Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe
Analysis ID:1549839
MD5:67a40cd985a7b2dc52bd7b8b5d192de5
SHA1:7db5d015e99b456e9f5701354bd26182c46afe4e
SHA256:4046352132a82079654ca382e522ad360aceb34600afed776409cd4a1c2c8faf
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5: 67A40CD985A7B2DC52BD7B8B5D192DE5)
    • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6328 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 6280 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 6432 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 1544 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 3244 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 5500 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 6740 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 1900 cmdline: C:\Windows\system32\WerFault.exe -u -p 7044 -s 824 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-06T06:24:33.999271+010020229301A Network Trojan was detected52.149.20.212443192.168.2.449737TCP
2024-11-06T06:25:13.173823+010020229301A Network Trojan was detected52.149.20.212443192.168.2.460110TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeReversingLabs: Detection: 18%
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeVirustotal: Detection: 22%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_6b421c2f-2
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49737
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:60110
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2116848828.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.3/
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2116848828.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.3/em7KVA:
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49732 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .][v
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .Y}T
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .@mw
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7044 -s 824
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: Number of sections : 13 > 10
Source: classification engineClassification label: mal84.evad.winEXE@18/0@1/2
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1900:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2260:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7064:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\19dec1ca-5b76-46fb-90bb-cc74ba076062Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeReversingLabs: Detection: 18%
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeVirustotal: Detection: 22%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7044 -s 824
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic file information: File size 4602880 > 1048576
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: Raw size of .DMx is bigger than: 0x100000 < 0x462200
Source: initial sampleStatic PE information: section where entry point is pointing to: .DMx
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .detourc
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .detourd
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .][v
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .Y}T
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .asder
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .@mw
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .hv8
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeStatic PE information: section name: .DMx
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F9438 pushad ; retf 0_3_001F9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F9438 pushad ; retf 0_3_001F9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F1AF8 push eax; iretd 0_3_001F1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F1AF8 push eax; iretd 0_3_001F1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F9438 pushad ; retf 0_3_001F9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F9438 pushad ; retf 0_3_001F9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F1AF8 push eax; iretd 0_3_001F1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_001F1AF8 push eax; iretd 0_3_001F1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE1AF8 push eax; iretd 0_3_01FE1B01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeCode function: 0_3_01FE9438 pushad ; retf 0_3_01FE9439

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeMemory written: PID: 7044 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeMemory written: PID: 7044 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeMemory written: PID: 7044 base: 7FFE2238000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeMemory written: PID: 7044 base: 7FFE2223CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSpecial instruction interceptor: First address: 140A1DFC1 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSpecial instruction interceptor: First address: 140A1DFD1 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSpecial instruction interceptor: First address: 1405E9D26 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe TID: 7160Thread sleep time: -45000s >= -30000sJump to behavior
Source: C:\Windows\System32\timeout.exe TID: 3104Thread sleep count: 45 > 30Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeThread delayed: delay time: 45000Jump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2116848828.0000000000540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeMemory protected: page execute and read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Indirect: 0x1405E9E2BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQueryInformationProcess: Direct from: 0x140A048D1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1405FAAB0Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x140798703Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtSetInformationProcess: Direct from: 0x1406414BFJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1407A3D82Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1407AF590Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Direct from: 0x140A0BC59Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x14096CFAEJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x140623C4DJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1405F244FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x140634617Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Indirect: 0x1405EA64CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1406339DEJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQueryInformationProcess: Direct from: 0x140481F14Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Direct from: 0x140A1B27FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQueryInformationProcess: Direct from: 0x140944CDEJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x14063CB5BJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtClose: Direct from: 0x140960999
