Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Phoenix Service Tool V5.6.exe

Overview

General Information

Sample name:Phoenix Service Tool V5.6.exe
Analysis ID:1539249
MD5:f60b09fd39c1bfb5b38cdcddbd735fec
SHA1:6988749c6c885ff957cb2be7a477e1caaa5f50f9
SHA256:d6d327be485e5f88f4788998b5acccb18f86da34f7fe5f1cf193a50a486705cc
Tags:exeuser-ORDINESOUND
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Tries to evade analysis by execution special instruction (VM detection)
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Entry point lies outside standard sections
JA3 SSL client fingerprint seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.7% probability
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000000841000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_d65735be-b
Source: Phoenix Service Tool V5.6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 104.21.4.246:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: Phoenix Service Tool V5.6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewJA3 fingerprint: fd80fa9c6120cdeea8520510f3c644ac
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: apiv3.phoenixservicetool.net
Source: unknownHTTP traffic detected: POST /update HTTP/1.0Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 787Authorization: Bearer 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: apiv3.phoenixservicetool.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8User-Agent: PhoenixTool
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://bit.ly/3tQUO9F
Source: Phoenix Service Tool V5.6.exe, 00000000.00000003.1893433384.000000000B31B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontawesome.io/license/o#
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.indyproject.org/
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://apiv3.phoenixservicetool.net
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://apiv3.phoenixservicetool.net/download-file.phpU
Source: Phoenix Service Tool V5.6.exe, 00000000.00000003.1941178525.000000000CA88000.00000004.00000020.00020000.00000000.sdmp, Phoenix Service Tool V5.6.exe, 00000000.00000003.1941143458.000000000CA88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.recaptcha.net/recaptcha/api.js?onload=onloadCallback&render=explicit
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.winsoft.sk
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownHTTPS traffic detected: 104.21.4.246:443 -> 192.168.2.4:49736 version: TLS 1.2

System Summary

barindex
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: ."eY
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: .$3(
Source: Phoenix Service Tool V5.6.exeStatic PE information: Number of sections : 14 > 10
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000000841000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs Phoenix Service Tool V5.6.exe
Source: Phoenix Service Tool V5.6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: adbwinapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: adbwinusbapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: winusb.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: compstui.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: kernel.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: libeay32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: ssleay32.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeWindow found: window name: msctls_updown32Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Phoenix Service Tool V5.6.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Phoenix Service Tool V5.6.exeStatic file information: File size 62082048 > 1048576
Source: Phoenix Service Tool V5.6.exeStatic PE information: Raw size of .$3( is bigger than: 0x100000 < 0x3b21400
Source: Phoenix Service Tool V5.6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .$3(
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: .didata
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: ."eY
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: .aK8
Source: Phoenix Service Tool V5.6.exeStatic PE information: section name: .$3(

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 8EA0005 value: E9 8B 2F 06 6E Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02F90 value: E9 7A D0 F9 91 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 8EB0007 value: E9 EB DF 08 6E Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F3DFF0 value: E9 1E 20 F7 91 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 8EC0005 value: E9 2B BA 00 6E Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76ECBA30 value: E9 DA 45 FF 91 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 8FE0008 value: E9 8B 8E F3 6D Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F18E90 value: E9 80 71 0C 92 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 8FF0005 value: E9 8B 4D C0 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 75BF4D90 value: E9 7A B2 3F 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 9000005 value: E9 EB EB C0 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 75C0EBF0 value: E9 1A 14 3F 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93A0005 value: E9 8B 8A C3 6B Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 74FD8A90 value: E9 7A 75 3C 94 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93B0005 value: E9 2B 02 C5 6B Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 75000230 value: E9 DA FD 3A 94 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93C0005 value: E9 5B 2E B4 6D Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02E60 value: E9 AA