Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
Analysis ID:1541499
MD5:4213b2aa13a965e52e3e2f4b2ca37211
SHA1:85a14551d90665015cbd74f0e7d902edc0b77e00
SHA256:3795ba40a0fbf045785bf0670aa127cbc5d60e2bbd2ba8859ef414daf54215ce
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeReversingLabs: Detection: 34%
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000000.2078993616.0000000000EB9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_1335de3a-d
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 172.67.68.136:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1729808204 HTTP/1.1Host: gamesfileapp.comUser-Agent: NSIS_InetLoad (Mozilla)Accept: */*
Source: global trafficDNS traffic detected: DNS query: gamesfileapp.com
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000002.2101416372.000000000148E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gamesfileapp.com/455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownHTTPS traffic detected: 172.67.68.136:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000002.2101279089.0000000000F1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSincereMotion.exeD vs SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000002.2101416372.00000000014F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dl vs SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeBinary or memory string: OriginalFilenameSincereMotion.exeD vs SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/0@1/2
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeReversingLabs: Detection: 34%
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s %u %s %s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CACAF262-9370-4615-A13B-9F5539DA4C0A}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic file information: File size 12867416 > 1048576
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xbb7600
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000003.2091101428.00000000014A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe34%ReversingLabsWin32.Trojan.Snackarcin
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
gamesfileapp.com
172.67.68.136
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://gamesfileapp.com/455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1729808204false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://curl.se/docs/hsts.htmlSecuriteInfo.com.Variant.Lazy.618554.7337.5785.exefalse
        unknown
        https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Variant.Lazy.618554.7337.5785.exefalse
          unknown
          https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Variant.Lazy.618554.7337.5785.exefalse
            unknown
            https://gamesfileapp.com/455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe, 00000000.00000002.2101416372.000000000148E000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              172.67.68.136
              gamesfileapp.comUnited States
              13335CLOUDFLARENETUSfalse
              IP
              127.0.0.1
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1541499
              Start date and time:2024-10-24 22:20:10 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 15s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
              Detection:MAL
              Classification:mal48.winEXE@1/0@1/2
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • VT rate limit hit for: SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              172.67.68.136Review and Eletronically Sign the Completed Agreement.emlGet hashmaliciousUnknownBrowse
                8eaa.exeGet hashmaliciousUnknownBrowse
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUShttps://cswlawgroup.artoffice.cloud/Get hashmaliciousUnknownBrowse
                  • 172.64.146.38
                  msvcp110.dllGet hashmaliciousLummaCBrowse
                  • 188.114.97.3
                  Setup.exeGet hashmaliciousLummaCBrowse
                  • 188.114.96.3
                  Loader.exeGet hashmaliciousLummaCBrowse
                  • 188.114.96.3
                  https://onlinepdf-qrsharedfile.com/index.html#XYW5uaWUua3lwcmlhbm91QGxjYXR0ZXJ0b24uY29tGet hashmaliciousHTMLPhisherBrowse
                  • 104.16.123.96
                  https://t.ly/8LgfkGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                  • 104.17.25.14
                  phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  https://view.flodesk.com/emails/671a6d1f7ce9f793bb70518aGet hashmaliciousUnknownBrowse
                  • 104.18.18.100
                  http://boulos-sharepoint.comGet hashmaliciousHTMLPhisherBrowse
                  • 188.114.96.3
                  la.bot.mips.elfGet hashmaliciousUnknownBrowse
                  • 8.40.143.15
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  74954a0c86284d0d6e1c4efefe92b521bat2.batGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  ufW7CDPEZ5.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  BcsUcRnDGx.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  41PbtwTtt7.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  f7goD45EHo.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  W4x0CDQAiw.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  oP7CbGHVDZ.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  f4Ghw1L3EH.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  4pzJGIIsej.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  FLhsRTUIon.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.68.136
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.7925424173595825
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
                  File size:12'867'416 bytes
                  MD5:4213b2aa13a965e52e3e2f4b2ca37211
                  SHA1:85a14551d90665015cbd74f0e7d902edc0b77e00
                  SHA256:3795ba40a0fbf045785bf0670aa127cbc5d60e2bbd2ba8859ef414daf54215ce
                  SHA512:cfa6e5ad0b8d2594aefd8777ef22f674d596bb8dc4184652123bdcc87bf8011adbfd3f4614829a410c20cfa4bb461b1659c8eeff91ea3221bbede3f08034a032
                  SSDEEP:393216:ta8T+2Zl8IHKNoaPNcDnV98H5K4xFcdQh9GsmGaKSDe/40ENkp:RZl8IHDnV98H5K4xFcdQh9SDe/40E+p
                  TLSH:2DD66EC8A267F844E3D800B0141972D457132A357B14DAE9BED727DA2A6C289EDF1F37
                  File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.........y....Y...Y...Y...Y...Y...X...Y...X...Y...X...Y...X...Y...X...Y=..X...Y...X...Y...Y}..Y...X...Y...X...Y...X...YRich...Y.......
