Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
Analysis ID:1499607
MD5:45fb6e45804331506a8855a65ed14844
SHA1:67e0d682a5e7ef5f52a3b2015498512298937711
SHA256:651ae67653de89b3feb53f9805f69c4c50734879016b5227f5ef2cd015377de9
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe (PID: 3472 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe" MD5: 45FB6E45804331506A8855A65ED14844)
    • conhost.exe (PID: 5388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeVirustotal: Detection: 12%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 88.5% probability
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: teknologiia.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36Accept: application/x-www-form-urlencodedAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.169.204.138User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36Accept: application/x-www-form-urlencodedAccept-Encoding: gzip
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.204.138
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.204.138
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.204.138
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.204.138
Source: unknownTCP traffic detected without corresponding DNS query: 95.169.204.138
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: teknologiia.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36Accept: application/x-www-form-urlencodedAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.169.204.138User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36Accept: application/x-www-form-urlencodedAccept-Encoding: gzip
Source: global trafficDNS traffic detected: DNS query: teknologiia.com
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe, 00000000.00000002.2409085444.000000C000044000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://95.169.204.138
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: http://95.169.204.138:4444/venom.binaccessing
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Number of sections : 15 > 10
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Section: /19 ZLIB complexity 0.9993845100967008
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Section: /32 ZLIB complexity 0.9935255524861878
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Section: /65 ZLIB complexity 0.9980047445381637
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Section: /78 ZLIB complexity 0.9891201036866359
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeBinary string: bindm in unexpected GOOSrunqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockunexpected buffer len=%vinvalid pseudo-header %qframe_headers_prio_shortinvalid request :path %qread_frame_conn_error_%sRequest Entity Too Largehttp: nil Request.HeaderGetDeviceDriverBaseNameWGetDeviceDriverFileNameWAllocateAndInitializeSidBuildSecurityDescriptorWAssignProcessToJobObjectGenerateConsoleCtrlEventGetMaximumProcessorCountGetNamedPipeHandleStateWSetDefaultDllDirectoriesNtQuerySystemInformationSetupDiCreateDeviceInfoWSetupDiGetSelectedDeviceSetupDiSetSelectedDeviceGetWindowThreadProcessId\Device\NamedPipe\cygwinerror decrypting messagecertificate unobtainableidna: disallowed rune %Uaddress string too shortresource length too longunpacking Question.Classflate: maxBits too largex509: malformed validitystreamSafe was not resetinvalid pattern syntax: SafeArrayAllocDescriptorReadProcessMemory failedGetProcessImageFileNameAGODEBUG sys/cpu: value "", required CPU feature
Source: classification engineClassification label: mal52.winEXE@2/1@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5388:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeFile opened: C:\Windows\system32\df3e0a4d0b9642bd420d0b7db34dd22337926678d7a40c7488a3cf7e1f6fd81cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeVirustotal: Detection: 12%
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine unreachable: RegSetValueExWalligator2.flfcaligraphy.flfcyberlarge.flfcybersmall.flfisometric1.flfisometric2.flfisometric3.flfisometric4.flfrectangles.flfsmkeyboard.flfthreepoint.flfticksslant.flftinker-toy.flffonts/bell.flffonts/doom.flffonts/epic.flffonts/kban.flffonts/lean.flffonts/mike.flffonts/mini.flffonts/ogre.flffonts/pawp.flffonts/stop.flffonts/term.flffonts/thin.flffonts/trek.flffonts/wavy.flfContent-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAMERR_UNKNOWN_%daccept-charsetcontent-lengthread_frame_eofinternal errorunknown error unknown code: Not Acceptableunknown mode: Process32FirstControlServiceCreateServiceWIsWellKnownSidMakeAbsoluteSDSetThreadTokenCreateEventExWCreateMutexExWIsWow64ProcessLoadLibraryExWSetConsoleModeSizeofResourceVirtualProtectVirtualQueryExCoInitializeExCoUninitializeGetShellWindowVerQueryValueWmime/multipart.WithDeadline(<not Stringer>bad record MACAccept-CharsetDkim-Signatureneed more dataREQUEST_METHODRCodeNameErrorResourceHeaderSysAllocString\.+*?()|[]{}^$GetSystemTimesdata truncatedGetProcessTimesDuplicateHandleadvertise errorkey has expirednetwork is downno medium foundno such processGetAdaptersInfoCreateHardLinkWDeviceIoControlFlushViewOfFileGetCommandLineWGetStartupInfoWProcess32FirstWUnmapViewOfFileFailed to load Failed to find : cannot parse ,M3.2.0,M11.1.0