D1 4B 92 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93D0005 value: E9 EB 3E B3 6D Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F03EF0 value: E9 1A C1 4C 92 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93E0005 value: E9 DB 2F B2 6D Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02FE0 value: E9 2A D0 4D 92 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 93F0005 value: E9 BB 2D B1 6D Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02DC0 value: E9 4A D2 4E 92 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB20005 value: E9 CB 2A 3E 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02AD0 value: E9 3A D5 C1 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB30005 value: E9 7B 2B 3D 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02B80 value: E9 8A D4 C2 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB40005 value: E9 1B 2F 3C 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02F20 value: E9 EA D0 C3 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB50005 value: E9 FB 2C 3B 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02D00 value: E9 0A D3 C4 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB60005 value: E9 DB 2D 3A 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02DE0 value: E9 2A D2 C5 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB70005 value: E9 AB 3E 39 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F03EB0 value: E9 5A C1 C6 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB80005 value: E9 2B 2F 38 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02F30 value: E9 DA D0 C7 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AB90005 value: E9 9B 2F 37 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02FA0 value: E9 6A D0 C8 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: ABA0005 value: E9 0B 2D 36 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02D10 value: E9 FA D2 C9 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: ABB0005 value: E9 CB 3B 35 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F03BD0 value: E9 3A C4 CA 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: ABD0005 value: E9 2B 2D 33 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02D30 value: E9 DA D2 CC 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: ABE0005 value: E9 4B 47 32 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F04750 value: E9 BA B8 CD 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: ABF0005 value: E9 BB 2C 31 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02CC0 value: E9 4A D3 CE 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AC00005 value: E9 5B 2B 30 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02B60 value: E9 AA D4 CF 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: AC10005 value: E9 6B 2B 2F 6C Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeMemory written: PID: 2304 base: 76F02B70 value: E9 9A D4 D0 93 Jump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 88231C8
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 88B69F3
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 4E72E68
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 831E9B4
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 834D990
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 8807E9B
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 4E4A814
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 81FBC2A
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 4E25D58
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 80F45A9
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 814B3CD
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 834C951
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 8708C1A
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 88C25AA
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 4E09304
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 88DF371
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 82DFF23
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 8160DD4
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeAPI/Special instruction interceptor: Address: 888B7AE
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSpecial instruction interceptor: First address: 4DDD93B instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Phoenix Service Tool V5.6.exe, 00000000.00000003.1941754480.00000000090C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeSystem information queried: KernelDebuggerInformationJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeProcess queried: DebugPortJump to behavior
Source: Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000000841000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWndSVW
Source: C:\Users\user\Desktop\Phoenix Service Tool V5.6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
12
Virtualization/Sandbox Evasion
1
Credential API Hooking
321
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory12
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Phoenix Service Tool V5.6.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.indyproject.org/0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
apiv3.phoenixservicetool.net
104.21.4.246
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://apiv3.phoenixservicetool.net/updatefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://apiv3.phoenixservicetool.netPhoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpfalse
        unknown
        http://fontawesome.io/license/o#Phoenix Service Tool V5.6.exe, 00000000.00000003.1893433384.000000000B31B000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://www.winsoft.skPhoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpfalse
            unknown
            https://apiv3.phoenixservicetool.net/download-file.phpUPhoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpfalse
              unknown
              http://www.indyproject.org/Phoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpfalse
              • URL Reputation: safe
              unknown
              http://bit.ly/3tQUO9FPhoenix Service Tool V5.6.exe, 00000000.00000002.2953307052.0000000001241000.00000020.00000001.01000000.00000003.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.21.4.246
                apiv3.phoenixservicetool.netUnited States
                13335CLOUDFLARENETUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1539249
                Start date and time:2024-10-22 13:44:14 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 53s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Phoenix Service Tool V5.6.exe
                Detection:MAL
                Classification:mal64.evad.winEXE@1/0@1/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: Phoenix Service Tool V5.6.exe
                No simulations
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSz547GEViTFyfCZdLZP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                • 188.114.96.3
                https://1drv.ms/o/c/14c2aef4e2cd9199/EmKMpCkEfbpDs04MuZdva6IBilCqbzQYZtfiLbdaioNL0w?e=E2gYSOGet hashmaliciousUnknownBrowse
                • 104.18.94.41
                Rechnung 22. Okt. 2024.htmGet hashmaliciousHTMLPhisherBrowse
                • 104.17.25.14
                SecuriteInfo.com.Trojan.PackedNET.3057.16994.22226.exeGet hashmaliciousSnake KeyloggerBrowse
                • 188.114.96.3
                https://eu-chervongroup.powerappsportalsecurefiles.xyz/Get hashmaliciousHtmlDropperBrowse
                • 104.21.79.34
                https://eu-chervongroup.powerappsportalsecurefiles.xyz/Get hashmaliciousHtmlDropperBrowse
                • 104.18.95.41
                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                • 104.21.53.8
                fedcap.67173a0a3d25d0.95038392.pdfGet hashmaliciousUnknownBrowse
                • 162.159.61.3
                articulate-360.exeGet hashmaliciousUnknownBrowse
                • 104.16.71.105
                http://eu.jotform.com/app/242950797754371Get hashmaliciousUnknownBrowse
                • 104.22.72.81
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                fd80fa9c6120cdeea8520510f3c644acsistema_2_1_1_build2.zipGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                SecuriteInfo.com.W32.PossibleThreat.9762.18095.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                winaudio.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                l.out.elfGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                RT.msiGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                Ac372JNTO6.exeGet hashmaliciousAmadeyBrowse
                • 104.21.4.246
                6v8QbANftP.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                6v8QbANftP.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                spjYwLgrAT.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                spjYwLgrAT.exeGet hashmaliciousUnknownBrowse
                • 104.21.4.246
                No context
                No created / dropped files found
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.997016256014731
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:Phoenix Service Tool V5.6.exe
                File size:62'082'048 bytes
                MD5:f60b09fd39c1bfb5b38cdcddbd735fec
                SHA1:6988749c6c885ff957cb2be7a477e1caaa5f50f9
                SHA256:d6d327be485e5f88f4788998b5acccb18f86da34f7fe5f1cf193a50a486705cc
                SHA512:dadbf518c82c35a05a8a3ff98a7b13f2e1649f7e52701f8b06910872f467979638a2f323e5bfb7c52e1cf2154bb9b8820c3cbf11c1d8ce49fdbe998c4b761d17
                SSDEEP:1572864:Ek2EBHjsRKoDtKgLIjgGbUuirzZTnE+WOaUQVAhZ+oKrE:t20jKZLIBgr1tLaUQVc6E
                TLSH:3CD7339E2EA640FAC5DE04F54B17BBF323F6C26254DA0727FA8422CB39D1B703256552
                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......f............................X.............@.......................................@......@......................q..
                Icon Hash:077b4d6939193b06
                Entrypoint:0x7d5dc58
                Entrypoint Section:.$3(
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x66FAFE82 [Mon Sep 30 19:39:46 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:b336ec2b7b92eb8afebba8e321c57365
                Instruction
                push edi
                push ebp
                call 00007F378D067588h
                sar byte ptr [esp+04h], FFFFFFA2h
                movzx ecx, word ptr [esp+04h]
                mov dword ptr [esi+ecx*4+02h], eax
                not dx
                mov dword ptr [esp+ecx], ecx
                adc cx, word ptr [esi+ecx+02h]
                xchg dword ptr [esp+03h], edx
                add esi, 04h
                movzx edx, byte ptr [edi-05h]
                mov eax, A939ECB4h
                not word ptr [esp+01h]
                sub edi, 05h
                call 00007F378D582A76h
                inc ecx
                pop edx
                inc ecx
                ror ebx, cl
                inc edi
                movzx edx, word ptr [edx+ebp-06h]
                btc dx, 0000h
                dec eax
