Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
X.exe

Overview

General Information

Sample name:X.exe
Analysis ID:1545330
MD5:8be3f7c0b3d37ce0e08bb5f7c0695db9
SHA1:29d53faa74d32b31c16e64adc1c46f836c3d210d
SHA256:298b6408686fb26e77502121ef47b891b37bc7fd8095b15a1b133925afc16013
Tags:exeuser-SmashTheKernel
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • X.exe (PID: 2328 cmdline: "C:\Users\user\Desktop\X.exe" MD5: 8BE3F7C0B3D37CE0E08BB5F7C0695DB9)
    • X.tmp (PID: 3280 cmdline: "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe" MD5: 9697270DB20DBF954FC953888A483A82)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: X.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: X.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp
Source: X.exe, 00000002.00000003.2119892729.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.miltera.com.tr/
Source: X.exe, 00000002.00000002.3371761817.00000000022F6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.miltera.com.tr/pf/
Source: X.tmp, 00000003.00000002.3372569786.0000000002536000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.miltera.com.tr/pfS
Source: X.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.drString found in binary or memory: https://www.innosetup.com/
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.drString found in binary or memory: https://www.remobjects.com/ps
Source: X.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: X.exe, 00000002.00000003.2121064243.000000000271C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000003.2121801938.000000007FE39000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000000.2119548651.0000000000504000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs X.exe
Source: X.exe, 00000002.00000002.3371761817.00000000022D8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs X.exe
Source: X.exeBinary or memory string: OriginalFileName vs X.exe
Source: X.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean3.winEXE@3/2@0/0
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Users\user\Desktop\X.exeFile created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmpJump to behavior
Source: C:\Users\user\Desktop\X.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\X.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\X.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: X.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\X.exeFile read: C:\Users\user\Desktop\X.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\X.exe "C:\Users\user\Desktop\X.exe"
Source: C:\Users\user\Desktop\X.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe"
Source: C:\Users\user\Desktop\X.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe" Jump to behavior
Source: C:\Users\user\Desktop\X.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\X.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\X.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\X.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\X.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: X.exeStatic file information: File size 17100882 > 1048576
Source: X.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp
Source: X.exeStatic PE information: section name: .didata
Source: X.tmp.2.drStatic PE information: section name: .didata
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\X.exeFile created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpJump to dropped file
Source: C:\Users\user\Desktop\X.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmpJump to dropped file
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping2
System Owner/User Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1545330 Sample: X.exe Startdate: 30/10/2024 Architecture: WINDOWS Score: 3 5 X.exe 2 2->5         started        file3 11 C:\Users\user\AppData\Local\Temp\...\X.tmp, PE32 5->11 dropped 8 X.tmp 3 12 5->8         started        process4 file5 13 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 8->13 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
X.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.remobjects.com/ps0%URL Reputationsafe
https://www.innosetup.com/0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUX.exefalse
    unknown
    http://www.miltera.com.tr/pf/X.exe, 00000002.00000002.3371761817.00000000022F6000.00000004.00001000.00020000.00000000.sdmpfalse
      unknown
      https://www.remobjects.com/psX.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.miltera.com.tr/X.exe, 00000002.00000003.2119892729.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmpfalse
        unknown
        https://www.innosetup.com/X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.drfalse
        • URL Reputation: safe
        unknown
        http://www.miltera.com.tr/pfSX.tmp, 00000003.00000002.3372569786.0000000002536000.00000004.00001000.00020000.00000000.sdmpfalse
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1545330
          Start date and time:2024-10-30 12:52:07 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 40s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:X.exe
          Detection:CLEAN
          Classification:clean3.winEXE@3/2@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
          • VT rate limit hit for: X.exe
          No simulations
          No context
          No context
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmpSetup_DigiSignerOne_x86.exeGet hashmaliciousHavocBrowse
            XS_Trade_AI-newest_release_.exeGet hashmaliciousLummaCBrowse
              Reminder.exeGet hashmaliciousAmadeyBrowse
                Reminder.exeGet hashmaliciousAmadeyBrowse
                  Reminder.exeGet hashmaliciousAmadeyBrowse
                    yM3BrI8G1EGet hashmaliciousUnknownBrowse
                      MDE_File_Sample_7046d0b264f80a016ec10158377c7e76c395cffb.zipGet hashmaliciousXmrigBrowse