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine unreachable: RegSetValueExWalligator2.flfcaligraphy.flfcyberlarge.flfcybersmall.flfisometric1.flfisometric2.flfisometric3.flfisometric4.flfrectangles.flfsmkeyboard.flfthreepoint.flfticksslant.flftinker-toy.flffonts/bell.flffonts/doom.flffonts/epic.flffonts/kban.flffonts/lean.flffonts/mike.flffonts/mini.flffonts/ogre.flffonts/pawp.flffonts/stop.flffonts/term.flffonts/thin.flffonts/trek.flffonts/wavy.flfContent-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAMERR_UNKNOWN_%daccept-charsetcontent-lengthread_frame_eofinternal errorunknown error unknown code: Not Acceptableunknown mode: Process32FirstControlServiceCreateServiceWIsWellKnownSidMakeAbsoluteSDSetThreadTokenCreateEventExWCreateMutexExWIsWow64ProcessLoadLibraryExWSetConsoleModeSizeofResourceVirtualProtectVirtualQueryExCoInitializeExCoUninitializeGetShellWindowVerQueryValueWmime/multipart.WithDeadline(<not Stringer>bad record MACAccept-CharsetDkim-Signatureneed more dataREQUEST_METHODRCodeNameErrorResourceHeaderSysAllocString\.+*?()|[]{}^$GetSystemTimesdata truncatedGetProcessTimesDuplicateHandleadvertise errorkey has expirednetwork is downno medium foundno such processGetAdaptersInfoCreateHardLinkWDeviceIoControlFlushViewOfFileGetCommandLineWGetStartupInfoWProcess32FirstWUnmapViewOfFileFailed to load Failed to find : cannot parse ,M3.2.0,M11.1.0
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: failed to construct HKDF label: %sVirtualAlloc failed and returned 0crypto/rsa: missing public modulusadding nil Certificate to CertPoolx509: unknown public key algorithmx509: invalid certificate policies%s %q is excluded by constraint %qx509: Ed25519 verification failurex509: unhandled critical extensioncrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapinvalid padding bits in BIT STRINGGODEBUG sys/cpu: can not disable "chacha20: wrong HChaCha20 key sizeinvalid nested repetition operatorinvalid or unsupported Perl syntaxnetwork dropped connection on resettransport endpoint is not connected2006-01-02T15:04:05.999999999Z07:001776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0SubscribeServiceChangeNotificationserror while getting LinkedToken: %vunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKmime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largetoo many Questions to pack (>65535)HostProvider already registered: %vflate: corrupt input before offset bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accesscrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferhttp://95.169.204.138:4444/venom.binaccessing a corrupted shared libraryTime.UnmarshalBinary: invalid length444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable o
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: failed to construct HKDF label: %sVirtualAlloc failed and returned 0crypto/rsa: missing public modulusadding nil Certificate to CertPoolx509: unknown public key algorithmx509: invalid certificate policies%s %q is excluded by constraint %qx509: Ed25519 verification failurex509: unhandled critical extensioncrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapinvalid padding bits in BIT STRINGGODEBUG sys/cpu: can not disable "chacha20: wrong HChaCha20 key sizeinvalid nested repetition operatorinvalid or unsupported Perl syntaxnetwork dropped connection on resettransport endpoint is not connected2006-01-02T15:04:05.999999999Z07:001776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9reflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadlinehttp: server closed idle connectionCONTINUATION frame with stream ID 0SubscribeServiceChangeNotificationserror while getting LinkedToken: %vunsupported signature algorithm: %vtls: too many non-advancing recordstls: server selected an invalid PSKmime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largetoo many Questions to pack (>65535)HostProvider already registered: %vflate: corrupt input before offset bigmod: modulus is smaller than natx509: malformed extension OID fieldx509: wrong Ed25519 public key sizex509: invalid authority info accesscrypto/md5: invalid hash state size'_' must separate successive digitsP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitysuperfluous leading zeros in lengthchacha20: output smaller than inputtransform: short destination bufferhttp://95.169.204.138:4444/venom.binaccessing a corrupted shared libraryTime.UnmarshalBinary: invalid length444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzmethod ABI and value ABI don't alignlfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable o
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeString found in binary or memory: /usr/lib/go-1.22/src/net/addrselect.go
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeSection loaded: gpapi.dllJump to behavior
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic file information: File size 8498688 > 1048576
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x274000
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x286600
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: .xdata
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /4
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /19
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /32
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /46
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /65
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /78
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: /90
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe, 00000000.00000002.2410878625.000002C2A3894000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll??
