Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tasktow.exe

Overview

General Information

Sample name:tasktow.exe
Analysis ID:1577913
MD5:aa59363d3f6d6accc7c992edfcd62ccf
SHA1:4de0f90074d21a8378b7eec791f919a473175cb1
SHA256:a0008001318cfb89811276f09e2f801babb1c9ed2e2be4f8c3f3ced8665bf702
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Entry point lies outside standard sections
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

  • System is w11x64_office
  • tasktow.exe (PID: 5684 cmdline: "C:\Users\user\Desktop\tasktow.exe" MD5: AA59363D3F6D6ACCC7C992EDFCD62CCF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: tasktow.exeAvira: detected
Source: tasktow.exeReversingLabs: Detection: 58%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: tasktow.exeJoe Sandbox ML: detected
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_6d33feb6-d
Source: tasktow.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: global trafficDNS traffic detected: DNS query: srtb.msn.com
Source: global trafficDNS traffic detected: DNS query: tse1.mm.bing.net
Source: global trafficDNS traffic detected: DNS query: ecn.dev.virtualearth.net
Source: global trafficDNS traffic detected: DNS query: api.tzproject.com
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://.css
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://.jpg
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://html4/loose.dtd
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLThis
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: tasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://fontawesome.com
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/JulietaUla/Montserrat)
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&r
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&s
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&v
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLThis
Source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443

System Summary

barindex
Source: tasktow.exeStatic PE information: .vmp0 and .vmp1 section names
Source: tasktow.exe, 00000001.00000000.11740974983.00007FF6F6EFF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametaskhostw.exe< vs tasktow.exe
Source: tasktow.exeBinary or memory string: OriginalFilenametaskhostw.exe< vs tasktow.exe
Source: classification engineClassification label: mal92.evad.winEXE@1/0@5/2
Source: C:\Users\user\Desktop\tasktow.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: tasktow.exeReversingLabs: Detection: 58%
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: directxdatabasehelper.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeSection loaded: wintypes.dllJump to behavior
Source: tasktow.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: tasktow.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: tasktow.exeStatic file information: File size 7520768 > 1048576
Source: tasktow.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x72b600
Source: tasktow.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb** source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Projets\TZX\x64\Release\Module.pdb source: tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: tasktow.exeStatic PE information: section name: .vmp0
Source: tasktow.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\tasktow.exeMemory written: PID: 5684 base: 7FFD76C90008 value: E9 1B 0B E8 FF Jump to behavior
Source: C:\Users\user\Desktop\tasktow.exeMemory written: PID: 5684 base: 7FFD76B10B20 value: E9 F0 F4 17 00 Jump to behavior
Source: C:\Users\user\Desktop\tasktow.exeMemory written: PID: 5684 base: 7FFD76CA000D value: E9 5B 72 EA FF Jump to behavior
Source: C:\Users\user\Desktop\tasktow.exeMemory written: PID: 5684 base: 7FFD76B47260 value: E9 BA 8D 15 00 Jump to behavior
Source: C:\Users\user\Desktop\tasktow.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\tasktow.exeRDTSC instruction interceptor: First address: 7FF6F6E6B52F second address: 7FF6F6E6B538 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movzx ebx, di 0x00000006 lahf 0x00000007 inc ecx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\tasktow.exeRDTSC instruction interceptor: First address: 7FF6F66E6D6F second address: 7FF6F67BDDEB instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 cmp dh, bh 0x00000005 pop ecx 0x00000006 dec eax 0x00000007 sar edi, cl 0x00000009 inc ecx 0x0000000a pop eax 0x0000000b inc esp 0x0000000c movzx esp, sp 0x0000000f pop edi 0x00000010 cmc 0x00000011 inc ecx 0x00000012 setnb dl 0x00000015 inc cx 0x00000017 sal edx, cl 0x00000019 popfd 0x0000001a inc ecx 0x0000001b mov ch, bh 0x0000001d inc ecx 0x0000001e pop esi 0x0000001f inc cx 0x00000021 movzx esi, bh 0x00000024 cwd 0x00000026 jmp 00007F0D51220529h 0x0000002b inc ecx 0x0000002c pop edx 0x0000002d inc ecx 0x0000002e setne ah 0x00000031 cwd 0x00000033 cwde 0x00000034 inc ecx 0x00000035 pop ebx 0x00000036 inc ecx 0x00000037 pop edi 0x00000038 rdtsc
Source: C:\Users\user\Desktop\tasktow.exeRDTSC instruction interceptor: First address: 7FF6F679314E second address: 7FF6F6793157 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movzx ebx, di 0x00000006 lahf 0x00000007 inc ecx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\tasktow.exeRDTSC instruction interceptor: First address: 7FF6F66C2FB5 second address: 7FF6F66C2FD0 instructions: 0x00000000 rdtsc 0x00000002 inc esp 0x00000003 movsx edx, ax 0x00000006 inc ecx 0x00000007 pop edx 0x00000008 cbw 0x0000000a dec eax 0x0000000b cwde 0x0000000c inc ecx 0x0000000d pop ebp 0x0000000e inc eax 0x0000000f mov dh, A5h 0x00000011 pop ebx 0x00000012 inc ecx 0x00000013 not bh 0x00000015 seto cl 0x00000018 dec eax 0x00000019 cwde 0x0000001a pop ecx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\tasktow.exeRDTSC instruction interceptor: First address: 7FF6F66C2FD0 second address: 7FF6F66C2FE0 instructions: 0x00000000 rdtsc 0x00000002 cdq 0x00000003 inc ecx 0x00000004 mov dh, ch 0x00000006 inc ecx 0x00000007 pop esi 0x00000008 dec eax 0x00000009 cwde 0x0000000a dec ebp 0x0000000b movzx edi, bp 0x0000000e inc ecx 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\tasktow.exeSpecial instruction interceptor: First address: 7FF6F6D92E0C instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: tasktow.exe, 00000001.00000002.11806825517.000001C7F3268000.00000004.00000020.00020000.00000000.sdmp, tasktow.exe, 00000001.00000003.11805845558.000001C7F3268000.00000004.00000020.00020000.00000000.sdmp, tasktow.exe, 00000001.00000003.11806109229.000001C7F3268000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\tasktow.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\tasktow.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\tasktow.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\tasktow.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\tasktow.exeNtProtectVirtualMemory: Indirect: 0x7FF6F67C8CB2Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
