Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Analysis ID:1534636
MD5:c20090d6f18f2d07459c62262e3e0317
SHA1:594379a8d0d5f90766da73437ae93d6ef1d9b363
SHA256:f1278210e1f14ebe545847b88ffd5cd048171c1f532f9f3504e3ba8071a6949d
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeReversingLabs: Detection: 65%
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\x\Desktop\silver\Client(v1)\Client\obj\Debug\Client.pdb source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: Binary string: C:\Users\x\Desktop\silver\Client(v1)\Client\obj\Debug\Client.pdb0 source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: global trafficTCP traffic: 192.168.2.8:49707 -> 91.92.242.236:9393
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: unknownTCP traffic detected without corresponding DNS query: 91.92.242.236
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4AEC15710_2_00007FFB4AEC1571
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4AEC15DD0_2_00007FFB4AEC15DD
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2699319776.0000020E18A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeBinary or memory string: OriginalFilenameClient.exe. vs SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: classification engineClassification label: mal52.winEXE@1/2@0/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeFile created: C:\Users\user\Desktop\DisconnectedFunc.txtJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeMutant created: NULL
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeMutant created: \Sessions\1\BaseNamedObjects\NopDups3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeFile created: C:\Users\user\AppData\Local\Temp\ICONE.CURJump to behavior
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic file information: File size 5837824 > 1048576
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x58fe00
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\x\Desktop\silver\Client(v1)\Client\obj\Debug\Client.pdb source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: Binary string: C:\Users\x\Desktop\silver\Client(v1)\Client\obj\Debug\Client.pdb0 source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4ADAD2A5 pushad ; iretd 0_2_00007FFB4ADAD2A6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4AEC9AAF push BAFFFFF7h; retn 0000h0_2_00007FFB4AEC9AB4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4AEC00BD pushad ; iretd 0_2_00007FFB4AEC00C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeCode function: 0_2_00007FFB4AECADDA push BAFFFFF4h; retn 0000h0_2_00007FFB4AECADDF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeMemory allocated: 20E7E5F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeMemory allocated: 20E18000000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeWindow / User API: threadDelayed 6955Jump to behavior
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2781019630.0000020E2270C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2781019630.0000020E2270C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeMemory allocated: page read and write | page guardJump to behavior
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00585000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E004FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerhPL
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00537000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00585000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00585000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E004FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: >Program Managernj-q8
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00585000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E004FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: >Program Manager
Source: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeBinary or memory string: Shell_traywnd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe66%ReversingLabsWin32.Trojan.Multiverze
SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.BotX-gen.7614.10551.exe, 00000000.00000002.2694696732.0000020E00001000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
91.92.242.236
unknownBulgaria
34368THEZONEBGfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1534636
Start date and time:2024-10-16 02:29:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
Detection:MAL
Classification:mal52.winEXE@1/2@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 40.126.31.73, 20.190.159.75, 20.190.159.4, 40.126.31.71, 20.190.159.68, 20.190.159.0, 20.190.159.73, 20.190.159.71
  • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • VT rate limit hit for: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
TimeTypeDescription
20:30:20API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
91.92.242.236OX481bF1Vh.exeGet hashmaliciousBabadeda, MofksysBrowse
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    THEZONEBGScan_Revised-SOP_MCA_pdf.jsGet hashmaliciousWSHRATBrowse
    • 91.92.243.39
    na.elfGet hashmaliciousMirai, MoobotBrowse