                  Icon Hash:35aabade54556d3b
                  Entrypoint:0xf49ee9
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x670E36F5 [Tue Oct 15 09:33:41 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:2cf16ae5b1d988aa012905d3403a06ff
                  Signature Valid:true
                  Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                  Signature Validation Error:The operation completed successfully
                  Error Number:0
                  Not Before, Not After
                  • 02/11/2023 21:57:39 02/11/2024 21:57:39
                  Subject Chain
                  • E=mpage@igeniuspics.com, CN="Valued Funding, Inc.", O="Valued Funding, Inc.", STREET=6300 Riverside Plaza NW Suite 100, L=Albuquerque, S=New Mexico, C=US, OID.1.3.6.1.4.1.311.60.2.1.2=New Mexico, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=6176747, OID.2.5.4.15=Private Organization
                  Version:3
                  Thumbprint MD5:A6E9D801E94525C3B4B8A01938DD1CDD
                  Thumbprint SHA-1:7698040D91A0725140C8AFD601AD748B05E225FF
                  Thumbprint SHA-256:13B386EE6074723EB784E5330EDDEBD06354AB4EFAD29C5DE500D5ADDA9EC6AA
                  Serial:411733A417A6C83137783994
                  Instruction
                  call 00007F6454EEE61Fh
                  jmp 00007F6454EEDE9Fh
                  mov ecx, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], ecx
                  pop ecx
                  pop edi
                  pop edi
                  pop esi
                  pop ebx
                  mov esp, ebp
                  pop ebp
                  push ecx
                  ret
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [0100C068h]
                  xor eax, ebp
                  push eax
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFFh
                  lea eax, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [0100C068h]
                  xor eax, ebp
                  push eax
                  mov dword ptr [ebp-10h], esp
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFFh
                  lea eax, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 0Fh
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F6454EEE68Fh
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 07h
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F6454EEE679h
                  int3
                  int3
                  int3
                  int3
                  Programming Language:
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc09fcc0xb4.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0f0000x10dd8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0xc42e000x2958.reloc
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc200000x26a1c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xc062b00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc062d00x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0xbb90000x388.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xbb74fb0xbb760024396f851a10c847a291e0f224ca3bd6unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0xbb90000x523920x5240005f7b95458718e0b47c64e759915be82False0.3577632266337386data5.517194906819314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xc0c0000x25580x1600a576723059d1e00c1619e8dcc2d65cf4False0.21431107954545456DOS executable (block device driver pyright)3.1344943764982847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xc0f0000x10dd80x10e00dceb14082cb81c4c2a47f04cbe5e6b88False0.16255787037037037data3.2938578361117195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xc200000x26a1c0x26c0072876a2ac460118889a35b47aa649aacFalse0.5459488407258064data6.574107372998737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xc0f1300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 1935 x 1935 px/mEnglishUnited States0.1558174612563587
