Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
Analysis ID:1543369
MD5:872b0fa8c0306040f181d08c5d7a252b
SHA1:a08cf74361c96aa4d7e4503af6563c63b95f1973
SHA256:3a5576c4e7d9ed56cc295fea24ef0fa68cf4235dfefa434caa32015887e757c3
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5: 872B0FA8C0306040F181D08C5D7A252B)
    • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 372 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 884 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 6076 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 6176 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 736 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 6164 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 6008 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 6200 cmdline: C:\Windows\system32\WerFault.exe -u -p 7624 -s 508 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeReversingLabs: Detection: 55%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355913014.00007FF65DEE4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_e2f1d524-9
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49728 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355913014.00007FF65DEE4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/.COM;lc
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/64ApVc
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/C:
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/em
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49728 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7624 -s 508
Source: classification engineClassification label: mal84.evad.winEXE@18/1@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e4d9d42d-99b1-4226-a99b-4493de9da26dJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeReversingLabs: Detection: 55%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7624 -s 508
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic file information: File size 5856256 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: Raw size of .lol2 is bigger than: 0x100000 < 0x594000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .lol2
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: section name: .lol0
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: section name: .lol1
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeStatic PE information: section name: .lol2

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeMemory written: PID: 7624 base: 7FF841A3000D value: E9 BB CB EC FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeMemory written: PID: 7624 base: 7FF8418FCBC0 value: E9 5A 34 13 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355779625.000001D423195000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXEK
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E7F8BB7 second address: 7FF65E7F8BC1 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 inc ecx 0x00000005 pop ecx 0x00000006 inc ecx 0x00000007 movsx edx, cx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E23F4C8 second address: 7FF65E23F4D8 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 xor cl, ah 0x00000005 inc ebp 0x00000006 btr ebx, eax 0x00000009 popfd 0x0000000a movzx esi, sp 0x0000000d inc ecx 0x0000000e pop edx 0x0000000f pop esi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E28631A second address: 7FF65E286324 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 inc ecx 0x00000005 pop ecx 0x00000006 inc ecx 0x00000007 movsx edx, cx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E2355F8 second address: 7FF65E23560C instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 xadd ch, bl 0x00000006 add bp, 3FBFh 0x0000000b popfd 0x0000000c dec eax 0x0000000d movzx ebp, bp 0x00000010 cbw 0x00000012 inc ecx 0x00000013 pop edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E23560C second address: 7FF65E235615 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 movsx eax, cx 0x00000006 cdq 0x00000007 pop esi 0x00000008 lahf 0x00000009 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E235615 second address: 7FF65E235627 instructions: 0x00000000 rdtsc 0x00000002 inc cx 0x00000004 movsx edi, dl 0x00000007 inc ecx 0x00000008 pop ebp 0x00000009 inc ecx 0x0000000a not bl 0x0000000c inc ecx 0x0000000d pop ecx 0x0000000e inc esp 0x0000000f movzx edi, bx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeRDTSC instruction interceptor: First address: 7FF65E7E6291 second address: 7FF65E7E62A1 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 xor cl, ah 0x00000005 inc ebp 0x00000006 btr ebx, eax 0x00000009 popfd 0x0000000a movzx esi, sp 0x0000000d inc ecx 0x0000000e pop edx 0x0000000f pop esi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSpecial instruction interceptor: First address: 7FF65E6E8094 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSpecial instruction interceptor: First address: 7FF65E2A2D41 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Windows\System32\timeout.exe TID: 5900Thread sleep count: 41 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtQuerySystemInformation: Indirect: 0x7FF65E2A2D6FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtSetInformationThread: Direct from: 0x7FF65E83377FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtProtectVirtualMemory: Direct from: 0x7FF65E833759Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtQueryInformationProcess: Direct from: 0x7FF65E29EFEDJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtQueryInformationProcess: Direct from: 0x7FF65E833883Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtQuerySystemInformation: Indirect: 0x7FF65E2A2D77Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtSetInformationThread: Direct from: 0x7FF65E833832Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtQuerySystemInformation: Indirect: 0x7FF65E2A2DB1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeNtProtectVirtualMemory: Direct from: 0x7FF65E83370FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
12
Virtualization/Sandbox Evasion
1
Credential API Hooking
511
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory12