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x14063DFE6Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtSetInformationThread: Direct from: 0x140627DA5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtOpenFile: Direct from: 0x14079ABDEJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Indirect: 0x1405E9DAAJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Direct from: 0x1407B200AJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x140A04898Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Direct from: 0x14097640EJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Direct from: 0x1406389FDJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtProtectVirtualMemory: Direct from: 0x1407AE803Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeNtQuerySystemInformation: Indirect: 0x1405E9DEAJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
1
Credential API Hooking
421
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
231
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager231
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDS112
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1549839 Sample: SecuriteInfo.com.Win64.Evo-... Startdate: 06/11/2024 Architecture: WINDOWS Score: 84 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 PE file contains section with special chars 2->43 45 AI detected suspicious sample 2->45 9 SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe 1 2->9         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.0.5, 443, 49732 CLOUDFLARENETUS United States 9->35 37 127.0.0.1 unknown unknown 9->37 47 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->47 49 Query firmware table information (likely to detect VMs) 9->49 51 Tries to evade analysis by execution special instruction (VM detection) 9->51 53 3 other signatures 9->53 13 cmd.exe 1 9->13         started        15 cmd.exe 1 9->15         started        17 conhost.exe 9->17         started        19 WerFault.exe 2 9->19         started        signatures6 process7 process8 21 certutil.exe 3 1 13->21         started        23 find.exe 1 13->23         started        25 find.exe 1 13->25         started        27 cmd.exe 1 15->27         started        process9 29 conhost.exe 27->29         started        31 timeout.exe 1 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe18%ReversingLabs
SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe22%VirustotalBrowse
SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlSecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpfalse
      high
      https://keyauth.win/api/1.3/SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2116848828.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://keyauth.win/api/1.3/em7KVA:SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2116848828.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpfalse
            high
            https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, 00000000.00000002.2117157115.00000001400F0000.00000002.00000001.01000000.00000003.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.26.0.5
              keyauth.winUnited States
              13335CLOUDFLARENETUSfalse
              IP
              127.0.0.1
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1549839
              Start date and time:2024-11-06 06:23:25 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 23s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Run name:Run with higher sleep bypass
              Number of analysed new started processes analysed:17
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe
              Detection:MAL
              Classification:mal84.evad.winEXE@18/0@1/2
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe, PID 7044 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.26.0.5SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                          xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                            LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                              xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                                4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  keyauth.winSecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.1.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.1.5
                                  SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSJkYvyHHOr8.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.133.135
                                  https://gen-techs.site/s/ind.html#123@123.comGet hashmaliciousHTMLPhisherBrowse
                                  • 172.67.184.208
                                  9zcfeum49t.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.218.30
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                  • 104.21.5.155
                                  example.htmlGet hashmaliciousUnknownBrowse
                                  • 104.18.95.41
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                  • 104.21.5.155
                                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                  • 104.21.5.155
                                  y4jxkrdxZr.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.13.205
                                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                  • 172.67.133.135