    • 85.217.208.78
    m7DmyQOKD7.exeGet hashmaliciousRHADAMANTHYSBrowse
    • 91.92.255.109
    mipsel.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 91.92.246.113
    x86_32.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    x86_64.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    mips.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    arm5.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    arm.nn.elfGet hashmaliciousOkiruBrowse
    • 91.92.246.113
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
    File Type:MS Windows cursor resource - 1 icon, 32x32, hotspot @0x0
    Category:dropped
    Size (bytes):326
    Entropy (8bit):1.2807478913655284
    Encrypted:false
    SSDEEP:3:GlFFXlGFllfl/t+lklel/e/hRD:Gl/Nls62bD
    MD5:DBD44C4AC444D2E0448EC0AD24EC0698
    SHA1:371D786818F0A4242D2FCED0C83412CAA6C17A28
    SHA-256:BF79BFFDBA70F456CB406FD1ECE8652750363B94188510B5D73F36C8EA6E7AE9
    SHA-512:E8025CEB6ECB76B480F279D7E42DEEC8B96C0C1D64CFA3B7AF1E68320281F0F2A9B886AFC16AADE4E2178878970C4909FD650C1DC3C37594D040141ED0AB113F
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:...... ......0.......(... ...@.......................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):13
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:tjK:g
    MD5:C162DE19C4C3731CA3428769D0CD593D
    SHA1:897B99631295D204DB13E863B296A09E70AB1D65
    SHA-256:A689D786E81340E45511DEC6C7AB2D978434E5DB123362450FE10CFAC70D19D0
    SHA-512:B0B8828DF9473F2763F9A48B0A9683451E98155436C2EFF64C628FEDBBA0CCA2360312271F3971F2969B1F828B1BB8251D3A43E12361824ACA14F9A9AFFE2171
    Malicious:false
    Reputation:low
    Preview:aaaaaaaaaaaaa
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):7.9198285374817585
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
    • Win32 Executable (generic) a (10002005/4) 49.75%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Windows Screen Saver (13104/52) 0.07%
    • Generic Win/DOS Executable (2004/3) 0.01%
    File name:SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
    File size:5'837'824 bytes
    MD5:c20090d6f18f2d07459c62262e3e0317
    SHA1:594379a8d0d5f90766da73437ae93d6ef1d9b363
    SHA256:f1278210e1f14ebe545847b88ffd5cd048171c1f532f9f3504e3ba8071a6949d
    SHA512:c2db39f863c86676afc35df61e08b2bb906211b77b7163eb190ac5b71393fadc1867f300c5c5a27b38fb33fd59b02a5c67d4d078ca77de1b68287edb04ea02a4
    SSDEEP:98304:PrgD7BjT4/HFI6q4PKT6oileRmZvgo6V2NOpgFAzBsnuYlAUzeB2LIG/9yUBsPVc:PM3B3U+6NK8leAIBnN0uYlg20y9aPVQ
    TLSH:6A46021348159F57E96D83F87E034F6C2B932F28E652F9EB28694DC73E582514C8E22D
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5.Bf.........."...P...X.........Z.Y.. ... Y...@.. .......................`Y...........`................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x991c5a
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x66429F35 [Mon May 13 23:16:05 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x591c080x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5920000x1158.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5940000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x591ad00x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x58fc600x58fe00eee79f27306b128a5afcdc30cb24b935unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x5920000x11580x1200b2ebcf40634b5360b30207452f400ba7False0.3825954861111111data4.96960306988865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x5940000xc0x20028850dc5fdd6064a4682035d83bd5840False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "Y"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x5920900x330data0.42769607843137253
    RT_MANIFEST0x5923d00xd83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.39462272333044235
    DLLImport
    mscoree.dll_CorExeMain
    TimestampSource PortDest PortSource IPDest IP
    Oct 16, 2024 02:30:22.419888020 CEST497079393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:22.424834013 CEST93934970791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:22.424931049 CEST497079393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:22.545851946 CEST497079393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:22.550733089 CEST93934970791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:30.935170889 CEST93934970791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:30.935240984 CEST497079393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:30.938077927 CEST497079393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:30.942948103 CEST93934970791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:31.374233007 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:31.379096985 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:31.379205942 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:31.566061974 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:31.570880890 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:32.559264898 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:32.564136982 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:39.551948071 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:39.556787968 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:39.860517979 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:39.860577106 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:39.860738993 CEST497119393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:39.865556955 CEST93934971191.92.242.236192.168.2.8
