousPolyRansomBrowse
        • 144.76.195.253
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (console) x86-64, for MS Windows
        Entropy (8bit):7.9313297489727335
        TrID:
        • Win64 Executable Console (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:LisectAVT_2403002B_55.exe
        File size:2'023'951 bytes
        MD5:9420d134bc3579423a69e90821311cdc
        SHA1:45060ea8a7a17b627f0203ecbaa7c20f6cfbe5e4
        SHA256:3b38b9cf3821288e19450b9b4df1d4e79b20643c7bf7608ce3de97c35b9a0c99
        SHA512:8a60c4b54001256ca434dcf75c1c92bbbcf2afad9ab469a91bd59b598331b0052060feb9666c3212609a770a7f3673d439c2a6ab4c4b8dfde82d20e5d60e46c2
        SSDEEP:49152:jf5NtP4ZrMFuuZJ6rVoNm5AS4XdoPPxq0IyYzObx2:jf5csmV15P8oP5EyYV
        TLSH:2B95339B814F08A0F7170F767029C1C0FE956E2916C61AEFC74CB8E7D6B3589194A35B
        File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........'z..I)..I)..I)..J(..I)..L(0.I)...)..I)..M(..I)..J(..I)..L(..I)..M(..I)..M(..I)..H)..I)..H(..I)8.M(..I)..@(..I)..J(..I)...)..I
        Icon Hash:878f595d4d473618
        Entrypoint:0x1407fb6d0
        Entrypoint Section:GOOD
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x65BD4884 [Fri Feb 2 19:54:44 2024 UTC]
        TLS Callbacks:0x407fb981, 0x1
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:6649ddb93b9e7fbe447efc05d4b43998
        Instruction
        push ebx
        push esi
        push edi
        push ebp
        dec eax
        lea esi, dword ptr [FFE18925h]
        dec eax
        lea edi, dword ptr [esi-00613000h]
        dec eax
        lea eax, dword ptr [edi+007AA054h]
        push dword ptr [eax]
        mov dword ptr [eax], 90AD9090h
        push eax
        push edi
        xor ebx, ebx
        xor ecx, ecx
        dec eax
        or ebp, FFFFFFFFh
        call 00007F870106CC85h
        add ebx, ebx
        je 00007F870106CC34h
        rep ret
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        rep ret
        dec eax
        lea eax, dword ptr [edi+ebp]
        cmp ecx, 05h
        mov dl, byte ptr [eax]
        jbe 00007F870106CC53h
        dec eax
        cmp ebp, FFFFFFFCh
        jnbe 00007F870106CC4Dh
        sub ecx, 04h
        mov edx, dword ptr [eax]
        dec eax
        add eax, 04h
        sub ecx, 04h
        mov dword ptr [edi], edx
        dec eax
        lea edi, dword ptr [edi+04h]
        jnc 00007F870106CC21h
        add ecx, 04h
        mov dl, byte ptr [eax]
        je 00007F870106CC42h
        dec eax
        inc eax
        mov byte ptr [edi], dl
        sub ecx, 01h
        mov dl, byte ptr [eax]
        dec eax
        lea edi, dword ptr [edi+01h]
        jne 00007F870106CC22h
        rep ret
        cld
        inc ecx
        pop ebx
        jmp 00007F870106CC3Ah
        dec eax
        inc esi
        mov byte ptr [edi], dl
        dec eax
        inc edi
        mov dl, byte ptr [esi]
        add ebx, ebx
        jne 00007F870106CC3Ch
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        jc 00007F870106CC18h
        lea eax, dword ptr [ecx+01h]
        jmp 00007F870106CC39h
        dec eax
        inc ecx
        call ebx
        adc eax, eax
        inc ecx
        call ebx
        adc eax, eax
        add ebx, ebx
        jne 00007F870106CC3Ch
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        jnc 00007F870106CC16h
        sub eax, 03h
        jc 00007F870106CC4Bh
        shl eax, 08h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x801eb40x2dc.rsrc
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7fc0000x5eb4.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7bf0000x1fe90GOOD
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8021900x24.rsrc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x7fb9a80x28GOOD
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7fba080x140GOOD
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        GOOD0x10000x6130000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        GOOD0x6140000x1e80000x1e7c0070a6a445bb625914bc404a28519b70d4False0.9791823503972322data7.938608752319478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x7fc0000x70000x6200102439ea3fb0e996dccca7e7caf119ceFalse0.5770487882653061data5.521124671724878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x7fc2400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.5700867052023122