                        Reminder.exeGet hashmaliciousAmadeyBrowse
                          Reminder.exeGet hashmaliciousAmadeyBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              Process:C:\Users\user\Desktop\X.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3370496
                              Entropy (8bit):6.190488486506743
                              Encrypted:false
                              SSDEEP:49152:1WGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbW333gb:vtLutqgwh4NYxtJpkxhGl333k
                              MD5:9697270DB20DBF954FC953888A483A82
                              SHA1:A17F126136077733A944132D87B777FDC4FC4EB4
                              SHA-256:86E414547DA84DE0A10724B97EACAF0907F3F45202067CA03500398D09BEA2EC
                              SHA-512:F2B3257370A1CFF45795F36215F0A2365B040A3225106905599B9B2E85B95311ECD7062A022B575E60F5B018B6229CFC3723A9507EB3B10FADDE0512AEA21811
                              Malicious:false
                              Reputation:low
                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,.........hf,......p,...@..........................P4...........@......@....................-.......-..9.......?...........................................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc....?.......@....-.............@..@..............1.......0.............@..@........................................................
                              Process:C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp
                              File Type:PE32+ executable (console) x86-64, for MS Windows
                              Category:dropped
                              Size (bytes):6144
                              Entropy (8bit):4.720366600008286
                              Encrypted:false
                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                              MD5:E4211D6D009757C078A9FAC7FF4F03D4
                              SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                              SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                              SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: Setup_DigiSignerOne_x86.exe, Detection: malicious, Browse
                              • Filename: XS_Trade_AI-newest_release_.exe, Detection: malicious, Browse
                              • Filename: Reminder.exe, Detection: malicious, Browse
                              • Filename: Reminder.exe, Detection: malicious, Browse
                              • Filename: Reminder.exe, Detection: malicious, Browse
                              • Filename: yM3BrI8G1E, Detection: malicious, Browse
                              • Filename: MDE_File_Sample_7046d0b264f80a016ec10158377c7e76c395cffb.zip, Detection: malicious, Browse
                              • Filename: Reminder.exe, Detection: malicious, Browse
                              • Filename: Reminder.exe, Detection: malicious, Browse
                              • Filename: file.exe, Detection: malicious, Browse
                              Reputation:high, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.967184191410568
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 98.45%
                              • Inno Setup installer (109748/4) 1.08%
                              • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              File name:X.exe
                              File size:17'100'882 bytes
                              MD5:8be3f7c0b3d37ce0e08bb5f7c0695db9
                              SHA1:29d53faa74d32b31c16e64adc1c46f836c3d210d
                              SHA256:298b6408686fb26e77502121ef47b891b37bc7fd8095b15a1b133925afc16013
                              SHA512:baa2f7656ac0d429fce4331b485ac6080f54d19b4ea40910677ddab42eabb2cd0e2a5cbbdee518e710ea90525f2f7f434d9d4b7d998ddff5c0037017ac159282
                              SSDEEP:393216:uiH5/S9HlfXIQ3XvNROOxKwwGzOzQpZBjwyj:uiZ/SJl/33lRnVCUBkq
                              TLSH:3507233BB2E8B13EC46A4B32057293209977BA65A51B8C1E57F0190FCF32560DF3EA55
                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                              Icon Hash:3333276c4d591317
                              Entrypoint:0x4b5eec
                              Entrypoint Section:.itext
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x63ECF218 [Wed Feb 15 14:54:16 2023 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:1
                              File Version Major:6
                              File Version Minor:1
                              Subsystem Version Major:6
                              Subsystem Version Minor:1
                              Import Hash:e569e6f445d32ba23766ad67d1e3787f
                              Instruction
                              push ebp
                              mov ebp, esp
                              add esp, FFFFFFA4h
                              push ebx
                              push esi
                              push edi
                              xor eax, eax
                              mov dword ptr [ebp-3Ch], eax
                              mov dword ptr [ebp-40h], eax
                              mov dword ptr [ebp-5Ch], eax
                              mov dword ptr [ebp-30h], eax
                              mov dword ptr [ebp-38h], eax
                              mov dword ptr [ebp-34h], eax
                              mov dword ptr [ebp-2Ch], eax
                              mov dword ptr [ebp-28h], eax
                              mov dword ptr [ebp-14h], eax
                              mov eax, 004B14B8h
                              call 00007FAED47FAB05h