    Oct 16, 2024 02:30:40.368120909 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:40.373178959 CEST93934971791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:40.373271942 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:40.558872938 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:40.563749075 CEST93934971791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:48.565568924 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:48.570415020 CEST93934971791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:48.847770929 CEST93934971791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:48.847878933 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:48.847954988 CEST497179393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:48.852710962 CEST93934971791.92.242.236192.168.2.8
    Oct 16, 2024 02:30:49.365128040 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:49.370044947 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:49.370136976 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:49.567018032 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:49.655515909 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:56.553020954 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:56.558013916 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:57.561002970 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:57.565845966 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:57.858231068 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:57.858304024 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:57.858418941 CEST497189393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:57.863161087 CEST93934971891.92.242.236192.168.2.8
    Oct 16, 2024 02:30:58.377707958 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:30:58.382639885 CEST93934971991.92.242.236192.168.2.8
    Oct 16, 2024 02:30:58.382816076 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:04.552746058 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:04.557631016 CEST93934971991.92.242.236192.168.2.8
    Oct 16, 2024 02:31:05.558094978 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:05.694914103 CEST93934971991.92.242.236192.168.2.8
    Oct 16, 2024 02:31:06.860990047 CEST93934971991.92.242.236192.168.2.8
    Oct 16, 2024 02:31:06.861160994 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:06.861160994 CEST497199393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:06.866044044 CEST93934971991.92.242.236192.168.2.8
    Oct 16, 2024 02:31:07.379010916 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:07.384066105 CEST93934972091.92.242.236192.168.2.8
    Oct 16, 2024 02:31:07.384187937 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:12.571830034 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:12.576870918 CEST93934972091.92.242.236192.168.2.8
    Oct 16, 2024 02:31:13.570991993 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:13.575841904 CEST93934972091.92.242.236192.168.2.8
    Oct 16, 2024 02:31:15.866838932 CEST93934972091.92.242.236192.168.2.8
    Oct 16, 2024 02:31:15.866910934 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:15.866981030 CEST497209393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:15.871939898 CEST93934972091.92.242.236192.168.2.8
    Oct 16, 2024 02:31:16.371208906 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:16.376071930 CEST93934972291.92.242.236192.168.2.8
    Oct 16, 2024 02:31:16.376176119 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:20.573987007 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:20.579125881 CEST93934972291.92.242.236192.168.2.8
    Oct 16, 2024 02:31:21.582156897 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:21.587090969 CEST93934972291.92.242.236192.168.2.8
    Oct 16, 2024 02:31:24.863645077 CEST93934972291.92.242.236192.168.2.8
    Oct 16, 2024 02:31:24.863769054 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:24.863914967 CEST497229393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:24.868674994 CEST93934972291.92.242.236192.168.2.8
    Oct 16, 2024 02:31:25.367449999 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:25.372577906 CEST93934972391.92.242.236192.168.2.8
    Oct 16, 2024 02:31:25.372700930 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:29.575265884 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:29.580399990 CEST93934972391.92.242.236192.168.2.8
    Oct 16, 2024 02:31:30.581178904 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:30.586298943 CEST93934972391.92.242.236192.168.2.8
    Oct 16, 2024 02:31:33.862318039 CEST93934972391.92.242.236192.168.2.8