        RT_ICON0x7fc7ac0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.699468085106383
        RT_ICON0x7fcc180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.7346570397111913
        RT_ICON0x7fd4c40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.6383677298311444
        RT_ICON0x7fe5700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.5751599147121536
        RT_ICON0x7ff41c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.537655601659751
        RT_GROUP_ICON0x8019c80x5adata0.7
        RT_VERSION0x801a280x308data0.4742268041237113
        RT_MANIFEST0x801d340x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        ADVAPI32.dllLsaClose
        bcrypt.dllBCryptGenRandom
        CRYPT32.dllCertOpenStore
        IPHLPAPI.DLLGetAdaptersAddresses
        KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
        ole32.dllCoInitializeEx
        SHELL32.dllSHGetSpecialFolderPathA
        USER32.dllShowWindow
        USERENV.dllGetUserProfileDirectoryW
        WS2_32.dllioctlsocket
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
        2024-07-25T11:40:58.384154+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436225552.165.165.26192.168.2.8
        2024-07-25T11:39:57.135683+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970452.165.165.26192.168.2.8
        2024-07-25T11:39:09.076683+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage6225613333192.168.2.85.75.158.61
        TimestampSource PortDest PortSource IPDest IP
        Jul 25, 2024 11:42:34.068622112 CEST6225613333192.168.2.85.75.158.61
        Jul 25, 2024 11:42:34.073596954 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:42:34.073684931 CEST6225613333192.168.2.85.75.158.61
        Jul 25, 2024 11:42:34.073890924 CEST6225613333192.168.2.85.75.158.61
        Jul 25, 2024 11:42:34.079011917 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:42:34.079166889 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:42:34.728892088 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:42:34.810940027 CEST6225613333192.168.2.85.75.158.61
        Jul 25, 2024 11:43:03.085855961 CEST6225613333192.168.2.85.75.158.61
        Jul 25, 2024 11:43:03.090914965 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:43:03.330029964 CEST13333622565.75.158.61192.168.2.8
        Jul 25, 2024 11:43:03.514115095 CEST6225613333192.168.2.85.75.158.61
        TimestampSource PortDest PortSource IPDest IP
        Jul 25, 2024 11:40:15.225584984 CEST53512911.1.1.1192.168.2.8
        Jul 25, 2024 11:42:34.055481911 CEST5840053192.168.2.81.1.1.1
        Jul 25, 2024 11:42:34.066077948 CEST53584001.1.1.1192.168.2.8
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 25, 2024 11:42:34.055481911 CEST192.168.2.81.1.1.10xabcfStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 25, 2024 11:42:34.066077948 CEST1.1.1.1192.168.2.80xabcfNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
        Jul 25, 2024 11:42:34.066077948 CEST1.1.1.1192.168.2.80xabcfNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:05:39:11
        Start date:25/07/2024
        Path:C:\Users\user\Desktop\LisectAVT_2403002B_55.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_55.exe"
        Imagebase:0x7ff698280000
        File size:2'023'951 bytes
        MD5 hash:9420D134BC3579423A69E90821311CDC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:05:39:11
        Start date:25/07/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6ee680000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:6
        Start time:05:39:59
        Start date:25/07/2024
        Path:C:\Windows\System32\svchost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
        Imagebase:0x7ff67e6d0000
        File size:55'320 bytes
        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
        Has elevated privileges:true
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        No disassembly