                              xor eax, eax
                              push ebp
                              push 004B65E2h
                              push dword ptr fs:[eax]
                              mov dword ptr fs:[eax], esp
                              xor edx, edx
                              push ebp
                              push 004B659Eh
                              push dword ptr fs:[edx]
                              mov dword ptr fs:[edx], esp
                              mov eax, dword ptr [004BE634h]
                              call 00007FAED489D5F7h
                              call 00007FAED489D14Ah
                              lea edx, dword ptr [ebp-14h]
                              xor eax, eax
                              call 00007FAED48105A4h
                              mov edx, dword ptr [ebp-14h]
                              mov eax, 004C1D84h
                              call 00007FAED47F56F7h
                              push 00000002h
                              push 00000000h
                              push 00000001h
                              mov ecx, dword ptr [004C1D84h]
                              mov dl, 01h
                              mov eax, dword ptr [004238ECh]
                              call 00007FAED4811727h
                              mov dword ptr [004C1D88h], eax
                              xor edx, edx
                              push ebp
                              push 004B654Ah
                              push dword ptr fs:[edx]
                              mov dword ptr fs:[edx], esp
                              call 00007FAED489D67Fh
                              mov dword ptr [004C1D90h], eax
                              mov eax, dword ptr [004C1D90h]
                              cmp dword ptr [eax+0Ch], 01h
                              jne 00007FAED48A389Ah
                              mov eax, dword ptr [004C1D90h]
                              mov edx, 00000028h
                              call 00007FAED481201Ch
                              mov edx, dword ptr [004C1D90h]
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x423d8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0xc70000x423d80x424003703c492ffbd771d48f82cd9e0b1a0ccFalse0.04655070754716981data2.1720782894183848IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc74380x3eff8Device independent bitmap graphic, 250 x 500 x 32, image size 0EnglishUnited States0.03094869012556193
                              RT_STRING0x1064300x360data0.34375
                              RT_STRING0x1067900x260data0.3256578947368421
                              RT_STRING0x1069f00x45cdata0.4068100358422939
                              RT_STRING0x106e4c0x40cdata0.3754826254826255
                              RT_STRING0x1072580x2d4data0.39226519337016574
                              RT_STRING0x10752c0xb8data0.6467391304347826
                              RT_STRING0x1075e40x9cdata0.6410256410256411
                              RT_STRING0x1076800x374data0.4230769230769231
                              RT_STRING0x1079f40x398data0.3358695652173913
                              RT_STRING0x107d8c0x368data0.3795871559633027
                              RT_STRING0x1080f40x2a4data0.4275147928994083
                              RT_RCDATA0x1083980x10data1.5
                              RT_RCDATA0x1083a80x2c4data0.6384180790960452
                              RT_RCDATA0x10866c0x2cdata1.1818181818181819
                              RT_GROUP_ICON0x1086980x14dataEnglishUnited States1.25
                              RT_VERSION0x1086ac0x584dataEnglishUnited States0.2769121813031161
                              RT_MANIFEST0x108c300x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                              DLLImport
                              kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                              comctl32.dllInitCommonControls
                              version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                              user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                              oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                              netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                              advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                              NameOrdinalAddress
                              TMethodImplementationIntercept30x4541a8
                              __dbk_fcall_wrapper20x40d0a0
                              dbkFCallWrapperAddr10x4be63c
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:2
                              Start time:07:52:57
                              Start date:30/10/2024
                              Path:C:\Users\user\Desktop\X.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\X.exe"
                              Imagebase:0x400000
                              File size:17'100'882 bytes
                              MD5 hash:8BE3F7C0B3D37CE0E08BB5F7C0695DB9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Reputation:low
                              Has exited:false

                              Target ID:3
                              Start time:07:52:58
                              Start date:30/10/2024
                              Path:C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe"
                              Imagebase:0x400000
                              File size:3'370'496 bytes
                              MD5 hash:9697270DB20DBF954FC953888A483A82
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Reputation:low
                              Has exited:false

                              No disassembly