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Software Packing
OS Credential Dumping1
Query Registry
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe11%ReversingLabs
SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe12%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
teknologiia.com2%VirustotalBrowse
SourceDetectionScannerLabelLink
http://95.169.204.138:4444/venom.binaccessing0%Avira URL Cloudsafe
https://teknologiia.com/0%Avira URL Cloudsafe
http://95.169.204.138/0%Avira URL Cloudsafe
http://95.169.204.1380%Avira URL Cloudsafe
http://95.169.204.1381%VirustotalBrowse
http://95.169.204.138/1%VirustotalBrowse
http://95.169.204.138:4444/venom.binaccessing0%VirustotalBrowse
https://teknologiia.com/1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
teknologiia.com
198.244.179.42
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://95.169.204.138/false
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://teknologiia.com/false
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://95.169.204.138SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe, 00000000.00000002.2409085444.000000C000044000.00000004.00001000.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://95.169.204.138:4444/venom.binaccessingSecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
95.169.204.138
unknownBulgaria
44814BTEL-BG-ASBGfalse
198.244.179.42
teknologiia.comUnited States
18630RIDLEYSD-NETUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1499607
Start date and time:2024-08-27 09:27:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
Detection:MAL
Classification:mal52.winEXE@2/1@1/2
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe, PID 3472 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
RIDLEYSD-NETUSInformations.batGet hashmaliciousPureLog Stealer, XWormBrowse
  • 198.244.206.37
Beopajki.exeGet hashmaliciousHVNC, PureLog Stealer, XWormBrowse
  • 198.244.206.37
Your_New_Social_Security_Statement.wsfGet hashmaliciousXWormBrowse
  • 198.244.251.236
http://www.loroc.co.uk/Get hashmaliciousUnknownBrowse
  • 198.244.213.27
ODggSYsZP2.elfGet hashmaliciousUnknownBrowse
  • 198.244.7.172
at0jsDxjXS.elfGet hashmaliciousUnknownBrowse
  • 198.244.66.83
SecuriteInfo.com.Trojan.Siggen21.29401.5442.21101.exeGet hashmaliciousUnknownBrowse
  • 198.244.148.151
SecuriteInfo.com.Trojan.Siggen21.29401.5442.21101.exeGet hashmaliciousUnknownBrowse
  • 198.244.148.151
https://app.seesaw.me/#/item/item.25a5fb4a-1aa3-4cc1-8620-5508b13ee78f/share/E5jhxMEuSn-0CL0gHO8msgGet hashmaliciousHTMLPhisherBrowse
  • 198.244.144.202
https://emlmkt.com/url/ver/551960127/2552870/f270b5482f31f088fa3129e0b7ea965fGet hashmaliciousUnknownBrowse
  • 198.244.165.101
BTEL-BG-ASBGfile.exeGet hashmaliciousGCleaner, Raccoon Stealer v2Browse
  • 95.169.205.186
xzQ4Zf3975.exeGet hashmaliciousRaccoon Stealer v2Browse
  • 95.169.205.186
60lAWJYfsL.exeGet hashmaliciousRaccoon Stealer v2Browse
  • 95.169.205.186
http://fwtnp.dfbf.maderclean.cl/giorgiobelfiore@dececco.itGet hashmaliciousUnknownBrowse
  • 185.7.219.103
GVlpP9RL5tGet hashmaliciousMiraiBrowse
  • 95.169.222.123
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
File Type:GLS_BINARY_LSB_FIRST
Category:dropped
Size (bytes):160
Entropy (8bit):4.438743916256937
Encrypted:false
SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
MD5:E467C82627F5E1524FDB4415AF19FC73
SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
Malicious:false
Reputation:moderate, very likely benign file
Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.971934126811223
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
File size:8'498'688 bytes
MD5:45fb6e45804331506a8855a65ed14844
SHA1:67e0d682a5e7ef5f52a3b2015498512298937711
SHA256:651ae67653de89b3feb53f9805f69c4c50734879016b5227f5ef2cd015377de9
SHA512:f6a3ea55b1bb87970fe8e90971999243b5b6a093832689957b4994fcd6af016c4c4c14f0409397668d9286ae5e5db04a121d403bfdddada5b2e314ae3b629514
SSDEEP:98304:kEHK95K6qTrbF2kEa5j9Uvo8x3BGBjMJx3QEco0:P6qTrbAaIxEjeRQVo
TLSH:18869D43EC9145E9C5EEE231C9A292537A71BC484B3167D72F50F6382FB6BD06AB9304
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........{.'....."......@'...................@...........................................`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x46d5c0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:c2d457ad8ac36fc9f18d45bffcd450c2
Instruction
jmp 00007F38A87D0EA0h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push ebp
dec eax
mov ebp, esp
pushfd
cld
dec eax
sub esp, 000000E0h
dec eax
mov dword ptr [esp], edi
dec eax
mov dword ptr [esp+08h], esi