    Oct 16, 2024 02:31:33.862579107 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:33.869345903 CEST497239393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:33.874212980 CEST93934972391.92.242.236192.168.2.8
    Oct 16, 2024 02:31:34.387335062 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:34.392287970 CEST93934972491.92.242.236192.168.2.8
    Oct 16, 2024 02:31:34.392386913 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:38.577316046 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:38.582367897 CEST93934972491.92.242.236192.168.2.8
    Oct 16, 2024 02:31:39.568239927 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:39.573329926 CEST93934972491.92.242.236192.168.2.8
    Oct 16, 2024 02:31:42.872735977 CEST93934972491.92.242.236192.168.2.8
    Oct 16, 2024 02:31:42.872919083 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:42.873022079 CEST497249393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:42.877753973 CEST93934972491.92.242.236192.168.2.8
    Oct 16, 2024 02:31:43.390405893 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:43.395647049 CEST93934972791.92.242.236192.168.2.8
    Oct 16, 2024 02:31:43.395767927 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:46.569511890 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:46.574425936 CEST93934972791.92.242.236192.168.2.8
    Oct 16, 2024 02:31:47.577486038 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:47.582609892 CEST93934972791.92.242.236192.168.2.8
    Oct 16, 2024 02:31:51.874794960 CEST93934972791.92.242.236192.168.2.8
    Oct 16, 2024 02:31:51.874888897 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:51.875024080 CEST497279393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:51.880031109 CEST93934972791.92.242.236192.168.2.8
    Oct 16, 2024 02:31:52.411317110 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:52.416384935 CEST93934972891.92.242.236192.168.2.8
    Oct 16, 2024 02:31:52.416558027 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:55.574568987 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:55.579592943 CEST93934972891.92.242.236192.168.2.8
    Oct 16, 2024 02:31:56.581688881 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:31:56.586680889 CEST93934972891.92.242.236192.168.2.8
    Oct 16, 2024 02:32:00.907870054 CEST93934972891.92.242.236192.168.2.8
    Oct 16, 2024 02:32:00.907951117 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:00.908097982 CEST497289393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:00.912902117 CEST93934972891.92.242.236192.168.2.8
    Oct 16, 2024 02:32:01.403614998 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:01.408688068 CEST93934972991.92.242.236192.168.2.8
    Oct 16, 2024 02:32:01.408802986 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:04.583472013 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:04.588608980 CEST93934972991.92.242.236192.168.2.8
    Oct 16, 2024 02:32:05.589348078 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:05.594543934 CEST93934972991.92.242.236192.168.2.8
    Oct 16, 2024 02:32:09.897903919 CEST93934972991.92.242.236192.168.2.8
    Oct 16, 2024 02:32:09.897970915 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:09.898102999 CEST497299393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:09.902967930 CEST93934972991.92.242.236192.168.2.8
    Oct 16, 2024 02:32:10.400409937 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:10.405428886 CEST93934973091.92.242.236192.168.2.8
    Oct 16, 2024 02:32:10.405524969 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:13.602989912 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:13.608058929 CEST93934973091.92.242.236192.168.2.8
    Oct 16, 2024 02:32:14.606282949 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:14.611519098 CEST93934973091.92.242.236192.168.2.8
    Oct 16, 2024 02:32:18.892641068 CEST93934973091.92.242.236192.168.2.8
    Oct 16, 2024 02:32:18.892715931 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:18.892854929 CEST497309393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:18.897751093 CEST93934973091.92.242.236192.168.2.8
    Oct 16, 2024 02:32:19.401175022 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:19.406258106 CEST93934973191.92.242.236192.168.2.8
    Oct 16, 2024 02:32:19.406385899 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:22.614154100 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:22.619105101 CEST93934973191.92.242.236192.168.2.8
    Oct 16, 2024 02:32:23.640912056 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:23.645993948 CEST93934973191.92.242.236192.168.2.8
    Oct 16, 2024 02:32:27.932075977 CEST93934973191.92.242.236192.168.2.8
    Oct 16, 2024 02:32:27.932190895 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:35.582324982 CEST497319393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:35.584016085 CEST497329393192.168.2.891.92.242.236
    Oct 16, 2024 02:32:35.587609053 CEST93934973191.92.242.236192.168.2.8
    Oct 16, 2024 02:32:35.588871002 CEST93934973291.92.242.236192.168.2.8