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  bd0bf25947d4a37404f0424edf4db9adSecuriteInfo.com.Trojan.Siggen29.64132.8972.20040.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  app64.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.FileRepMalware.12585.5759.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  sadfwqefrqw3f.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.FileRepMalware.12025.7543.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Heuristic.HEUR.AGEN.1319832.32667.20795.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  ActSet.ps1Get hashmaliciousFredy StealerBrowse
                                  • 104.26.0.5
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                  Entropy (8bit):7.98446657532598
                                  TrID:
                                  • Win64 Executable Console (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe
                                  File size:4'602'880 bytes
                                  MD5:67a40cd985a7b2dc52bd7b8b5d192de5
                                  SHA1:7db5d015e99b456e9f5701354bd26182c46afe4e
                                  SHA256:4046352132a82079654ca382e522ad360aceb34600afed776409cd4a1c2c8faf
                                  SHA512:014a3fca9dfacf8b3ed60c55745fef24138ebb127d9d07eb6d4139763c7321bfb94dff4e92b822bd8d1c8d323f2a5c54352961480af9d7a416b1f5ec3c38847e
                                  SSDEEP:98304:JOhke7vJEkrrsIYfc2R/DcIoJoS+yJv8HpV6YBPyjyCzFemK2Cv1:gD7RS91BcI5yJv8JcYBqBC
                                  TLSH:682633997AC7CFF2C029D7F4A294103EB1ED379892B46C803B8E16017D53A5A6F39761
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...F.*g..........#....*.............?.........@.............................`......o8G... ................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x140953f98
                                  Entrypoint Section:.DMx
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows cui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x672A9346 [Tue Nov 5 21:51:02 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:3b8dc8f8fb88038b6079c90d1c1166f0
                                  Instruction
                                  call 00007F61248FC8D9h
                                  add byte ptr [eax], al
                                  add byte ptr [ebx+74h], dh
                                  jc 00007F61248CD1C2h
                                  bound esi, dword ptr [edx+6Bh]
                                  add byte ptr [edi-0Eh], bh
                                  mov dh, 5Ah
                                  sub eax, F7BB2EE5h
                                  jnc 00007F61248CD1AEh
                                  test al, F7h
                                  fidivr dword ptr [esi-1Ah]
                                  fisttp qword ptr [ebp+4Eh]
                                  xlatb
                                  jnle 00007F61248CD179h
                                  pop esp
                                  pop esp
                                  out dx, eax
                                  adc al, byte ptr [esi-1176EA9Ah]
                                  pop ds
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa0f5d00x208.DMx
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa550000x1e0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa48de00xb2b0.DMx
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0xa1ac080x28.DMx
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48ca00x140.DMx
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x5f00000x1028.hv8
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000xee65c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0xf00000x3786e0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                                  .data0x1280000x23a80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x12b0000x7ac40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                                  .detourc0x1330000x68400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                                  .detourd0x13a0000x400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .][v0x13b0000x1e80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                                  .Y}T0x13c0000x16ec0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                                  .asder0x13e0000x339c000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .@mw0x4780000x17752d0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .hv80x5f00000x13980x1400a45534ade8b0297795bab22c4f06d388False0.3466796875data2.881773371831772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .DMx0x5f20000x4620900x462200a89bda146da901fa7f99720a1587f2cbunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xa550000x1e00x200b45cf11040bd7da9cca8a05121ed193bFalse0.537109375data4.766656762050388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_MANIFEST0xa550580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                  DLLImport
                                  KERNEL32.dllLocalFree, WideCharToMultiByte, GetConsoleWindow, Module32NextW, CreateProcessA, K32EnumProcessModules, CheckRemoteDebuggerPresent, FormatMessageA, GetLocaleInfoEx, GetCurrentDirectoryW, CreateDirectoryW, FindClose, CloseHandle, UnmapViewOfFile, SetLastError, VirtualQuery, SetThreadContext, FlushInstructionCache, FindFirstFileW, GetSystemInfo, GetFileAttributesExW, AreFileApisANSI, GetThreadContext, GetFileInformationByHandleEx, OutputDebugStringW, DeviceIoControl, GetCurrentThread, GetLastError, ResumeThread, SuspendThread, GetCurrentThreadId, VirtualAlloc, GetCurrentProcess, VirtualFree, VirtualProtect, Module32FirstW, Process32FirstW, CreateFileA, Process32NextW, Sleep, CreateToolhelp32Snapshot, WaitForSingleObject, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, GetFileSizeEx, VerifyVersionInfoW, GetCurrentProcessId, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, WaitForSingleObjectEx, MoveFileExW, MultiByteToWideChar, GetTickCount, QueryPerformanceCounter, SleepEx, LoadLibraryW, GetSystemDirectoryW, QueryPerformanceFrequency, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, FormatMessageW, QueryFullProcessImageNameW, GetModuleHandleA, GetModuleFileNameW, MapViewOfFile, CreateThread, CreatePipe, GetStdHandle, SetConsoleTitleA, SetConsoleTextAttribute, SetHandleInformation, WriteProcessMemory, GetModuleFileNameA, FreeLibrary, GetModuleHandleW, GetSystemTimeAsFileTime, GetProcAddress, CreateFileMappingW, DeleteCriticalSection, InitializeCriticalSectionEx, AddVectoredExceptionHandler, InitializeSListHead, CreateFileW