dec eax
mov dword ptr [esp+10h], ebp
dec eax
mov dword ptr [esp+18h], ebx
dec esp
mov dword ptr [esp+20h], esp
dec esp
mov dword ptr [esp+28h], ebp
dec esp
mov dword ptr [esp+30h], esi
dec esp
mov dword ptr [esp+38h], edi
movups dqword ptr [esp+40h], xmm6
movups dqword ptr [esp+50h], xmm7
inc esp
movups dqword ptr [esp+60h], xmm0
inc esp
movups dqword ptr [esp+70h], xmm1
inc esp
movups dqword ptr [esp+00000080h], xmm2
inc esp
movups dqword ptr [esp+00000090h], xmm3
inc esp
movups dqword ptr [esp+000000A0h], xmm4
inc esp
movups dqword ptr [esp+000000B0h], xmm5
inc esp
movups dqword ptr [esp+000000C0h], xmm6
inc esp
movups dqword ptr [esp+000000D0h], xmm7
inc ebp
xorps xmm7, xmm7
dec ebp
xor esi, esi
dec eax
mov eax, dword ptr [005A2402h]
dec eax
mov eax, dword ptr [eax]
dec eax
cmp eax, 00000000h
je 00007F38A87D4785h
dec esp
mov esi, dword ptr [eax]
dec eax
sub esp, 10h
dec eax
mov eax, ecx
dec eax
mov ebx, edx
call 00007F38A87D557Bh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8410000x554.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6170000xe43c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x8420000xc7aa.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x4fcbc00x180.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x273fcd0x2740000dce538cba9a78fda81300bfb224a19funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x2750000x2864b80x286600fab5a83c47fa373d6652d1eecb02220eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x4fc0000x11a0a00x8c400b9f990e2eabcdab2d71635e59d1672b2False0.6547703598484849data6.505072815432817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x6170000xe43c0xe600e3d30d0e9a0b3575b03c4e4c4536bd3aFalse0.40010190217391306data5.434582713944269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.xdata0x6260000xb40x20067459caf6767b8db3f82e7b28a867330False0.2265625shared library1.787112262798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
/40x6270000x1290x20017f62672c8506464ae13eccc2eb6cb94False0.623046875data5.081946473254993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190x6280000x6dcc30x6de00f24a5b4234ff96c231d0512ef77f06f9False0.9993845100967008data7.996511943587052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/320x6960000x168a60x16a004996200b1bb4ac971d79492f6e806fe4False0.9935255524861878data7.937039996207801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/460x6ad0000x2d0x2004708e78f5ab324480bbc15d8604ff4d5False0.09765625data0.7883784398951422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/650x6ae0000xe1e570xe2000786e8f1024a0eeb479d6deb00d0dfe0cFalse0.9980047445381637data7.99818173884988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/780x7900000x878b00x87a0056ea228accb817da9062c157fd85f9c8False0.9891201036866359data7.9947244509139574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/900x8180000x287ce0x2880011db12b587302aa9889ef6eaaf0a9952False0.9689549575617284data7.807706266543984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.idata0x8410000x5540x600ec9095fe1be71d66643ba93dcd750ac2False0.3828125data4.058245716607451IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x8420000xc7aa0xc800827a13b6260fd1cd6d292812eb5ddb86False0.248125data5.439106434316897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.symtab0x84f0000x618d40x61a009882877ae95430a7027e8183f9b53cebFalse0.21940771046734955data5.315011308010812IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
TimestampSource PortDest PortSource IPDest IP
Aug 27, 2024 09:28:11.502588987 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:11.502614021 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:11.502677917 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:11.503128052 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:11.503143072 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.116595030 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.116844893 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.116856098 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.117022991 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.117027998 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.118057013 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.118124008 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.162884951 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.163003922 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.163064957 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.210946083 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.210957050 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.259731054 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.419763088 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419791937 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419800043 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419833899 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419848919 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419863939 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419888020 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.419888020 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.419902086 CEST44349714198.244.179.42192.168.2.6