    Oct 16, 2024 02:32:35.588947058 CEST497329393192.168.2.891.92.242.236

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:20:30:19
    Start date:15/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.BotX-gen.7614.10551.exe"
    Imagebase:0x20e7dd20000
    File size:5'837'824 bytes
    MD5 hash:C20090D6F18F2D07459C62262E3E0317
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:25.6%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:14
      Total number of Limit Nodes:1
      execution_graph 2250 7ffb4aec2905 2251 7ffb4aec290d FindWindowA 2250->2251 2253 7ffb4aec3b8e 2251->2253 2246 7ffb4aec2964 2247 7ffb4aec2924 2246->2247 2247->2246 2248 7ffb4aec3b1a FindWindowA 2247->2248 2249 7ffb4aec3b8e 2248->2249 2237 7ffb4aec3c91 2239 7ffb4aec3c9f LoadCursorFromFileA 2237->2239 2240 7ffb4aec3e52 2239->2240 2241 7ffb4aec39df 2242 7ffb4aec39ea 2241->2242 2243 7ffb4aec3a17 FindWindowA 2241->2243 2245 7ffb4aec3b8e 2243->2245

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2784336241.00007FFB4AEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEC0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4aec0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CursorFileFromLoad
      • String ID:
      • API String ID: 1771150995-0
      • Opcode ID: 19f1570d42eb3b017be42fd3adf20034223e0939ebb6a9d3c9ce4ea650e35d72
      • Instruction ID: 992e969be80d205da26fa838318eafc9a969079955bdf5fa50b57c0ad47bcd70
      • Opcode Fuzzy Hash: 19f1570d42eb3b017be42fd3adf20034223e0939ebb6a9d3c9ce4ea650e35d72
      • Instruction Fuzzy Hash: E081927090CA8D8FEBA9EF28C8557E97BE0FF19310F10416AE84DC7292DB749841CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 108 7ffb4aec2964-7ffb4aec2969 110 7ffb4aec2924-7ffb4aec293e 108->110 111 7ffb4aec296b-7ffb4aec3b8c FindWindowA 108->111 110->108 124 7ffb4aec3b94-7ffb4aec3c3d call 7ffb4aec3c3e 111->124 125 7ffb4aec3b8e 111->125 125->124
      Memory Dump Source
      • Source File: 00000000.00000002.2784336241.00007FFB4AEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEC0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4aec0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d048b478e5ccec8b2cd1ac535d3ad3601fdcc325856e297970ee7ed8736e1fb7
      • Instruction ID: 253318dd38d751e06f0a769af47296fbe266f2fcc6444331a3d446bf7b5e971e
      • Opcode Fuzzy Hash: d048b478e5ccec8b2cd1ac535d3ad3601fdcc325856e297970ee7ed8736e1fb7
      • Instruction Fuzzy Hash: 1D813A70D08A1D8FDB94EF68C895BEDBBB1FB59300F1081AAD41DE3252DA34A985CF40

      Control-flow Graph

      Memory Dump Source
      • Source File: 00000000.00000002.2784336241.00007FFB4AEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEC0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4aec0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 57637e7dffaa230c6b1cc7173f092ac3e90a987f0dc830143d1a891c724e62cb
      • Instruction ID: bf784fa4fe0785c2ecd8c19bf238e9bc048f46a3c939b18fb8334e3603478e82
      • Opcode Fuzzy Hash: 57637e7dffaa230c6b1cc7173f092ac3e90a987f0dc830143d1a891c724e62cb
      • Instruction Fuzzy Hash: 7E812D70909A5D8FDB94EF68C895BEDBBB1FB59300F1041AAD40DD3252DA34A985CF41
      Memory Dump Source
      • Source File: 00000000.00000002.2783951388.00007FFB4ADAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4ADAD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4adad000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fa9f0f595fe21589fb047b8cbaf859f37bb128cf267710807183793a1ce38715
      • Instruction ID: f864a87ace16dc33beda51f33c3f141791d795ebcf022c66d440cefc19d10bcf
      • Opcode Fuzzy Hash: fa9f0f595fe21589fb047b8cbaf859f37bb128cf267710807183793a1ce38715
      • Instruction Fuzzy Hash: B641F27050DBC44FE75A9F39D8459523FF0EF56320B1906EFD088CB1A7DA29A846C7A2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2784336241.00007FFB4AEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEC0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4aec0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: .M_^$+M_$-M$-M
      • API String ID: 0-197494298
      • Opcode ID: b4076dc1961c5680bbcd340b87bd326fac1d5590e805b0519aa8daa39b994d10
      • Instruction ID: ce35f67b73b7b27f9364834602ae0f2fab58b50fa60d2211acf5d5649d1ef4b6
      • Opcode Fuzzy Hash: b4076dc1961c5680bbcd340b87bd326fac1d5590e805b0519aa8daa39b994d10
      • Instruction Fuzzy Hash: DFA18297A4ED27A5A10236BDF4970FDA788DF8137FB5887B3EA5E890834C09208741F5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2784336241.00007FFB4AEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEC0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffb4aec0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: .M_^$+M_$-M$-M
      • API String ID: 0-197494298
      • Opcode ID: 140cc9a2e3f1637ea91886a0ad656733b5427dd7869c4030573c0ba88b1ab266
      • Instruction ID: 18e4eb00740b7eca45852cf8251ae7af1ad5e06617028c20c89629a97553d0b4
      • Opcode Fuzzy Hash: 140cc9a2e3f1637ea91886a0ad656733b5427dd7869c4030573c0ba88b1ab266
      • Instruction Fuzzy Hash: A3918197A4ED26A5A1023ABDF4970FDA788DF4137EB58C7B7EA5E890834C08248341F5