411
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
tasktow.exe58%ReversingLabsWin64.Trojan.Generic
tasktow.exe100%AviraHEUR/AGEN.1313195
tasktow.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://fontawesome.comhttps://fontawesome.comFont0%Avira URL Cloudsafe
http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julieta0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
chrome.cloudflare-dns.com
172.64.41.3
truefalse
    high
    api.tzproject.com
    104.21.1.82
    truefalse
      unknown
      ax-0001.ax-msedge.net
      150.171.27.10
      truefalse
        high
        srtb.msn.com
        unknown
        unknownfalse
          high
          tse1.mm.bing.net
          unknown
          unknownfalse
            high
            ecn.dev.virtualearth.net
            unknown
            unknownfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://curl.se/docs/hsts.htmltasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                high
                https://fontawesome.comtasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                  high
                  http://html4/loose.dtdtasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                    high
                    https://scripts.sil.org/OFLThistasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                      high
                      http://scripts.sil.org/OFLhttp://www.zkysky.com.ar/Julietatasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/itfoundry/Poppins)&&&&vtasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                        high
                        https://curl.se/docs/http-cookies.htmltasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                          high
                          https://github.com/JulietaUla/Montserrat)tasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                            high
                            https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinadtasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                              high
                              https://curl.se/docs/alt-svc.htmltasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                                high
                                http://.csstasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                                  high
                                  https://fontawesome.comhttps://fontawesome.comFonttasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/itfoundry/Poppins)&&&&stasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                                    high
                                    http://.jpgtasktow.exe, 00000001.00000002.11807623592.00007FF6F624A000.00000002.00000001.01000000.00000003.sdmpfalse
                                      high
                                      http://scripts.sil.org/OFLThistasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                                        high
                                        https://github.com/itfoundry/Poppins)&&&&rtasktow.exe, 00000001.00000002.11807689672.00007FF6F62F3000.00000004.00000001.01000000.00000003.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.21.1.82
                                          api.tzproject.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          IP
                                          127.0.0.1
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1577913
                                          Start date and time:2024-12-18 21:14:31 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 35s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                                          Number of analysed new started processes analysed:41
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:tasktow.exe
                                          Detection:MAL
                                          Classification:mal92.evad.winEXE@1/0@5/2
                                          EGA Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 204.79.197.203, 2.18.80.154, 23.44.203.91, 20.74.47.205, 2.22.157.166, 23.44.203.82, 52.149.20.212, 20.223.36.55, 40.126.53.11
                                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ssl2.tiles.virtualearth.net.edgekey.net, fs.microsoft.com, slscr.update.microsoft.com, fd.api.iris.microsoft.com, a-0003.a-msedge.net, ctldl.windowsupdate.com, www-msn-com.a-0003.a-msedge.net, aefd.nelreports.net, x1.c.lencr.org, login.live.com, mm-mm.bing.net.trafficmanager.net, th.bing.com, res.public.onecdn.static.microsoft, e4113.dscd.akamaiedge.net, c.pki.goog
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • VT rate limit hit for: tasktow.exe
                                          No simulations
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          104.21.1.82Poczta Polska Informacje o transakcjach2021.exeGet hashmaliciousFormBookBrowse
                                          • www.paulautoservices.com/ftgq/?IHS=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9yqHJXbOMuxkPc07g==&-Z0xlN=0nK83D
                                          Specifikacije ponude proizvoda Mesutex 2021 doc.exeGet hashmaliciousFormBookBrowse
                                          • www.paulautoservices.com/ftgq/?pP-=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9yqHJXbOMuxkPc07g==&1bS=WXotCFzhm