                  RT_GROUP_ICON0xc1f9580x14dataEnglishUnited States1.15
                  RT_VERSION0xc1f9700x2e4dataEnglishUnited States0.43243243243243246
                  RT_MANIFEST0xc1fc580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                  DLLImport
                  DWrite.dllDWriteCreateFactory
                  d2d1.dll
                  KERNEL32.dllIsDebuggerPresent, ReadFile, OutputDebugStringA, GetDateFormatW, HeapReAlloc, FindFirstFileExA, ExitThread, MultiByteToWideChar, CloseHandle, SetEnvironmentVariableA, GetModuleHandleW, GetLocaleInfoW, SetFilePointerEx, WaitForSingleObject, FileTimeToSystemTime, GetFileAttributesExW, LeaveCriticalSection, HeapAlloc, SleepEx, TlsGetValue, FreeLibrary, DeleteFileW, GetModuleFileNameW, DecodePointer, GetUserDefaultLCID, FreeLibraryAndExitThread, TlsAlloc, GetModuleFileNameA, WaitForSingleObjectEx, CreateThread, CompareStringW, LoadLibraryW, GetProcAddress, TerminateProcess, GetProcessHeap, GetFileType, DebugBreak, LocalFree, FlushFileBuffers, GetStringTypeW, DeleteCriticalSection, GetTickCount64, WriteFile, IsValidCodePage, UnhandledExceptionFilter, WaitForMultipleObjects, GetDriveTypeW, QueryPerformanceFrequency, EncodePointer, ReleaseSRWLockExclusive, GetEnvironmentStringsW, WideCharToMultiByte, CreateFileW, SetLastError, FindNextFileA, GetConsoleCP, QueryPerformanceCounter, SetStdHandle, IsProcessorFeaturePresent, LoadLibraryExW, HeapFree, GetTickCount, PeekNamedPipe, AcquireSRWLockExclusive, Sleep, ExitProcess, IsValidLocale, SwitchToThread, MoveFileExW, GetSystemDirectoryW, SetEndOfFile, GetCurrentDirectoryW, GetCurrentThreadId, GetCurrentProcess, GetStartupInfoW, GetCommandLineW, GetTimeZoneInformation, RtlUnwind, InitializeCriticalSectionEx, SetUnhandledExceptionFilter, GetFileSizeEx, GetOEMCP, GetEnvironmentVariableA, InitializeCriticalSectionAndSpinCount, GetFileSize, GetModuleHandleExW, InitializeSListHead, GetStdHandle, GetCPInfo, GetFullPathNameW, TlsSetValue, GetLastError, OutputDebugStringW, WriteConsoleW, FreeEnvironmentStringsW, FindClose, GetConsoleMode, LCMapStringW, GetModuleHandleA, SystemTimeToTzSpecificLocalTime, MulDiv, LoadLibraryA, RaiseException, GetCurrentThread, VerifyVersionInfoW, EnterCriticalSection, GetCommandLineA, HeapSize, GetSystemTimeAsFileTime, FormatMessageW, lstrlenA, VerSetConditionMask, TlsFree, lstrcatA, GetCurrentProcessId, GetTimeFormatW, ReadConsoleW, GetACP, EnumSystemLocalesW
                  USER32.dllwsprintfA, SetWindowLongW, GetKeyState, GetWindowRect, AdjustWindowRectEx, InvalidateRect, ShowWindow, GetSystemMetrics, RegisterClassW, BeginPaint, CallNextHookEx, UnregisterClassW, UnhookWindowsHookEx, GetSysColor, GetMessageW, SetParent, GetClassNameW, GetMessageTime, EndPaint, KillTimer, CreatePopupMenu, ValidateRect, AppendMenuW, SetCapture, EnableWindow, DefWindowProcW, PtInRect, UpdateWindow, SetWindowRgn, GetDoubleClickTime, DestroyWindow, SystemParametersInfoW, SetScrollInfo, GetWindowTextW, SetMenu, CreateMenu, SetWindowPos, ReleaseCapture, DispatchMessageW, GetWindowLongA, GetWindowLongW, SendMessageA, GetUpdateRect, LoadIconW, SetWindowsHookExW, GetClientRect, PostQuitMessage, IsDialogMessageW, IsChild, GetScrollInfo, MessageBoxA, MapWindowPoints, SetWindowLongA, GetActiveWindow, GetDC, SendMessageW, CreateWindowExW, LoadCursorW, SetTimer, TranslateMessage, GetMenuItemInfoW, SetWindowTextW, ReleaseDC, GetAncestor, SetFocus, SetMenuItemInfoW
                  GDI32.dllCreateCompatibleBitmap, CreateFontIndirectW, GetTextMetricsW, SetTextColor, DeleteObject, DeleteDC, SetBkMode, GetTextExtentPoint32W, CreateRoundRectRgn, SelectObject, GetDeviceCaps, SetBrushOrgEx, GetStockObject, BitBlt, CreatePatternBrush, CreateCompatibleDC