                cwde
                dec eax
                sub ecx, ebx
                dec ebp
                lea ebp, dword ptr [ebp+esi*8-00000538h]
                inc bp
                xor edx, eax
                dec ecx
                imul eax, edi
                inc ecx
                sar edi, cl
                dec ecx
                add ecx, edi
                inc sp
                xor edx, edx
                dec eax
                shr edx, 1
                inc esp
                and ebx, edi
                dec eax
                sub eax, 1209A380h
                inc cx
                adc edx, F7664B30h
                out dx, eax
                inc cx
                rol edx, 1
                dec eax
                add eax, ebx
                push esi
                inc cx
                neg edx
                ror dword ptr [esp+esi*2-00000148h], cl
                inc bp
                xor eax, edx
                inc ecx
                mov ebp, esi
                dec eax
                inc ebx
                dec esi
                lea edx, dword ptr [esp+edx+08h]
                inc edx
                mov esi, dword ptr [esi+edx-000000A6h]
                inc esp
                sub bh, byte ptr [esp+ebx-000000D5h]
                dec esp
                lea edx, dword ptr [eax+edi*4+58123316h]
                cwde
                inc edx
                mov dword ptr [ebx-000000DCh], esi
                dec ebp
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x7b0a8a00x71.$3(
                IMAGE_DIRECTORY_ENTRY_IMPORT0x78bf3a00x1a4.$3(
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x80b90000x11abe.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x80b80000x798.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x78c06d40x18.$3(
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x45950000xb8.aK8
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7c7759c0x200.$3(
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xb68fd40x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .itext0xb6a0000x545c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0xb700000x30ba400x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .bss0xe7c0000x1bec40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0xe980000x489c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .didata0xe9d0000x6ad80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .edata0xea40000x710x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .tls0xea50000x15c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0xea60000x5d0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                ."eY0xea70000x36ed1660x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .aK80x45950000xfac0x100051aa23867a6c76c7a151f41e4b25bd8eFalse0.0390625data0.3111256605983826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .$3(0x45960000x3b213d00x3b21400d99a3f4a955e26f49deef58dcf4cd4c7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .reloc0x80b80000x7980x800fa61a6bfdac6ccc4d5e36f953439a9d2False0.486328125data4.44241145317496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x80b90000x11abe0x11c0078751eea37adef3d00817185f5fb214aFalse0.9770989216549296data7.96988313680526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x80b91440x10fdfPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000445408698401
                RT_GROUP_ICON0x80ca1240x14Targa image data - Map 32 x 4063 x 1 +1EnglishUnited States1.1
                RT_VERSION0x80ca1380x270dataEnglishUnited States0.47596153846153844
                RT_MANIFEST0x80ca3a80x716XML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.40407938257993387
                DLLImport
                SetupApi.dllSetupDiGetClassDevsW
                winmm.dlltimeEndPeriod
                winspool.drvDocumentPropertiesW
                comdlg32.dllChooseColorW
                comctl32.dllImageList_GetImageInfo
                shell32.dllShell_NotifyIconW
                user32.dllCopyImage
                version.dllGetFileVersionInfoSizeW
                oleaut32.dllSafeArrayPutElement
                netapi32.dllNetWkstaGetInfo
                advapi32.dllRegSetValueExW
                msvcrt.dll_read
                winhttp.dllWinHttpGetIEProxyConfigForCurrentUser
                kernel32.dllGetVersion, GetVersionExW
                bcrypt.dllBCryptGenRandom
                wsock32.dllsend
                ole32.dllIsEqualGUID
                gdi32.dllPie
                kernel32.dllGetSystemTimeAsFileTime
                kernel32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                NameOrdinalAddress
                __dbk_fcall_wrapper20x413134
                dbkFCallWrapperAddr10x127f648
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Oct 22, 2024 13:45:31.484514952 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:31.484554052 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:31.484625101 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:31.485477924 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:31.485491037 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.113169909 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.113255024 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.116781950 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.116811037 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.117249966 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.117616892 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.159329891 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.159431934 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.159450054 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.820375919 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.820506096 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.820574999 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.820643902 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.820682049 CEST44349736104.21.4.246192.168.2.4