                                          Documento de transfer#U00eancia banc#U00e1ria _2021doc.exeGet hashmaliciousFormBookBrowse
                                          • www.paulautoservices.com/ftgq/?D8Opc=zh38e200rf_ta4RP&mPntH4=oliY4AQlp4wSV/dl1zf4/rMvcvqkrRX4dyxfuzd3rm8KcPOCBkNVIWGxU9+TLo7bZKyg
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ax-0001.ax-msedge.netR4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
                                          • 150.171.27.10
                                          bGcxY1mXHe.exeGet hashmaliciousUnknownBrowse
                                          • 150.171.28.10
                                          download.ps1Get hashmaliciousUnknownBrowse
                                          • 150.171.27.10
                                          PyIsvSahWy.exeGet hashmaliciousUnknownBrowse
                                          • 150.171.27.10
                                          bandwidth_monitor.exeGet hashmaliciousUnknownBrowse
                                          • 150.171.27.10
                                          Ball - Temp.data for GCMs.docGet hashmaliciousHTMLPhisherBrowse
                                          • 150.171.27.10
                                          https://launch.app/plainsartGet hashmaliciousHTMLPhisherBrowse
                                          • 150.171.27.10
                                          random.exe.2.exeGet hashmaliciousLummaCBrowse
                                          • 150.171.27.10
                                          stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 150.171.28.10
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 150.171.27.10
                                          api.tzproject.comSecuriteInfo.com.Win64.Evo-gen.6610.27408.exeGet hashmaliciousUnknownBrowse
                                          • 104.21.1.82
                                          SecuriteInfo.com.Win64.Evo-gen.22223.2615.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.128.232
                                          SecuriteInfo.com.Win64.Evo-gen.14845.19278.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.128.232
                                          chrome.cloudflare-dns.comQIo3SytSZA.exeGet hashmaliciousVidarBrowse
                                          • 162.159.61.3
                                          R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
                                          • 172.64.41.3
                                          g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                          • 162.159.61.3
                                          H3G7Xu6gih.exeGet hashmaliciousRHADAMANTHYSBrowse
                                          • 162.159.61.3
                                          HI6VIJERUn.exeGet hashmaliciousRHADAMANTHYSBrowse
                                          • 162.159.61.3
                                          ko.ps1.2.ps1Get hashmaliciousUnknownBrowse
                                          • 162.159.61.3
                                          NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
                                          • 172.64.41.3
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 162.159.61.3
                                          EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                                          • 162.159.61.3
                                          YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                          • 172.64.41.3
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSTUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.24.223
                                          QIo3SytSZA.exeGet hashmaliciousVidarBrowse
                                          • 172.64.41.3
                                          Payment_Failure_Notice_Office365_sdf_[13019].htmlGet hashmaliciousHTMLPhisherBrowse
                                          • 104.17.25.14
                                          R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
                                          • 172.64.41.3
                                          D2Cw8gWOXj.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                          • 172.67.179.109
                                          https://vCyA.warmickmak.ru/PrEvJj/Get hashmaliciousUnknownBrowse
                                          • 104.17.25.14
                                          sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.220.223
                                          k6A01XaeEn.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.21.99
                                          https://52kz793.afratradingagency.com/Get hashmaliciousHTMLPhisherBrowse
                                          • 104.18.95.41
                                          https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                          • 104.26.6.189
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Entropy (8bit):7.93634655810745
                                          TrID:
                                          • Win64 Executable GUI (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:tasktow.exe
                                          File size:7'520'768 bytes
                                          MD5:aa59363d3f6d6accc7c992edfcd62ccf
                                          SHA1:4de0f90074d21a8378b7eec791f919a473175cb1
                                          SHA256:a0008001318cfb89811276f09e2f801babb1c9ed2e2be4f8c3f3ced8665bf702
                                          SHA512:2eae0f1f9f32e6f41697060cc3de40074307b6ec64ce10db2737e983286687ff610ea1dbc3b0014bd4e562f1942dd51f033c85db0858dbcd804a3197c6bdd79c
                                          SSDEEP:196608:nKy39bx+bk2nDiYksGdwJp8N3kbLuad0pZ5x:nrtbxp2nDiYEdPN3kvuada
                                          TLSH:3E76235E5154336CC01AC0389433AD4772FA150B4EE9D7EDB1EFFAC06B9A861C986F4A
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...E_:g.........."....)..(...!................@..........................................`................................