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543369 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 27/10/2024 Architecture: WINDOWS Score: 84 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 AI detected suspicious sample 2->43 9 SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe 1 2->9         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.1.5, 443, 49728 CLOUDFLARENETUS United States 9->35 37 127.0.0.1 unknown unknown 9->37 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->45 47 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->47 49 Tries to evade analysis by execution special instruction (VM detection) 9->49 51 4 other signatures 9->51 13 cmd.exe 1 9->13         started        15 cmd.exe 1 9->15         started        17 conhost.exe 9->17         started        19 WerFault.exe 2 9->19         started        signatures6 process7 process8 21 certutil.exe 3 1 13->21         started        23 find.exe 1 13->23         started        25 find.exe 1 13->25         started        27 cmd.exe 1 15->27         started        process9 29 conhost.exe 27->29         started        31 timeout.exe 1 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe55%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    unknown
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.2/.COM;lcSecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://keyauth.win/api/1.2/64ApVcSecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win/api/1.2/emSecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/C:SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355913014.00007FF65DEE4000.00000002.00000001.01000000.00000003.sdmpfalse
              • URL Reputation: safe
              unknown
              https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, 00000000.00000002.1355644628.000001D4217CC000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.26.1.5
                keyauth.winUnited States
                13335CLOUDFLARENETUSfalse
                IP
                127.0.0.1
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1543369
                Start date and time:2024-10-27 18:43:52 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 42s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
                Detection:MAL
                Classification:mal84.evad.winEXE@18/1@1/2
                EGA Information:Failed
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe, PID 7624 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                104.26.1.5SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                              lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                  G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-part-0017.t-0009.t-msedge.netfile.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.45
                                    Reminder.exeGet hashmaliciousAmadeyBrowse
                                    • 13.107.246.45
                                    SecuriteInfo.com.Variant.Giant.Cerbu.75.14856.25265.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.45
                                    1730040844c315465b42549fc945fcc365e3b38ee79e6f8426df216ee7746112fae780918c772.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                    • 13.107.246.45
                                    1730036586ac45c02678cfb051f46a3829e59a655739bcebbb1e2d27474e330fbc4c2b3a3d596.dat-decoded.dllGet hashmaliciousUnknownBrowse
                                    • 13.107.246.45
                                    1730032629d03288421fce5e7d9e6026f5a967d50c541a02112bcbceaac1a2fa9677728cde553.dat-decoded.exeGet hashmaliciousBlackshadesBrowse
                                    • 13.107.246.45
                                    R40XD2LfcZ.exeGet hashmaliciousClipboard HijackerBrowse
                                    • 13.107.246.45
                                    LkCinYWgNh.exeGet hashmaliciousClipboard HijackerBrowse
                                    • 13.107.246.45
                                    https://duy38.r.ag.d.sendibm3.com/mk/cl/f/sh/1t6Af4OiGsF30wT9TF4ckLf3fAzx5z/28D7HenRXzOUGet hashmaliciousLummaCBrowse
                                    • 13.107.246.45
                                    VLOlHUwbRz.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.45
                                    keyauth.winSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                    • 104.20.4.235
                                    SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.0.5
                                    SecuriteInfo.com.Trojan.TR.Redcap.cdtxw.10783.3124.exeGet hashmaliciousLummaCBrowse
                                    • 188.114.97.3
                                    f6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                                    • 188.114.96.3
                                    wo4POc0NG1.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                    • 172.67.170.64
                                    K3SRs78CAv.exeGet hashmaliciousLummaCBrowse
                                    • 188.114.97.3
                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                    • 104.21.95.91
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 172.64.41.3
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 104.21.95.91
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.1.5
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):12
                                    Entropy (8bit):3.0220552088742005
                                    Encrypted:false
                                    SSDEEP:3:ljRB:ljP
                                    MD5:A5DD30481F6BA8C9E519383E69391FA4
                                    SHA1:0E02F74F8CE54798AAD2A5CDD0646CF074067B40
                                    SHA-256:C91060CECCD90E6C810F17D75F8F1AE12DB1504F8C1C7FFAD11F278ACC8DF62E
                                    SHA-512:18BBF2F2A8D90CAE1403F3CAF66FED9838E6106D06B9FB3223BD955D6BD8A7913D3C43E65F8E61C7AD807AFEA9529A05945350A5B5CF8CC5242C94DA2DC17753
                                    Malicious:false
                                    Reputation:low
                                    Preview:Connecting..
