Edit tour

Windows Analysis Report
SecurityHealthSystray.exe

Overview

General Information

Sample name:SecurityHealthSystray.exe
Analysis ID:1567841
MD5:edd7bd6b0936af19c0858aaf2e12d543
SHA1:2fd507b0eb1d124ba36f2897e9830be9926330c5
SHA256:3af5c9759d95fd6091e665c03406f275fac26afe70db067a785cdc003389efbd
Tags:aptexeKimsukyuser-smica83
Infos:

Detection

KimaLogger
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected KimaLogger
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • SecurityHealthSystray.exe (PID: 6904 cmdline: "C:\Users\user\Desktop\SecurityHealthSystray.exe" MD5: EDD7BD6B0936AF19C0858AAF2E12D543)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecurityHealthSystray.exeJoeSecurity_KimaLoggerYara detected KimaLoggerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: SecurityHealthSystray.exe PID: 6904JoeSecurity_KimaLoggerYara detected KimaLoggerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.SecurityHealthSystray.exe.7ff7237c0000.0.unpackJoeSecurity_KimaLoggerYara detected KimaLoggerJoe Security
        0.0.SecurityHealthSystray.exe.7ff7237c0000.0.unpackJoeSecurity_KimaLoggerYara detected KimaLoggerJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SecurityHealthSystray.exeAvira: detected
          Source: SecurityHealthSystray.exeReversingLabs: Detection: 47%
          Source: SecurityHealthSystray.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: SecurityHealthSystray.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.SecurityHealthSystray.exe.7ff7237c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.SecurityHealthSystray.exe.7ff7237c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 6904, type: MEMORYSTR
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C1700
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C1A00
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C880C
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C2C20
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C943C
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237CBA48
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C11B0
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C51C4
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C7548
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: String function: 00007FF7237C1000 appears 35 times
          Source: SecurityHealthSystray.exeBinary or memory string: OriginalFilename vs SecurityHealthSystray.exe
          Source: classification engineClassification label: mal64.spyw.winEXE@1/1@0/0
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.ini.bakJump to behavior
          Source: SecurityHealthSystray.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: SecurityHealthSystray.exeReversingLabs: Detection: 47%
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeSection loaded: apphelp.dll
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeSection loaded: wininet.dll
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeSection loaded: wldp.dll
          Source: SecurityHealthSystray.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: SecurityHealthSystray.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: SecurityHealthSystray.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: SecurityHealthSystray.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: SecurityHealthSystray.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: SecurityHealthSystray.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: SecurityHealthSystray.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237CA630 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeWindow / User API: threadDelayed 9999
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeWindow / User API: foregroundWindowGot 884
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exe TID: 6968Thread sleep count: 9999 > 30
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237CA630 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237CA630 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237CA630 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C5434 GetProcessHeap,
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C5F68 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: SecurityHealthSystray.exe, 00000000.00000002.4110059902.00000021A7AF2000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: SecurityHealthSystray.exe, 00000000.00000002.4110059902.00000021A7AF2000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: desktop.ini.bakProgram Manager
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C819C cpuid
          Source: C:\Users\user\Desktop\SecurityHealthSystray.exeCode function: 0_2_00007FF7237C1A00 GetTickCount,SHGetSpecialFolderPathA,swprintf,GetLocalTime,swprintf,EnterCriticalSection,LeaveCriticalSection,GetWindowTextA,lstrcpyA,GetWindowTextA,lstrlenA,swprintf,EnterCriticalSection,LeaveCriticalSection,lstrcpyA,GetWindowLongW,GlobalLock,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,EnterCriticalSection,LeaveCriticalSection,lstrlenA,memcpy_s,swprintf,EnterCriticalSection,swprintf,LeaveCriticalSection,lstrcpyA,swprintf,EnterCriticalSection,LeaveCriticalSection,SleepEx,CreateFileA,GetFileSize,CloseHandle,swprintf,DeleteFileA,
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Native API
          1
          DLL Side-Loading
          1
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Virtualization/Sandbox Evasion
          LSASS Memory3
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Process Injection
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Deobfuscate/Decode Files or Information
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials12
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1567841 Sample: SecurityHealthSystray.exe Startdate: 03/12/2024 Architecture: WINDOWS Score: 64 7 Antivirus / Scanner detection for submitted sample 2->7 9 Multi AV Scanner detection for submitted file 2->9 11 Yara detected KimaLogger 2->11 5 SecurityHealthSystray.exe 1 2->5         started        process3

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecurityHealthSystray.exe47%ReversingLabsWin64.Spyware.Klogexe
          SecurityHealthSystray.exe100%AviraHEUR/AGEN.1311191
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1567841
          Start date and time:2024-12-03 22:39:06 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 43s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:SecurityHealthSystray.exe
          Detection:MAL
          Classification:mal64.spyw.winEXE@1/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: SecurityHealthSystray.exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\SecurityHealthSystray.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):252
          Entropy (8bit):2.7608290872874175
          Encrypted:false
          SSDEEP:6:QavElZi8rprS2a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0n:QhlYeprkFFFFFFFFFFFFFFFF0
          MD5:BDA43B8103F3E5C55A805BF8693E5336
          SHA1:B5D53A3EE77652921B440BF04C99408E348061CC
          SHA-256:A97028DBE4173F5736836DC9C6CC6235018093D4CDABE776F2EEBD955DDE4227
          SHA-512:0006087EF909C15C114553EE0242D2472E7DF13989814E65DD3C1F88D1D5569701182A897019A6424A3D603F643A96B74F8E7D4A9122F8A90C93AB9626EBFCDA
          Malicious:false
          Reputation:low
          Preview:......-.-.-.-.-.-. .2.0.2.4./.1.2./.3. .:. .1.6./.3.9. .-.-.-.-.-.-.....[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].[.R.M.+.].
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):4.059224918718081
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecurityHealthSystray.exe
          File size:264'192 bytes
          MD5:edd7bd6b0936af19c0858aaf2e12d543
          SHA1:2fd507b0eb1d124ba36f2897e9830be9926330c5
          SHA256:3af5c9759d95fd6091e665c03406f275fac26afe70db067a785cdc003389efbd
          SHA512:fae5b6da5767539509eecb8c65996bbe396f72f505b238ef2ea79ad2ce9b640a84bd09483728b0cbc4a6b0709bf6a0120ade83e542a516a7d9608bf5d08ca233
          SSDEEP:3072:74NmT9GpamcAShwlumlhA+QX24yAb0OOMSqPqBf:EgTj2lJlOBX2ZyV1
          TLSH:A5443A3B25C8F2BAD016963CC822BAF697796CE9CD24424FEE503E463D329F05D76611
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S............^.`.....^.a.....^.b.............f.........|.......f.......8.......c.....Rich............................PE..d..
          Icon Hash:0fe88caecc6d2b8e
          Entrypoint:0x1400033b4
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66ED69F5 [Fri Sep 20 12:26:29 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:8f1164a9de43785702fb4f059bb0072e
          Instruction
          dec eax
          sub esp, 28h
          call 00007F5FFD27419Ch
          dec eax
          add esp, 28h
          jmp 00007F5FFD2717C7h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          cmp ecx, dword ptr [00014CF9h]
          jne 00007F5FFD271963h
          dec eax
          rol ecx, 10h
          test cx, FFFFh
          jne 00007F5FFD271954h
          rep ret
          dec eax
          ror ecx, 10h
          jmp 00007F5FFD271C32h
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          mov byte ptr [ecx+18h], 00000000h
          dec eax
          test edx, edx
          jne 00007F5FFD2719D8h
          call 00007F5FFD2730AEh
          dec eax
          mov dword ptr [ebx+10h], eax
          dec eax
          mov edx, dword ptr [eax+000000C0h]
          dec eax
          mov dword ptr [ebx], edx
          dec eax
          mov ecx, dword ptr [eax+000000B8h]
          dec eax
          mov dword ptr [ebx+08h], ecx
          dec eax
          cmp edx, dword ptr [00015635h]
          je 00007F5FFD271968h
          mov eax, dword ptr [eax+000000C8h]
          test dword ptr [00015793h], eax
          jne 00007F5FFD27195Ah
          call 00007F5FFD274B4Dh
          dec eax
          mov dword ptr [ebx], eax
          dec eax
          mov eax, dword ptr [00014E9Eh]
          dec eax
          cmp dword ptr [ebx+08h], eax
          je 00007F5FFD27196Dh
          dec eax
          mov eax, dword ptr [ebx+10h]
          mov ecx, dword ptr [eax+000000C8h]
          test dword ptr [0001576Ch], ecx
          jne 00007F5FFD27195Bh
          call 00007F5FFD274F1Eh
          dec eax
          mov dword ptr [ebx+08h], eax
          Programming Language:
          • [RES] VS2012 build 50727
          • [LNK] VS2012 build 50727
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x174900x64.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x15c20.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5f0000xd38.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000x760.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x15fa00x70.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x100000x348.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xe77f0xe8003d96659b004b303097d5a9f73467fe13False0.5720804148706896data6.371487214073958IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x100000x7f800x8000d04410aea3e151ad0e720e38abf3ce0dFalse0.357177734375data4.833710150136232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x180000x463900x11c0083d8b240398e0d88306a0b08a8993babFalse0.02970950704225352data0.5080376891405495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x5f0000xd380xe00daee39f158a730dea5885a598a6680f8False0.46763392857142855data4.700701060805498IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x600000x15c200x15e00a95ff6923e8f9741a0b33e86ea11cb71False0.09213169642857143data2.2190492766512606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x760000x129a0x14008d374c9c57dced6023d50d06161d1740False0.207421875data2.7477630625611127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x604f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024KoreanNorth Korea0.23049645390070922
          RT_ICON0x604f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024KoreanSouth Korea0.23049645390070922
          RT_ICON0x609580x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600KoreanNorth Korea0.19476744186046513
          RT_ICON0x609580x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600KoreanSouth Korea0.19476744186046513
          RT_ICON0x610100x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304KoreanNorth Korea0.14672131147540984
          RT_ICON0x610100x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304KoreanSouth Korea0.14672131147540984
          RT_ICON0x619980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096KoreanNorth Korea0.1198405253283302
          RT_ICON0x619980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096KoreanSouth Korea0.1198405253283302
          RT_ICON0x62a400x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400KoreanNorth Korea0.09437869822485206
          RT_ICON0x62a400x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400KoreanSouth Korea0.09437869822485206
          RT_ICON0x644a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216KoreanNorth Korea0.08246887966804979
          RT_ICON0x644a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216KoreanSouth Korea0.08246887966804979
          RT_ICON0x66a500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384KoreanNorth Korea0.06170288143599433
          RT_ICON0x66a500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384KoreanSouth Korea0.06170288143599433
          RT_ICON0x6ace00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024KoreanNorth Korea0.23049645390070922
          RT_ICON0x6ace00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024KoreanSouth Korea0.23049645390070922
          RT_ICON0x6b1480x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600KoreanNorth Korea0.19476744186046513
          RT_ICON0x6b1480x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600KoreanSouth Korea0.19476744186046513
          RT_ICON0x6b8000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304KoreanNorth Korea0.14672131147540984
          RT_ICON0x6b8000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304KoreanSouth Korea0.14672131147540984
          RT_ICON0x6c1880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096KoreanNorth Korea0.1198405253283302
          RT_ICON0x6c1880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096KoreanSouth Korea0.1198405253283302
          RT_ICON0x6d2300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400KoreanNorth Korea0.09437869822485206
          RT_ICON0x6d2300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400KoreanSouth Korea0.09437869822485206
          RT_ICON0x6ec980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216KoreanNorth Korea0.08246887966804979
          RT_ICON0x6ec980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216KoreanSouth Korea0.08246887966804979
          RT_ICON0x712400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384KoreanNorth Korea0.06170288143599433
          RT_ICON0x712400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384KoreanSouth Korea0.06170288143599433
          RT_MENU0x754d00x4adataEnglishUnited States0.8648648648648649
          RT_DIALOG0x755300x134dataEnglishUnited States0.5844155844155844
          RT_STRING0x75a600x3cdataEnglishUnited States0.6166666666666667
          RT_ACCELERATOR0x755200x10dataEnglishUnited States1.25
          RT_GROUP_ICON0x6ac780x68dataKoreanNorth Korea0.7596153846153846
          RT_GROUP_ICON0x6ac780x68dataKoreanSouth Korea0.7596153846153846
          RT_GROUP_ICON0x754680x68dataKoreanNorth Korea0.7884615384615384
          RT_GROUP_ICON0x754680x68dataKoreanSouth Korea0.7884615384615384
          RT_VERSION0x756680x3f4dataEnglishUnited States0.43873517786561267
          RT_MANIFEST0x75aa00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllExitProcess, Sleep, GetProcAddress, LoadLibraryA, GetLastError, MultiByteToWideChar, EnterCriticalSection, LeaveCriticalSection, CloseHandle, GetFileSize, lstrlenA, GetTickCount, CreateFileA, SetFilePointer, WriteFile, GetLocalTime, lstrcpyA, GlobalLock, lstrcatA, DeleteFileA, InitializeCriticalSection, OpenEventW, DeleteCriticalSection, OutputDebugStringW, WideCharToMultiByte, CreateFileW, ReadFile, WriteConsoleW, SetStdHandle, HeapReAlloc, SetFilePointerEx, GetConsoleMode, GetConsoleCP, LCMapStringEx, GetStringTypeW, LoadLibraryW, LoadLibraryExW, HeapSize, RaiseException, RtlPcToFileHeader, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, RtlUnwindEx, GetCommandLineW, HeapFree, IsDebuggerPresent, IsProcessorFeaturePresent, EncodePointer, DecodePointer, HeapAlloc, GetSystemTimeAsFileTime, SetLastError, GetCurrentThreadId, GetModuleHandleExW, GetStdHandle, GetModuleFileNameW, GetProcessHeap, GetFileType, InitializeCriticalSectionAndSpinCount, InitOnceExecuteOnce, GetStartupInfoW, QueryPerformanceCounter, GetTickCount64, GetEnvironmentStringsW, FreeEnvironmentStringsW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetCurrentProcess, TerminateProcess, GetModuleHandleW, FlushFileBuffers
          USER32.dllLoadIconW, GetWindowLongW, RegisterClassExW, GetWindowTextA, LoadCursorW, LoadStringW, EndDialog, PostQuitMessage, EndPaint, BeginPaint, DefWindowProcW, DestroyWindow, DialogBoxParamW
          SHELL32.dllSHGetSpecialFolderPathA
          WININET.dllInternetOpenW, InternetConnectW, HttpOpenRequestW, HttpSendRequestExW, InternetWriteFile, HttpEndRequestA, InternetCloseHandle
          Language of compilation systemCountry where language is spokenMap
          KoreanNorth Korea
          KoreanSouth Korea
          EnglishUnited States
          No network behavior found
          No statistics
          Target ID:0
          Start time:16:39:53
          Start date:03/12/2024
          Path:C:\Users\user\Desktop\SecurityHealthSystray.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\SecurityHealthSystray.exe"
          Imagebase:0x7ff7237c0000
          File size:264'192 bytes
          MD5 hash:EDD7BD6B0936AF19C0858AAF2E12D543
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          No disassembly