                                          Icon Hash:2086969696969600
                                          Entrypoint:0x140ab9adf
                                          Entrypoint Section:.vmp1
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x673A5F45 [Sun Nov 17 21:25:25 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:f87aeece7611f33b2143f79a80eb3bca
                                          Instruction
                                          push 4FDCABA7h
                                          call 00007F0D510E20D4h
                                          mov ch, 96h
                                          retf 5F50h
                                          xor eax, DE3247F2h
                                          add dh, byte ptr [esi+425444FEh]
                                          jp 00007F0D50C7FE05h
                                          salc
                                          add eax, A7F3357Ch
                                          fistp dword ptr [ebx+1CD23328h]
                                          cmp bl, al
                                          or al, EEh
                                          mov seg?, word ptr [esi]
                                          salc
                                          or al, 54h
                                          jo 00007F0D50C7FDFEh
                                          iretd
                                          int3
                                          and dword ptr [ebx+55F31958h], edx
                                          stc
                                          push es
                                          cmp byte ptr [ebx], dh
                                          test byte ptr [eax-26332026h], al
                                          loop 00007F0D50C7FE3Fh
                                          sub ebx, esi
                                          mov word ptr [E2333200h], seg?
                                          bound esp, dword ptr [esp]
                                          fmul dword ptr [eax+esi*2]
                                          mov bl, 67h
                                          aad 0Ch
                                          cmc
                                          and eax, 20CCC880h
                                          cli
                                          and dword ptr [eax], edi
                                          or al, 60h
                                          sub eax, 8EB2F336h
                                          xchg dword ptr [edi], ebp
                                          xor edi, ebx
                                          and eax, 1B0CF943h
                                          call far fword ptr [1EA2CCD8h]
                                          mov cl, 37h
                                          xor al, A0h
                                          cmp bl, FFFFFFD2h
                                          arpl word ptr [edi], bp
                                          cli
                                          mov dh, 85h
                                          xchg eax, esp
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x8404580xca4.vmp1
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xab64580x168.vmp1
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xf400000x4a0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf203500x1e138.vmp1
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf3f0000xec.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x8891c00x58.vmp1
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf202100x140.vmp1
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x84c0000x170.vmp1
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x2880580x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x28a0000xa800a0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x3330000x151b7c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x4850000x1b3d80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .vmp00x4a10000x37147a0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .vmp10x8130000x72b4880x72b600fff65873e7b640bae2f8b72a457ae95cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .reloc0xf3f0000xec0x2003eca60b158f5020d40effa1b7d269b87False0.3828125data2.298864374407102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0xf400000x4a00x6008e75b0dde15073d10f32dddd8d079fb6False0.3763020833333333data3.5206500919974224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0xf400a00x278dataFrenchFrance0.47468354430379744
                                          RT_MANIFEST0xf403180x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                          DLLImport
                                          d3d11.dllD3D11CreateDevice
                                          ntdll.dllRtlCaptureContext
                                          WS2_32.dllgetsockopt
                                          CRYPT32.dllCertFreeCertificateChain
                                          ADVAPI32.dllCryptHashData
                                          KERNEL32.dllExitThread
                                          USER32.dllGetClipboardData
                                          ole32.dllCoSetProxyBlanket
                                          OLEAUT32.dllSysAllocString
                                          IMM32.dllImmSetCandidateWindow