                                  USER32.dllGetWindowLongPtrA, SetLayeredWindowAttributes, EnumDisplayDevicesA, MessageBoxA, SetWindowPos, SetWindowLongPtrA, FindWindowW
                                  ADVAPI32.dllCryptEncrypt, CryptDestroyKey, SystemFunction036, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW, SetSecurityInfo, RegCreateKeyExA, GetUserNameA, IsValidSid, InitializeAcl, GetLengthSid, AddAccessAllowedAce, CryptImportKey, RegCloseKey, RegQueryValueExA, RegSetValueExA, OpenProcessToken, RegOpenKeyExA, RegEnumKeyExA, GetTokenInformation
                                  MSVCP140.dll_Query_perf_frequency, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ??1_Lockit@std@@QEAA@XZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?_Xbad_function_call@std@@YAXXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z, ??7ios_base@std@@QEBA_NXZ, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, ?_Xinvalid_argument@std@@YAXPEBD@Z, ?_Xbad_alloc@std@@YAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?good@ios_base@std@@QEBA_NXZ, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ??0_Lockit@std@@QEAA@H@Z, ?_Throw_Cpp_error@std@@YAXH@Z, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, _Xtime_get_ticks, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?uncaught_exception@std@@YA_NXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?_Xout_of_range@std@@YAXPEBD@Z, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Random_device@std@@YAIXZ, ?_Xlength_error@std@@YAXPEBD@Z, _Cnd_do_broadcast_at_thread_exit, _Query_perf_counter, _Thrd_detach, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
                                  ntdll.dllNtRaiseHardError, RtlLookupFunctionEntry, RtlCaptureContext, VerSetConditionMask, RtlAdjustPrivilege, RtlVirtualUnwind
                                  CRYPT32.dllCertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryW, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringW, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertCloseStore, CertOpenStore
                                  WS2_32.dll__WSAFDIsSet, WSAIoctl, socket, setsockopt, recv, htons, getsockname, getpeername, connect, bind, WSACleanup, WSAStartup, inet_ntop, accept, ntohs, inet_pton, WSAGetLastError, closesocket, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, send, getsockopt, select, htonl, listen, getaddrinfo, freeaddrinfo, recvfrom, sendto, ioctlsocket, gethostname, WSASetLastError
                                  SHLWAPI.dllPathFindFileNameW
                                  PSAPI.DLLGetModuleInformation
                                  bcrypt.dllBCryptGenRandom
                                  VCRUNTIME140.dllmemcmp, __std_exception_copy, __std_exception_destroy, __std_terminate, memcpy, __C_specific_handler, memmove, memset, strchr, strrchr, strstr, wcschr, memchr, __current_exception, __current_exception_context, _CxxThrowException
                                  VCRUNTIME140_1.dll__CxxFrameHandler4
                                  api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _get_initial_narrow_environment, _beginthreadex, _initterm_e, _exit, system, __p___argc, terminate, __p___argv, __sys_errlist, __sys_nerr, _c_exit, _register_thread_local_exe_atexit_callback, _set_app_type, _errno, exit, abort, _initterm, _invalid_parameter_noinfo_noreturn
                                  api-ms-win-crt-stdio-l1-1-0.dllfgetpos, setvbuf, fseek, __acrt_iob_func, ftell, fwrite, __stdio_common_vsscanf, _wopen, _wfopen, fputs, _lseeki64, ungetc, __stdio_common_vsprintf, _popen, _pclose, fgets, _set_fmode, fclose, fflush, fputc, fgetc, _close, _fileno, _write, _read, _get_stream_buffer_pointers, feof, _fseeki64, fread, fsetpos, __p__commode
                                  api-ms-win-crt-time-l1-1-0.dll_time64, strftime, _gmtime64, _localtime64, _difftime64, _localtime64_s
                                  api-ms-win-crt-utility-l1-1-0.dllrand, qsort, srand
                                  api-ms-win-crt-filesystem-l1-1-0.dllremove, _unlock_file, _wstat64, _lock_file, _unlink, _fstat64
                                  api-ms-win-crt-convert-l1-1-0.dllwcstombs, atoi, strtoul, strtoull, strtoll, strtod, strtol
                                  api-ms-win-crt-heap-l1-1-0.dllrealloc, malloc, free, calloc, _set_new_mode, _callnewh
                                  api-ms-win-crt-math-l1-1-0.dll_dsign, ceilf, _fdopen, __setusermatherr
                                  api-ms-win-crt-environment-l1-1-0.dllgetenv
                                  api-ms-win-crt-locale-l1-1-0.dlllocaleconv, ___lc_codepage_func, _configthreadlocale
                                  api-ms-win-crt-string-l1-1-0.dllstrcspn, strncmp, _wcsdup, wcspbrk, strspn, strcmp, _strdup, wcsncpy, wcsncmp, strpbrk
                                  SHELL32.dllShellExecuteA