                Oct 22, 2024 13:45:32.820736885 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.825869083 CEST49736443192.168.2.4104.21.4.246
                Oct 22, 2024 13:45:32.825926065 CEST44349736104.21.4.246192.168.2.4
                TimestampSource PortDest PortSource IPDest IP
                Oct 22, 2024 13:45:31.418225050 CEST6496953192.168.2.41.1.1.1
                Oct 22, 2024 13:45:31.454257965 CEST53649691.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 22, 2024 13:45:31.418225050 CEST192.168.2.41.1.1.10xcd3eStandard query (0)apiv3.phoenixservicetool.netA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 22, 2024 13:45:31.454257965 CEST1.1.1.1192.168.2.40xcd3eNo error (0)apiv3.phoenixservicetool.net104.21.4.246A (IP address)IN (0x0001)false
                Oct 22, 2024 13:45:31.454257965 CEST1.1.1.1192.168.2.40xcd3eNo error (0)apiv3.phoenixservicetool.net172.67.187.64A (IP address)IN (0x0001)false
                • apiv3.phoenixservicetool.net
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.449736104.21.4.2464432304C:\Users\user\Desktop\Phoenix Service Tool V5.6.exe
                TimestampBytes transferredDirectionData
                2024-10-22 11:45:32 UTC1045OUTPOST /update HTTP/1.0
                Connection: keep-alive
                Content-Type: application/x-www-form-urlencoded
                Content-Length: 787
                Authorization: Bearer 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
                Host: apiv3.phoenixservicetool.net
                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                User-Agent: PhoenixTool
                2024-10-22 11:45:32 UTC787OUTData Raw: 64 61 74 61 3d 4f 55 4a 43 4e 44 63 33 51 55 45 7a 4d 6a 56 45 4d 54 4a 43 4e 54 67 30 4d 44 4d 7a 52 55 45 35 52 54 45 77 4d 6a 59 7a 51 30 46 47 4f 45 4d 34 4e 30 49 32 51 30 55 30 51 55 49 30 4d 30 59 79 4d 44 6c 44 4d 6a 68 43 4d 44 4d 33 4e 7a 4e 42 4d 44 55 35 4f 54 68 44 4d 55 59 33 51 6a 51 79 4d 7a 67 78 4e 6a 59 35 51 6b 51 30 4f 44 4a 43 52 44 41 32 4f 54 52 47 4d 7a 51 33 4e 54 67 78 4d 45 55 32 4e 55 55 79 4e 44 4d 79 4d 54 6b 7a 4d 7a 41 34 51 7a 46 45 52 6a 4d 78 4e 7a 67 33 4d 6b 49 34 4e 6a 59 77 4d 45 52 43 4f 44 41 33 4f 44 6c 45 4e 55 51 7a 4d 6b 45 7a 51 54 4d 30 4e 54 63 31 51 6b 59 78 4d 30 4a 42 4f 44 42 47 4d 44 46 44 52 6a 6b 33 4d 44 6b 77 51 55 4d 32 51 30 5a 44 4f 55 45 33 4e 44 46 43 4d 30 51 32 4e 45 59 79 4d 30 4d 7a 52 45
                Data Ascii: data=OUJCNDc3QUEzMjVEMTJCNTg0MDMzRUE5RTEwMjYzQ0FGOEM4N0I2Q0U0QUI0M0YyMDlDMjhCMDM3NzNBMDU5OThDMUY3QjQyMzgxNjY5QkQ0ODJCRDA2OTRGMzQ3NTgxMEU2NUUyNDMyMTkzMzA4QzFERjMxNzg3MkI4NjYwMERCODA3ODlENUQzMkEzQTM0NTc1QkYxM0JBODBGMDFDRjk3MDkwQUM2Q0ZDOUE3NDFCM0Q2NEYyM0MzRE
                2024-10-22 11:45:32 UTC830INHTTP/1.1 200 OK
                Date: Tue, 22 Oct 2024 11:45:32 GMT
                Content-Type: text/html
                Connection: close
                vary: Accept-Encoding
                cache-control: no-cache,no-store
                x-frame-options: SAMEORIGIN
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=39CgBfH56I4rUVS%2BEp58MLA5FLVDYdMnAiEPh%2F33DfM%2FxSSTB1%2BBQNYjdVRLBiJ1ezu5HNCmL0muNwPdbJ8F5v1yRVy8ewJ%2BUXt%2FnXts6RPMJ79pMo1vlCrOwwHeagUjW%2FOK2%2BaeAhclZDQcE0AJ"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8d693de02a672e78-DFW
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1622&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2858&recv_bytes=2490&delivery_rate=1776687&cwnd=232&unsent_bytes=0&cid=53d120ea1fc34877&ts=729&x=0"
                2024-10-22 11:45:32 UTC539INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32
                Data Ascii: <!DOCTYPE html><html><head> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252
                2024-10-22 11:45:32 UTC1147INData Raw: 27 3a 20 27 36 4c 65 77 55 33 34 55 41 41 41 41 41 48 76 58 71 46 4f 63 51 6c 6d 38 7a 31 4d 50 31 78 70 47 41 5a 43 59 45 65 5a 59 27 2c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 27 63 61 6c 6c 62 61 63 6b 27 3a 20 6f 6e 53 75 62 6d 69 74 2c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 29 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 67 72 65 63 61 70 74 63 68 61 2e 65 78 65 63 75 74 65 28 63 6f 6e 74 29 3b 0a 20 20 20 20 20 20 20 20 7d 3b 0a 20 20 20 20 3c 2f 73 63 72 69 70 74 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 70 61 6e 65 6c 20
                Data Ascii: ': '6LewU34UAAAAAHvXqFOcQlm8z1MP1xpGAZCYEeZY', 'callback': onSubmit, }); grecaptcha.execute(cont); }; </script> <style> body { height: 100%; } .panel


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:0
                Start time:07:45:06
                Start date:22/10/2024
                Path:C:\Users\user\Desktop\Phoenix Service Tool V5.6.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Phoenix Service Tool V5.6.exe"
                Imagebase:0x840000
                File size:62'082'048 bytes
                MD5 hash:F60B09FD39C1BFB5B38CDCDDBD735FEC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Borland Delphi
                Reputation:low
                Has exited:false

                No disassembly