                                    File type:PE32+ executable (console) x86-64, for MS Windows
                                    Entropy (8bit):7.898364423256787
                                    TrID:
                                    • Win64 Executable Console (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
                                    File size:5'856'256 bytes
                                    MD5:872b0fa8c0306040f181d08c5d7a252b
                                    SHA1:a08cf74361c96aa4d7e4503af6563c63b95f1973
                                    SHA256:3a5576c4e7d9ed56cc295fea24ef0fa68cf4235dfefa434caa32015887e757c3
                                    SHA512:23d8610ac8bfcb68695b652dd8d35edcc5f17994c90966ef0cabf11489d983cc852dd8e6d36ec85c78ec6f63cb6a7b21238a6d9687494f3ef99bc7ca86a4a277
                                    SSDEEP:98304:GRx4heu/+/tswG+PJPigEtVTH41ZE6HqM/aZeOO4wZivrH/LXmfI1ZWQpy:GL4gy+/tbG+PJa3txT6KKaLbwZivrjdJ
                                    TLSH:EE4612FF26583328C45E8C301423BD45B1F3661D5EF48A6A76E7FAC06F6AC10EA15B46
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...3..e.........."....".$...B........z........@..........................................`................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x1407aee1a
                                    Entrypoint Section:.lol2
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows cui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x65D3D433 [Mon Feb 19 22:20:35 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:51235326a5333254d9a2e7b5ce26509f
                                    Instruction
                                    push esi
                                    pushfd
                                    dec eax
                                    mov esi, 55C94B1Ah
                                    shl dword ptr [ebp+3Ah], 1
                                    jl 00007F16FCCB8DBAh
                                    add esi, esi
                                    call 00007F16FCD48105h
                                    adc al, 79h
                                    mov edi, 6215E3E3h
                                    xor eax, 6AFDD5A4h
                                    cmp bh, byte ptr [ebx+343D4C23h]
                                    add al, F5h
                                    and esp, eax
                                    mov bl, A3h
                                    cmp dword ptr [eax+33h], 03F3B374h
                                    cmp ch, ah
                                    inc edi
                                    inc edi
                                    imul esi, dword ptr [A4951FCCh], AF355BC8h
                                    cmp al, cl
                                    cmp esi, dword ptr [ebp+edx+4EA4377Bh]
                                    js 00007F16FCCB8D81h
                                    xor al, 24h
                                    or dword ptr [ebp+415BCEE8h], 4Dh
                                    loopne 00007F16FCCB8D33h
                                    inc ebx
                                    mov ebx, CBC6C623h
                                    js 00007F16FCCB8D0Fh
                                    stosd
                                    aas
                                    dec esp
                                    mov ebx, 8BC8F249h
                                    pop ds
                                    arpl word ptr [ecx+078F13C1h], cx
                                    jecxz 00007F16FCCB8D40h
                                    xor edx, dword ptr [edi+08h]
                                    dec ebx
                                    xor esp, dword ptr [ebx+edx*8-019278FAh]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x7c8fd80xc4f.lol2
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8499f00x244.lol2
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x9cc0000x1e0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9c3a000x759c.lol2
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x9cb0000xd4.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x7ee9b80x28.lol2
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9c38c00x140.lol2
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x4350000x1f0.lol1
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x722400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x740000x1be380x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x900000x2af00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x930000x4c800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .lol00x980000x39c32f0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .lol10x4350000x13100x14002c6e3e7456812b03cd9e00cfe24a6928False0.038671875data0.25834786945781507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .lol20x4370000x593f9c0x59400090336a7e5ec24addd2b30356f75ea56eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .reloc0x9cb0000xd40x200b527009c5338e7962442a3c165bfc5caFalse0.345703125data2.0988394364688396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x9cc0000x1e00x2007ac2329158cfba91310c5418c3c2e703False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_MANIFEST0x9cc0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                    DLLImport
                                    KERNEL32.dllUnmapViewOfFile
                                    USER32.dllGetWindowThreadProcessId
                                    ADVAPI32.dllCryptDestroyKey
                                    SHELL32.dllShellExecuteA
                                    MSVCP140.dll?always_noconv@codecvt_base@std@@QEBA_NXZ
                                    WININET.dllInternetOpenUrlA
                                    Normaliz.dllIdnToAscii
                                    WLDAP32.dll
                                    CRYPT32.dllCertFreeCertificateChain
                                    WS2_32.dllWSAGetLastError
                                    RPCRT4.dllRpcStringFreeA
                                    PSAPI.DLLGetModuleInformation
                                    USERENV.dllUnloadUserProfile
                                    VCRUNTIME140_1.dll__CxxFrameHandler4
                                    VCRUNTIME140.dll__std_exception_destroy
