Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Analysis ID:1494655
MD5:0a22ee2a7354dbfd4a802bd68c7c67fc
SHA1:829ef593707684e4e90ba96c273151995e0a1472
SHA256:1ccb286c02b131eb643ce5456905582a836b9af1bcb12db6b0636d3f94532ed6
Tags:exe
Errors
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Binary string: C:\Users\andreu\Downloads\saturn-mapper-main\saturn-mapper-main\x64\Release\saturn map_Release.pdb11 source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: Binary string: C:\Users\andreu\Downloads\saturn-mapper-main\saturn-mapper-main\x64\Release\saturn map_Release.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeString found in binary or memory: http://ocsp.thawte.com0
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe, 00000000.00000000.2048415181.00000000005E3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeBinary string: \Device\Nal
Source: classification engineClassification label: unknown1.winEXE@1/0@0/0
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\andreu\Downloads\saturn-mapper-main\saturn-mapper-main\x64\Release\saturn map_Release.pdb11 source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: Binary string: C:\Users\andreu\Downloads\saturn-mapper-main\saturn-mapper-main\x64\Release\saturn map_Release.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Source: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exeStatic PE information: real checksum: 0x1322a should be: 0x17a31
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No Mitre Att&ck techniques found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1494655 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 19/08/2024 Architecture: WINDOWS Score: 1 4 SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exefalse
  • URL Reputation: safe
unknown
http://ocsp.thawte.com0SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1494655
Start date and time:2024-08-19 00:29:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
Detection:UNKNOWN
Classification:unknown1.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (native) x86-64, for MS Windows
Entropy (8bit):5.943975678042477
TrID:
  • Win64 Device Driver (generic) (12004/3) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
File size:65'968 bytes
MD5:0a22ee2a7354dbfd4a802bd68c7c67fc
SHA1:829ef593707684e4e90ba96c273151995e0a1472
SHA256:1ccb286c02b131eb643ce5456905582a836b9af1bcb12db6b0636d3f94532ed6
SHA512:f73cfc969b1ce2d7f46a34c86936f580db08173afaa951e0e07399db5d11d1e31c9d305da9a4e2c45d78b755c1e0ed9a0ccbb8f7ac673445c41a25cac8f40598
SSDEEP:1536:mSmJTQSwZ9umiu/6SqCa4xsCxKRK2Ozs:fmJTQSaMm5/6Ca4eCZ2Ozs
TLSH:4A534A8373981465F6B756FC86B64615ABB17E640B31A3CF2290413C0FA37E46E3BB52
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G...................$...uy......uy......uy..............uy......Rich....................PE..d......R.........."......P....\....
Icon Hash:00928e8e8686b000
Entrypoint:0x5e2200
Entrypoint Section:INIT
Digitally signed:true
Imagebase:0x10000
Subsystem:native
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x5284EAC3 [Thu Nov 14 15:22:43 2013 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:55db306bc2be3ff71a6b91fd9db051b8
Signature Valid:
Signature Issuer:
Signature Validation Error:
Error Number:
Not Before, Not After
    Subject Chain
      Version:
      Thumbprint MD5:
      Thumbprint SHA-1:
      Thumbprint SHA-256:
      Serial:
      Instruction
      dec eax
      mov eax, dword ptr [FFA34F01h]
      dec ecx
      mov ecx, 2DDFA232h
      cdq
      sub eax, dword ptr [eax]
      add byte ptr [eax-7Bh], cl
      sal byte ptr [ebp+eax+49h], 0000003Bh
      sal dword ptr [ebp+2Fh], 4Ch
      lea eax, dword ptr [FFA34EE6h]
      dec eax
      mov eax, 00000320h
      xor bh, FFFFFFFFh
      dec dword ptr [eax-75h]
      add byte ptr [ecx+33h], cl
      ror byte ptr [ecx-48h], FFFFFFFFh
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x5d22dc0x3cINIT
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d30000x3f8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5d10000x408.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x68000x1f08
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x61500x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x60000x148.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x46150x4800658045c4f01ff520bd915f6ae780bb32False0.4717339409722222Matlab v4 mat-file (little endian) \3540H\213\331H\215, numeric, rows 0, columns 06.227045063215454IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x60000x7c00x800a9fd28c26d39a69935129379ffde5f25False0.5068359375data4.656629330107381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
      .data0x70000x5c9ec00x200ebd8a922cbe8ab7f614843e8706ed006unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x5d10000x4080x600b5ae8bd78edef2804ed9d0406fcd650aFalse0.353515625PEX Binary Archive3.1422739943466262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
      INIT0x5d20000x7a80x8006f6894644224d7239def2e984925e864False0.59326171875Matlab v4 mat-file (little endian) \203\354hH\211X\030H\213\331L\215\005\253\002, numeric, rows 0, columns 05.68000953149949IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x5d30000x3f80x400e503be0ddf75f99b22763e68a65972c7False0.455078125data3.4033291780766843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x5d30600x394OpenPGP Secret KeyEnglishUnited States0.4650655021834061
      DLLImport
      ntoskrnl.exeIoCreateSymbolicLink, IoCreateDevice, IofCompleteRequest, ExAllocatePoolWithTag, ExFreePoolWithTag, MmGetPhysicalAddress, DbgPrint, strncpy, vsprintf, IoFreeMdl, MmMapLockedPagesSpecifyCache, MmBuildMdlForNonPagedPool, IoAllocateMdl, MmUnmapIoSpace, MmUnmapLockedPages, MmAllocateContiguousMemory, MmFreeContiguousMemory, RtlInitUnicodeString, ObfDereferenceObject, KeWaitForSingleObject, IofCallDriver, IoBuildSynchronousFsdRequest, KeInitializeEvent, ZwClose, RtlFreeAnsiString, strstr, RtlUnicodeStringToAnsiString, ZwEnumerateValueKey, ZwOpenKey, wcsncpy, IoGetDeviceObjectPointer, IoGetDeviceInterfaces, ObReferenceObjectByPointer, KeBugCheckEx, IoDeleteSymbolicLink, MmMapIoSpace, IoDeleteDevice
      HAL.dllKeStallExecutionProcessor, KeQueryPerformanceCounter
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:18:29:58
      Start date:18/08/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.29681.4103.exe"
      Imagebase:0x10000
      File size:65'968 bytes
      MD5 hash:0A22EE2A7354DBFD4A802BD68C7C67FC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly