Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
Analysis ID:1551256
MD5:241128850eff9fb7a3a846817bcc0e1e
SHA1:57d43aad8bd6144620b6398b3743e8fa03c6cfb2
SHA256:b0194498853f8ff587edaff8371ee221baec4c358b16db5316f3e40e786e0813
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Entry point lies outside standard sections
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-07T16:29:42.260991+010020229301A Network Trojan was detected20.109.210.53443192.168.2.749728TCP
2024-11-07T16:30:19.771528+010020229301A Network Trojan was detected20.109.210.53443192.168.2.749893TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_818a0c3b-1
Source: unknownHTTPS traffic detected: 104.21.1.82:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.7:49728
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.7:49893
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.tzproject.com
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://.css
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://.jpg
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://html4/loose.dtd
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLThis
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.tzproject.com/api/tzx/security/seed_tzx_v3
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.tzproject.com/api/tzx/security/seed_tzx_v3qr0U.
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://fontawesome.com
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/JulietaUla/Montserrat)
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&r
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&s
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&v
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLThis
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 104.21.1.82:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1293554086.0000000140E39000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametaskhostw.exe< vs SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeBinary or memory string: OriginalFilenametaskhostw.exe< vs SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
Source: classification engineClassification label: mal80.evad.winEXE@1/0@1/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeReversingLabs: Detection: 63%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSection loaded: wintypes.dllJump to behavior
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic file information: File size 6927872 > 1048576
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: Raw size of .sv1 is bigger than: 0x100000 < 0x69ac00
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .sv1
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: section name: _RDATA
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: section name: .sv0
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeStatic PE information: section name: .sv1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeMemory written: PID: 1796 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeMemory written: PID: 1796 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeMemory written: PID: 1796 base: 7FFB2D04000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeMemory written: PID: 1796 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeRDTSC instruction interceptor: First address: 140D44609 second address: 140CCFD9E instructions: 0x00000000 rdtsc 0x00000002 pop ebp 0x00000003 dec eax 0x00000004 cwde 0x00000005 pop ecx 0x00000006 inc sp 0x00000008 btr edx, eax 0x0000000b inc ecx 0x0000000c movsx ebx, sp 0x0000000f inc ecx 0x00000010 pop esp 0x00000011 test bx, 1174h 0x00000016 or ebx, 4A6113B3h 0x0000001c popfd 0x0000001d jmp 00007FB5F4B42025h 0x00000022 pop edi 0x00000023 dec eax 0x00000024 not esi 0x00000026 pop edx 0x00000027 cwde 0x00000028 pop esi 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c movsx ecx, ax 0x0000002f inc esp 0x00000030 movzx ecx, si 0x00000033 pop ebx 0x00000034 inc ecx 0x00000035 pop edx 0x00000036 inc esp 0x00000037 movzx ecx, cx 0x0000003a dec ebp 0x0000003b cmovns ecx, ecx 0x0000003e inc ecx 0x0000003f pop esi 0x00000040 mov al, B5h 0x00000042 inc bp 0x00000044 movzx ecx, ch 0x00000047 cbw 0x00000049 pop eax 0x0000004a inc sp 0x0000004c movsx ecx, dh 0x0000004f inc cx 0x00000051 bswap ecx 0x00000053 inc sp 0x00000055 movzx ecx, dl 0x00000058 inc ecx 0x00000059 pop ecx 0x0000005a jmp 00007FB5F4B72FDFh 0x0000005f ret 0x00000060 popfd 0x00000061 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeRDTSC instruction interceptor: First address: 1406EC327 second address: 1406EC331 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edx 0x00000004 dec eax 0x00000005 movsx esi, cx 0x00000008 inc ecx 0x00000009 pop esp 0x0000000a rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSpecial instruction interceptor: First address: 140CCFD9E instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1290817859.0000000000603000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1291417050.0000000000603000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exeNtProtectVirtualMemory: Indirect: 0x140794474Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
411
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe63%ReversingLabsWin64.Trojan.Acll
SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.tzproject.com/api/tzx/security/seed_tzx_v30%Avira URL Cloudsafe
https://api.tzproject.com/api/tzx/security/seed_tzx_v3qr0U.0%Avira URL Cloudsafe
http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.tzproject.com
104.21.1.82
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
      high
      https://fontawesome.comSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
        high
        http://html4/loose.dtdSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
          high
          https://api.tzproject.com/api/tzx/security/seed_tzx_v3qr0U.SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://scripts.sil.org/OFLThisSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
            high
            http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/JulietaSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://github.com/itfoundry/Poppins)&&&&vSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
              high
              https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
                high
                https://github.com/JulietaUla/Montserrat)SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                  high
                  https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinadSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                    high
                    https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
                      high
                      http://.cssSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
                        high
                        https://fontawesome.comhttps://fontawesome.comFontSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                          high
                          https://github.com/itfoundry/Poppins)&&&&sSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                            high
                            http://.jpgSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292271189.0000000140272000.00000002.00000001.01000000.00000003.sdmpfalse
                              high
                              http://scripts.sil.org/OFLThisSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                                high
                                https://github.com/itfoundry/Poppins)&&&&rSecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000002.1292335412.000000014031A000.00000004.00000001.01000000.00000003.sdmpfalse
                                  high
                                  https://api.tzproject.com/api/tzx/security/seed_tzx_v3SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe, 00000000.00000003.1262008824.000000000061F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.21.1.82
                                  api.tzproject.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1551256
                                  Start date and time:2024-11-07 16:28:32 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 27s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:13
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
                                  Detection:MAL
                                  Classification:mal80.evad.winEXE@1/0@1/2
                                  EGA Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • VT rate limit hit for: SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  104.21.1.82Poczta Polska Informacje o transakcjach2021.exeGet hashmaliciousFormBookBrowse
                                  • www.paulautoservices.com/ftgq/?IHS=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9yqHJXbOMuxkPc07g==&-Z0xlN=0nK83D
                                  Specifikacije ponude proizvoda Mesutex 2021 doc.exeGet hashmaliciousFormBookBrowse
                                  • www.paulautoservices.com/ftgq/?pP-=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9yqHJXbOMuxkPc07g==&1bS=WXotCFzhm
                                  Documento de transfer#U00eancia banc#U00e1ria _2021doc.exeGet hashmaliciousFormBookBrowse
                                  • www.paulautoservices.com/ftgq/?D8Opc=zh38e200rf_ta4RP&mPntH4=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9+TLo7bZKyg
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  api.tzproject.comSecuriteInfo.com.Win64.Evo-gen.22223.2615.exeGet hashmaliciousUnknownBrowse
                                  • 172.67.128.232
                                  SecuriteInfo.com.Win64.Evo-gen.14845.19278.exeGet hashmaliciousUnknownBrowse
                                  • 172.67.128.232
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSMulti Graphics Inc CustomerVendor Form.pdfGet hashmaliciousHTMLPhisherBrowse
                                  • 188.114.96.3
                                  fz9TDYlgmf.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 172.67.164.216
                                  https://gofile.me/7wODs/99hfK37gzGet hashmaliciousAnnabelleBrowse
                                  • 1.1.1.1
                                  DnpIU3I6HL.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 104.21.10.249
                                  X7sazE1mXC.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 188.114.96.3
                                  gMiPMyl5rr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 188.114.97.3
                                  rYX7rFIO0x.exeGet hashmaliciousMassLogger RATBrowse
                                  • 188.114.97.3
                                  bsjypaJQbp.exeGet hashmaliciousMassLogger RATBrowse
                                  • 188.114.96.3
                                  RO2Y11yOJ7.exeGet hashmaliciousFormBookBrowse
                                  • 172.67.202.10
                                  W1D5wGM20v.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 188.114.96.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  bd0bf25947d4a37404f0424edf4db9adSecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.Trojan.Siggen29.64132.8972.20040.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  app64.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.FileRepMalware.12585.5759.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  sadfwqefrqw3f.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.FileRepMalware.12025.7543.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  SecuriteInfo.com.Heuristic.HEUR.AGEN.1319832.32667.20795.exeGet hashmaliciousUnknownBrowse
                                  • 104.21.1.82
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Entropy (8bit):7.928878574396812
                                  TrID:
                                  • Win64 Executable GUI (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
                                  File size:6'927'872 bytes
                                  MD5:241128850eff9fb7a3a846817bcc0e1e
                                  SHA1:57d43aad8bd6144620b6398b3743e8fa03c6cfb2
                                  SHA256:b0194498853f8ff587edaff8371ee221baec4c358b16db5316f3e40e786e0813
                                  SHA512:b6edc845394129ea168b019e4f1f0085943ee888dc542ea1e9691fd62ba0d6a66e2e2ef3ac772e744777cf67690c6cf35c5a95ba975df70e25d1307336cf763e
                                  SSDEEP:196608:oNBDPfm6KFyHh8OzKT6ArPsy5dRKWZLpgVcEUETGq:oNFmCh896ArPsGFZLeV8ET
                                  TLSH:0B66237E614D2318C09984384823BE86B3B7122D8AFC955DF1FBBEC4779E814D94AF46
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........#....'..'..~!.....o..........@.......................................... ................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x140b30c6f
                                  Entrypoint Section:.sv1
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x66B4B6F4 [Thu Aug 8 12:15:48 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:f87aeece7611f33b2143f79a80eb3bca
                                  Instruction
                                  push B64EF789h
                                  call 00007FB5F4FDFE47h
                                  or dl, dl
                                  sbb dl, byte ptr [edi-3541EB2Ch]
                                  imul ebx, dword ptr [esi+3Fh], E5h
                                  and al, DEh
                                  insb
                                  jmp dword ptr [edi-47h]
                                  add ebx, dword ptr [ebp-37936A13h]
                                  pop esp
                                  inc ebp
                                  adc al, 3Fh
                                  cdq
                                  jno 00007FB5F4DCB675h
                                  pushad
                                  push edx
                                  fild word ptr [eax]
                                  push edi
                                  mov ecx, 249B6BF8h
                                  out 24h, al
                                  sal byte ptr [ebx+79h], 1
                                  dec esp
                                  call far esi
                                  retf 3655h
                                  mov ch, 2Eh
                                  jmp 00007FB66B3202FEh
                                  and eax, 9655E8B8h
                                  xchg eax, ebx
                                  pop edi
                                  add ebp, dword ptr [ecx+7A3C2C5Ah]
                                  cmp dword ptr [edi+186A06D6h], ecx
                                  hlt
                                  pop ss
                                  scasb
                                  jmp 00007FB5F4DCB711h
                                  std
                                  cmp cl, byte ptr [eax]
                                  lahf
                                  cmpsb
                                  pop ebx
                                  dec ebx
                                  mov esp, D0DFA446h
                                  iretd
                                  sbb dword ptr [esp+edi*2+6FB39238h], ebx
                                  dec edx
                                  cmp dword ptr [esi-5D8D0A37h], A0D5B382h
                                  and eax, E016BBC1h
                                  sar esi, cl
                                  mov ebx, BF981486h
                                  xchg eax, esi
                                  lahf
                                  lodsd
                                  fstp tbyte ptr [edx]
                                  inc esp
                                  push ds
                                  jmp far 38D9h : 81F798B4h
                                  out BBh, al
                                  push ebx
                                  dec edx
                                  add eax, edi
                                  salc
                                  xor eax, 447CA65Eh
                                  jo 00007FB5F4DCB629h
                                  std
                                  add dword ptr [eax+00h], ecx
                                  std
                                  mov byte ptr [D373BBE0h], al
                                  sbb dword ptr [eax+4Bh], ecx
                                  mov ah, 73h
                                  fidivr dword ptr [ebx-444DF32Ah]