Aug 27, 2024 09:28:12.419917107 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.419970036 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.420101881 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.420130968 CEST49714443192.168.2.6198.244.179.42
Aug 27, 2024 09:28:12.420540094 CEST4971580192.168.2.695.169.204.138
Aug 27, 2024 09:28:12.425369978 CEST804971595.169.204.138192.168.2.6
Aug 27, 2024 09:28:12.425447941 CEST4971580192.168.2.695.169.204.138
Aug 27, 2024 09:28:12.425678015 CEST4971580192.168.2.695.169.204.138
Aug 27, 2024 09:28:12.430555105 CEST804971595.169.204.138192.168.2.6
Aug 27, 2024 09:28:33.783761978 CEST804971595.169.204.138192.168.2.6
Aug 27, 2024 09:28:33.783888102 CEST4971580192.168.2.695.169.204.138
Aug 27, 2024 09:28:33.784044027 CEST4971580192.168.2.695.169.204.138
Aug 27, 2024 09:28:33.788923979 CEST804971595.169.204.138192.168.2.6
TimestampSource PortDest PortSource IPDest IP
Aug 27, 2024 09:28:11.444638968 CEST6063153192.168.2.61.1.1.1
Aug 27, 2024 09:28:11.496648073 CEST53606311.1.1.1192.168.2.6
Aug 27, 2024 09:28:29.964207888 CEST53576101.1.1.1192.168.2.6
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Aug 27, 2024 09:28:11.444638968 CEST192.168.2.61.1.1.10x1670Standard query (0)teknologiia.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Aug 27, 2024 09:28:11.496648073 CEST1.1.1.1192.168.2.60x1670No error (0)teknologiia.com198.244.179.42A (IP address)IN (0x0001)false
  • teknologiia.com
  • 95.169.204.138
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.64971595.169.204.138803472C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
TimestampBytes transferredDirectionData
Aug 27, 2024 09:28:12.425678015 CEST231OUTGET / HTTP/1.1
Host: 95.169.204.138
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: application/x-www-form-urlencoded
Accept-Encoding: gzip


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.649714198.244.179.424433472C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
TimestampBytes transferredDirectionData
2024-08-27 07:28:12 UTC232OUTGET / HTTP/1.1
Host: teknologiia.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: application/x-www-form-urlencoded
Accept-Encoding: gzip
2024-08-27 07:28:12 UTC1508INHTTP/1.1 200 OK
Server: nginx
Date: Tue, 27 Aug 2024 07:28:12 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 167771
Connection: close
Last-Modified: Fri, 05 Jul 2024 18:59:55 GMT
ETag: "28f5b-61c84ab5041e6"
Accept-Ranges: bytes
Cache-Control: max-age=0, public, public
Expires: Tue, 27 Aug 2024 07:28:12 GMT
Vary: Accept-Encoding,Cookie
Referrer-Policy: no-referrer-when-downgrade
X-Powered-By: W3 Total Cache/2.6.1
Pragma: public
Link: </wp-content/cache/minify/c4d91.js>; rel=preload; as=script
Link: </wp-content/cache/minify/aa325.js>; rel=preload; as=script
Link: </wp-content/cache/minify/0e602.js>; rel=preload; as=script
Link: </wp-content/cache/minify/1f540.js>; rel=preload; as=script
Link: </wp-content/cache/minify/ac85c.js>; rel=preload; as=script
Link: </wp-content/cache/minify/9efdf.js>; rel=preload; as=script
Link: </wp-content/cache/minify/2560e.js>; rel=preload; as=script
Link: </wp-content/cache/minify/b196c.js>; rel=preload; as=script
Link: </wp-content/cache/minify/1615d.js>; rel=preload; as=script
Link: </wp-content/cache/minify/a5ff7.css>; rel=preload; as=style
Link: </wp-content/cache/minify/10434.css>; rel=preload; as=style
Link: </wp-content/cache/minify/8d8e8.css>; rel=preload; as=style
Link: </wp-content/cache/minify/bd434.css>; rel=preload; as=style
Link: </wp-content/cache/minify/70ed1.css>; rel=preload; as=style
X-Cache-Status: MISS
Strict-Transport-Security: max-age=15768000; includeSubDomains
X-Powered-By: PleskLin
2024-08-27 07:28:12 UTC14876INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 64 69 72 3d 6c 74 72 20 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 74 65 6b 6e 6f 6c 6f 67 69 69 61 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d