                                          D3DCOMPILER_47.dllD3DCompile
                                          bcrypt.dllBCryptGenRandom
                                          WTSAPI32.dllWTSSendMessageW
                                          KERNEL32.dllGetSystemTimeAsFileTime
                                          USER32.dllGetUserObjectInformationW
                                          KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                          USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                          NameOrdinalAddress
                                          AmdPowerXpressRequestHighPerformance10x1403359c0
                                          NvOptimusEnablement20x1403359bc
                                          Language of compilation systemCountry where language is spokenMap
                                          FrenchFrance
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 18, 2024 21:15:31.919909000 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:31.919946909 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:31.920192003 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:31.935036898 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:31.935055971 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:33.158090115 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:33.159487009 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:33.159503937 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:33.160541058 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:33.160814047 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:33.169264078 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:33.169332981 CET44349791104.21.1.82192.168.2.24
                                          Dec 18, 2024 21:15:33.169390917 CET49791443192.168.2.24104.21.1.82
                                          Dec 18, 2024 21:15:33.169390917 CET49791443192.168.2.24104.21.1.82
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 18, 2024 21:15:21.962054968 CET6427853192.168.2.241.1.1.1
                                          Dec 18, 2024 21:15:22.099195004 CET53642781.1.1.1192.168.2.24
                                          Dec 18, 2024 21:15:22.977338076 CET6427853192.168.2.241.1.1.1
                                          Dec 18, 2024 21:15:26.930071115 CET6427853192.168.2.241.1.1.1
                                          Dec 18, 2024 21:15:26.989296913 CET5104153192.168.2.241.1.1.1
                                          Dec 18, 2024 21:15:31.701257944 CET5104153192.168.2.241.1.1.1
                                          Dec 18, 2024 21:15:31.885552883 CET53510411.1.1.1192.168.2.24
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 18, 2024 21:15:21.962054968 CET192.168.2.241.1.1.10x67f6Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:22.977338076 CET192.168.2.241.1.1.10x42f9Standard query (0)srtb.msn.comA (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:26.930071115 CET192.168.2.241.1.1.10x9ae6Standard query (0)tse1.mm.bing.netA (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:26.989296913 CET192.168.2.241.1.1.10xde8fStandard query (0)ecn.dev.virtualearth.netA (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:31.701257944 CET192.168.2.241.1.1.10x2e70Standard query (0)api.tzproject.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 18, 2024 21:15:22.099195004 CET1.1.1.1192.168.2.240x67f6No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:22.099195004 CET1.1.1.1192.168.2.240x67f6No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:23.115879059 CET1.1.1.1192.168.2.240x42f9No error (0)srtb.msn.comwww.msn.comCNAME (Canonical name)IN (0x0001)false
                                          Dec 18, 2024 21:15:23.115879059 CET1.1.1.1192.168.2.240x42f9No error (0)www.msn.comwww-msn-com.a-0003.a-msedge.netCNAME (Canonical name)IN (0x0001)false
                                          Dec 18, 2024 21:15:27.130284071 CET1.1.1.1192.168.2.240xde8fNo error (0)ecn.dev.virtualearth.netssl2.tiles.virtualearth.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                          Dec 18, 2024 21:15:27.246635914 CET1.1.1.1192.168.2.240x9ae6No error (0)tse1.mm.bing.netmm-mm.bing.net.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                          Dec 18, 2024 21:15:27.246635914 CET1.1.1.1192.168.2.240x9ae6No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:27.246635914 CET1.1.1.1192.168.2.240x9ae6No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:31.885552883 CET1.1.1.1192.168.2.240x2e70No error (0)api.tzproject.com104.21.1.82A (IP address)IN (0x0001)false
                                          Dec 18, 2024 21:15:31.885552883 CET1.1.1.1192.168.2.240x2e70No error (0)api.tzproject.com172.67.128.232A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:1
                                          Start time:15:15:27
                                          Start date:18/12/2024
                                          Path:C:\Users\user\Desktop\tasktow.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\tasktow.exe"
                                          Imagebase:0x7ff6f5fc0000
                                          File size:7'520'768 bytes
                                          MD5 hash:AA59363D3F6D6ACCC7C992EDFCD62CCF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          No disassembly