                                  dec edi
                                  outsd
                                  jno 00007FB5F4DCB667h
                                  jne 00007FB5F4DCB68Bh
                                  fisttp dword ptr [0EB927E1h]
                                  and al, 94h
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0xa831d00xca4.sv1
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xae0c800x168.sv1
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe390000x4a0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe1ab700x1e054.sv1
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0xa884a80x58.sv1
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe1aa300x140.sv1
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x7b40000x170.sv1
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x270f540x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x2720000xa7d1a0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x31a0000x1517740x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x46c0000x1b2e80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  _RDATA0x4880000x1f40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .sv00x4890000x314b2a0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .sv10x79e0000x69abc40x69ac00cec23a4d718ba56617156b4454b3d44eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xe390000x4a00x60009a4bd46d83e97d8866ea2002b644c05False0.3776041666666667data3.52660659653703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0xe390a00x278dataFrenchFrance0.47468354430379744
                                  RT_MANIFEST0xe393180x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                  DLLImport
                                  d3d11.dllD3D11CreateDevice
                                  ntdll.dllRtlCaptureContext
                                  WS2_32.dllgetsockopt
                                  CRYPT32.dllCertFreeCertificateChain
                                  ADVAPI32.dllCryptHashData
                                  KERNEL32.dllExitThread
                                  USER32.dllGetClipboardData
                                  ole32.dllCoSetProxyBlanket
                                  OLEAUT32.dllSysAllocString
                                  IMM32.dllImmSetCandidateWindow
                                  D3DCOMPILER_47.dllD3DCompile
                                  bcrypt.dllBCryptGenRandom
                                  WTSAPI32.dllWTSSendMessageW
                                  KERNEL32.dllGetSystemTimeAsFileTime
                                  USER32.dllGetUserObjectInformationW
                                  KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                  USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                  NameOrdinalAddress
                                  AmdPowerXpressRequestHighPerformance10x14031cdb0
                                  NvOptimusEnablement20x14031cdac
                                  Language of compilation systemCountry where language is spokenMap
                                  FrenchFrance
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-07T16:29:42.260991+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.749728TCP
                                  2024-11-07T16:30:19.771528+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.749893TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 7, 2024 16:29:26.521667957 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:26.521728992 CET44349701104.21.1.82192.168.2.7
                                  Nov 7, 2024 16:29:26.521804094 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:26.603410006 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:26.603456020 CET44349701104.21.1.82192.168.2.7
                                  Nov 7, 2024 16:29:27.262468100 CET44349701104.21.1.82192.168.2.7
                                  Nov 7, 2024 16:29:27.262619972 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:28.128084898 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:28.128113985 CET44349701104.21.1.82192.168.2.7
                                  Nov 7, 2024 16:29:28.128241062 CET49701443192.168.2.7104.21.1.82
                                  Nov 7, 2024 16:29:28.128396034 CET44349701104.21.1.82192.168.2.7
                                  Nov 7, 2024 16:29:28.128443956 CET49701443192.168.2.7104.21.1.82
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 7, 2024 16:29:26.415712118 CET6138453192.168.2.71.1.1.1
                                  Nov 7, 2024 16:29:26.431502104 CET53613841.1.1.1192.168.2.7
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 7, 2024 16:29:26.415712118 CET192.168.2.71.1.1.10x4654Standard query (0)api.tzproject.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 7, 2024 16:29:26.431502104 CET1.1.1.1192.168.2.70x4654No error (0)api.tzproject.com104.21.1.82A (IP address)IN (0x0001)false
                                  Nov 7, 2024 16:29:26.431502104 CET1.1.1.1192.168.2.70x4654No error (0)api.tzproject.com172.67.128.232A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:10:29:24
                                  Start date:07/11/2024
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6610.27408.exe"
                                  Imagebase:0x140000000
                                  File size:6'927'872 bytes
                                  MD5 hash:241128850EFF9FB7A3A846817BCC0E1E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  No disassembly