                                  KERNEL32.dllGetSystemTimeAsFileTime, CreateEventA, GetModuleHandleA, TerminateProcess, GetCurrentProcess, CreateToolhelp32Snapshot, Thread32First, GetCurrentProcessId, GetCurrentThreadId, OpenThread, Thread32Next, CloseHandle, SuspendThread, ResumeThread, WriteProcessMemory, GetSystemInfo, VirtualAlloc, VirtualProtect, VirtualFree, GetProcessAffinityMask, SetProcessAffinityMask, GetCurrentThread, SetThreadAffinityMask, Sleep, LoadLibraryA, FreeLibrary, GetTickCount, SystemTimeToFileTime, FileTimeToSystemTime, GlobalFree, HeapAlloc, HeapFree, GetProcAddress, ExitProcess, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, MultiByteToWideChar, GetModuleHandleW, LoadResource, FindResourceExW, FindResourceExA, WideCharToMultiByte, GetThreadLocale, GetUserDefaultLCID, GetSystemDefaultLCID, EnumResourceNamesA, EnumResourceNamesW, EnumResourceLanguagesA, EnumResourceLanguagesW, EnumResourceTypesA, EnumResourceTypesW, CreateFileW, LoadLibraryW, GetLastError, FlushFileBuffers, FlsSetValue, GetCommandLineA, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, EncodePointer, DecodePointer, FlsGetValue, FlsFree, SetLastError, FlsAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RaiseException, RtlPcToFileHeader, RtlUnwindEx, LCMapStringA, LCMapStringW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapSetInformation, HeapCreate, HeapDestroy, QueryPerformanceCounter, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize, WriteFile, SetFilePointer, GetConsoleCP, GetConsoleMode, HeapReAlloc, InitializeCriticalSectionAndSpinCount, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-06T06:24:33.999271+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449737TCP
                                  2024-11-06T06:25:13.173823+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.460110TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 6, 2024 06:24:16.670298100 CET49732443192.168.2.4104.26.0.5
                                  Nov 6, 2024 06:24:16.670331955 CET44349732104.26.0.5192.168.2.4
                                  Nov 6, 2024 06:24:16.670394897 CET49732443192.168.2.4104.26.0.5
                                  Nov 6, 2024 06:24:16.707731009 CET49732443192.168.2.4104.26.0.5
                                  Nov 6, 2024 06:24:16.707742929 CET44349732104.26.0.5192.168.2.4
                                  Nov 6, 2024 06:24:17.341789961 CET44349732104.26.0.5192.168.2.4
                                  Nov 6, 2024 06:24:17.341890097 CET49732443192.168.2.4104.26.0.5
                                  Nov 6, 2024 06:24:18.297559023 CET49732443192.168.2.4104.26.0.5
                                  Nov 6, 2024 06:24:18.297676086 CET44349732104.26.0.5192.168.2.4
                                  Nov 6, 2024 06:24:18.297775030 CET49732443192.168.2.4104.26.0.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 6, 2024 06:24:16.649251938 CET5822153192.168.2.41.1.1.1
                                  Nov 6, 2024 06:24:16.665967941 CET53582211.1.1.1192.168.2.4
                                  Nov 6, 2024 06:24:35.156054974 CET53605441.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 6, 2024 06:24:16.649251938 CET192.168.2.41.1.1.10x3713Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 6, 2024 06:24:16.665967941 CET1.1.1.1192.168.2.40x3713No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                  Nov 6, 2024 06:24:16.665967941 CET1.1.1.1192.168.2.40x3713No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                  Nov 6, 2024 06:24:16.665967941 CET1.1.1.1192.168.2.40x3713No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:00:24:13
                                  Start date:06/11/2024
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe"
                                  Imagebase:0x140000000
                                  File size:4'602'880 bytes
                                  MD5 hash:67A40CD985A7B2DC52BD7B8B5D192DE5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:00:24:14
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:00:24:15
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                  Imagebase:0x7ff690d60000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:00:24:15
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\certutil.exe
                                  Wow64 process (32bit):false
                                  Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.9614.31304.exe" MD5
                                  Imagebase:0x7ff793920000
                                  File size:1'651'712 bytes
                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:4
                                  Start time:00:24:15
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\find.exe
                                  Wow64 process (32bit):false
                                  Commandline:find /i /v "md5"
                                  Imagebase:0x7ff767760000
                                  File size:17'920 bytes
                                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:5
                                  Start time:00:24:15
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\find.exe
                                  Wow64 process (32bit):false
                                  Commandline:find /i /v "certutil"
                                  Imagebase:0x7ff767760000
                                  File size:17'920 bytes
                                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:6
                                  Start time:00:24:16
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                  Imagebase:0x7ff690d60000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:00:24:16
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                  Imagebase:0x7ff690d60000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:00:24:16
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:00:24:17
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\timeout.exe
                                  Wow64 process (32bit):false
                                  Commandline:timeout /t 5
                                  Imagebase:0x7ff645040000
                                  File size:32'768 bytes
                                  MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:12
                                  Start time:00:24:17
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\WerFault.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 7044 -s 824
                                  Imagebase:0x7ff6b4850000
                                  File size:570'736 bytes
                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  No disassembly