                  ADVAPI32.dllCryptReleaseContext, CryptImportKey, CryptAcquireContextW, CryptDestroyKey, CryptGetHashParam, CryptCreateHash, CryptDestroyHash, CryptHashData, CloseServiceHandle, CryptEncrypt
                  ole32.dllCoUninitialize, CoCreateInstance, CoInitialize
                  bcrypt.dllBCryptGenRandom
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 24, 2024 22:21:07.306241989 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:07.306279898 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:07.306343079 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:07.315859079 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:07.315874100 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.130403996 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.130614996 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:08.146868944 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:08.146893978 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.147850037 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.150789976 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:08.191379070 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.383883953 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.384150028 CEST44349709172.67.68.136192.168.2.5
                  Oct 24, 2024 22:21:08.384252071 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:08.395509005 CEST49709443192.168.2.5172.67.68.136
                  Oct 24, 2024 22:21:08.395528078 CEST44349709172.67.68.136192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 24, 2024 22:21:07.285207987 CEST5652753192.168.2.51.1.1.1
                  Oct 24, 2024 22:21:07.301686049 CEST53565271.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 24, 2024 22:21:07.285207987 CEST192.168.2.51.1.1.10xe10cStandard query (0)gamesfileapp.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 24, 2024 22:21:07.301686049 CEST1.1.1.1192.168.2.50xe10cNo error (0)gamesfileapp.com172.67.68.136A (IP address)IN (0x0001)false
                  Oct 24, 2024 22:21:07.301686049 CEST1.1.1.1192.168.2.50xe10cNo error (0)gamesfileapp.com104.26.1.244A (IP address)IN (0x0001)false
                  Oct 24, 2024 22:21:07.301686049 CEST1.1.1.1192.168.2.50xe10cNo error (0)gamesfileapp.com104.26.0.244A (IP address)IN (0x0001)false
                  • gamesfileapp.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.549709172.67.68.1364435824C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
                  TimestampBytes transferredDirectionData
                  2024-10-24 20:21:08 UTC176OUTGET /455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1729808204 HTTP/1.1
                  Host: gamesfileapp.com
                  User-Agent: NSIS_InetLoad (Mozilla)
                  Accept: */*
                  2024-10-24 20:21:08 UTC542INHTTP/1.1 200 OK
                  Date: Thu, 24 Oct 2024 20:21:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: close
                  cf-cache-status: DYNAMIC
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uHcl0xGOuqnGO2RUSXG7ga9%2Bc4O5CGdtCVTEK%2FWTb3y4X9vfmaaWkD2wUUss8xV2eQssx0sPzcyhdHe1DvLX2aPxl1z98sZJE3BMssFO327lRmq58hPqeA2LFiV86jNlIj0%3D"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8d7cabe65d6e4665-DFW
                  2024-10-24 20:21:08 UTC38INData Raw: 32 30 0d 0a 43 31 44 35 42 41 46 34 32 41 43 30 32 35 44 32 33 32 43 39 39 36 33 41 39 41 41 44 45 34 37 46 0d 0a
                  Data Ascii: 20C1D5BAF42AC025D232C9963A9AADE47F
                  2024-10-24 20:21:08 UTC5INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:16:21:06
                  Start date:24/10/2024
                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe"
                  Imagebase:0x300000
                  File size:12'867'416 bytes
                  MD5 hash:4213B2AA13A965E52E3E2F4B2CA37211
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  No disassembly