                                    api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment
                                    api-ms-win-crt-stdio-l1-1-0.dllfseek
                                    api-ms-win-crt-heap-l1-1-0.dllfree
                                    api-ms-win-crt-filesystem-l1-1-0.dll_lock_file
                                    api-ms-win-crt-utility-l1-1-0.dllrand
                                    api-ms-win-crt-math-l1-1-0.dll_dclass
                                    api-ms-win-crt-time-l1-1-0.dllstrftime
                                    api-ms-win-crt-convert-l1-1-0.dllstrtod
                                    api-ms-win-crt-locale-l1-1-0.dll___lc_codepage_func
                                    api-ms-win-crt-string-l1-1-0.dllstrncmp
                                    KERNEL32.dllGetVersion
                                    USER32.dllCharUpperBuffW
                                    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 27, 2024 18:44:49.588586092 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:49.588627100 CET44349728104.26.1.5192.168.2.10
                                    Oct 27, 2024 18:44:49.588697910 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:49.600805998 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:49.600824118 CET44349728104.26.1.5192.168.2.10
                                    Oct 27, 2024 18:44:50.227652073 CET44349728104.26.1.5192.168.2.10
                                    Oct 27, 2024 18:44:50.227758884 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:51.079377890 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:51.079386950 CET44349728104.26.1.5192.168.2.10
                                    Oct 27, 2024 18:44:51.079490900 CET49728443192.168.2.10104.26.1.5
                                    Oct 27, 2024 18:44:51.080161095 CET44349728104.26.1.5192.168.2.10
                                    Oct 27, 2024 18:44:51.080214024 CET49728443192.168.2.10104.26.1.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 27, 2024 18:44:49.576091051 CET5737453192.168.2.101.1.1.1
                                    Oct 27, 2024 18:44:49.584034920 CET53573741.1.1.1192.168.2.10
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Oct 27, 2024 18:44:49.576091051 CET192.168.2.101.1.1.10xa935Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Oct 27, 2024 18:44:43.782429934 CET1.1.1.1192.168.2.100x6275No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Oct 27, 2024 18:44:43.782429934 CET1.1.1.1192.168.2.100x6275No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                    Oct 27, 2024 18:44:49.584034920 CET1.1.1.1192.168.2.100xa935No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                    Oct 27, 2024 18:44:49.584034920 CET1.1.1.1192.168.2.100xa935No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                    Oct 27, 2024 18:44:49.584034920 CET1.1.1.1192.168.2.100xa935No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:13:44:46
                                    Start date:27/10/2024
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe"
                                    Imagebase:0x7ff65de70000
                                    File size:5'856'256 bytes
                                    MD5 hash:872B0FA8C0306040F181D08C5D7A252B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:13:44:46
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff620390000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:13:44:48
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                    Imagebase:0x7ff60f410000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:13:44:48
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\certutil.exe
                                    Wow64 process (32bit):false
                                    Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exe" MD5
                                    Imagebase:0x7ff71a180000
                                    File size:1'651'712 bytes
                                    MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:5
                                    Start time:13:44:48
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\find.exe
                                    Wow64 process (32bit):false
                                    Commandline:find /i /v "md5"
                                    Imagebase:0x7ff703d00000
                                    File size:17'920 bytes
                                    MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:6
                                    Start time:13:44:48
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\find.exe
                                    Wow64 process (32bit):false
                                    Commandline:find /i /v "certutil"
                                    Imagebase:0x7ff703d00000
                                    File size:17'920 bytes
                                    MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:7
                                    Start time:13:44:50
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                    Imagebase:0x7ff60f410000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:13:44:50
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                    Imagebase:0x7ff60f410000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:13:44:50
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff620390000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:13:44:51
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\timeout.exe
                                    Wow64 process (32bit):false
                                    Commandline:timeout /t 5
                                    Imagebase:0x7ff768e20000
                                    File size:32'768 bytes
                                    MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:13
                                    Start time:13:44:51
                                    Start date:27/10/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 7624 -s 508
                                    Imagebase:0x7ff65aca0000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    No disassembly