Windows Analysis Report
X.exe

Overview

General Information

Sample name: X.exe
Analysis ID: 1545330
MD5: 8be3f7c0b3d37ce0e08bb5f7c0695db9
SHA1: 29d53faa74d32b31c16e64adc1c46f836c3d210d
SHA256: 298b6408686fb26e77502121ef47b891b37bc7fd8095b15a1b133925afc16013
Tags: exeuser-SmashTheKernel
Infos:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false
Confidence: 40%

Signatures

Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Source: X.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: X.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp
Source: X.exe, 00000002.00000003.2119892729.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.miltera.com.tr/
Source: X.exe, 00000002.00000002.3371761817.00000000022F6000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.miltera.com.tr/pf/
Source: X.tmp, 00000003.00000002.3372569786.0000000002536000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.miltera.com.tr/pfS
Source: X.exe String found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.dr String found in binary or memory: https://www.innosetup.com/
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.dr String found in binary or memory: https://www.remobjects.com/ps
Source: X.tmp.2.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: X.exe, 00000002.00000003.2121064243.000000000271C000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000003.2121801938.000000007FE39000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000000.2119548651.0000000000504000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000002.3371761817.00000000022D8000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamekernel32j% vs X.exe
Source: X.exe Binary or memory string: OriginalFileName vs X.exe
Source: X.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engine Classification label: clean3.winEXE@3/2@0/0
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp File created: C:\Users\user\AppData\Local\Programs Jump to behavior
Source: C:\Users\user\Desktop\X.exe File created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp Jump to behavior
Source: C:\Users\user\Desktop\X.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\X.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\X.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization Jump to behavior
Source: X.exe String found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\X.exe File read: C:\Users\user\Desktop\X.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\X.exe "C:\Users\user\Desktop\X.exe"
Source: C:\Users\user\Desktop\X.exe Process created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe"
Source: C:\Users\user\Desktop\X.exe Process created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe" Jump to behavior
Source: C:\Users\user\Desktop\X.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\X.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\X.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\X.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\X.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Window found: window name: TMainForm Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: X.exe Static file information: File size 17100882 > 1048576
Source: X.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp
Source: X.exe Static PE information: section name: .didata
Source: X.tmp.2.dr Static PE information: section name: .didata
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp File created: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\Desktop\X.exe File created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Jump to dropped file
Source: C:\Users\user\Desktop\X.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmp Jump to dropped file
No contacted IP infos