Data Ascii: <!DOCTYPE html><htmldir=ltr lang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://teknologiia.com/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><m


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:03:28:10
Start date:27/08/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.27329.6060.exe"
Imagebase:0x350000
File size:8'498'688 bytes
MD5 hash:45FB6E45804331506A8855A65ED14844
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Go lang
Reputation:low
Has exited:true

Target ID:1
Start time:03:28:10
Start date:27/08/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.2408373222.0000000000351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00350000, based on PE: true
    • Associated: 00000000.00000002.2408352477.0000000000350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408521469.00000000005C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408676193.000000000084C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408693951.0000000000850000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408710564.0000000000851000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408724419.0000000000852000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408738516.0000000000854000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408752238.0000000000855000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408790848.00000000008C2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408807390.00000000008D0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408822219.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408835954.00000000008D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.00000000008D7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.00000000008F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.000000000095F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408906950.0000000000967000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408906950.00000000009FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2409034408.0000000000B91000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2409048143.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_350000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b65c2346c372a812bf9a5a497f7710ebe99c163a2b211cbfcde99684ffbfdf79
    • Instruction ID: e846896a7df9f8255a55f7501165eed9a91afce912e9e4b8fd0292d13fc38d70
    • Opcode Fuzzy Hash: b65c2346c372a812bf9a5a497f7710ebe99c163a2b211cbfcde99684ffbfdf79
    • Instruction Fuzzy Hash: 29319D2391CFC482D3218B24F5413AAB364F7A9784F15A715EFC812A1ADF78E1E5CB40
    Memory Dump Source
    • Source File: 00000000.00000002.2408373222.0000000000351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00350000, based on PE: true
    • Associated: 00000000.00000002.2408352477.0000000000350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408521469.00000000005C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408676193.000000000084C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408693951.0000000000850000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408710564.0000000000851000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408724419.0000000000852000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408738516.0000000000854000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408752238.0000000000855000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408790848.00000000008C2000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408807390.00000000008D0000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408822219.00000000008D4000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408835954.00000000008D5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.00000000008D7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.00000000008F8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408849007.000000000095F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408906950.0000000000967000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2408906950.00000000009FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2409034408.0000000000B91000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2409048143.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_350000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 19322aacc7dd447383d6f2170a10e82d5a65409c32a3e247da5a00b3a98942e9
    • Instruction ID: 59066b4aeb0d92e1b99f9a95ce8b31c90d9dc8cb9e86b708a335d9e76b8365d2
    • Opcode Fuzzy Hash: 19322aacc7dd447383d6f2170a10e82d5a65409c32a3e247da5a00b3a98942e9
    • Instruction Fuzzy Hash: