Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e5mIhMkcj5.exe

Overview

General Information

Sample name:e5mIhMkcj5.exe
renamed because original name is a hash value
Original sample name:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c.exe
Analysis ID:1578841
MD5:d11828146ff9e2e340c555f9531cac47
SHA1:ca027ca9bea1e48a0ac4d01370d3f4bc9d5e5088
SHA256:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c
Tags:bankerexeLATAMPAGAMENTOS-DIGITAIS-LTDAtrojanuser-johnk3r
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • e5mIhMkcj5.exe (PID: 5480 cmdline: "C:\Users\user\Desktop\e5mIhMkcj5.exe" MD5: D11828146FF9E2E340C555F9531CAC47)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: e5mIhMkcj5.exeVirustotal: Detection: 19%Perma Link
Source: e5mIhMkcj5.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: e5mIhMkcj5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: e5mIhMkcj5.exeStatic PE information: certificate valid
Source: e5mIhMkcj5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
Source: unknownHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/&
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/M
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001979000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.phpic
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/h
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: e5mIhMkcj5.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0(
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: e5mIhMkcj5.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: e5mIhMkcj5.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: e5mIhMkcj5.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: e5mIhMkcj5.exeString found in binary or memory: https://www.globalsign.com/repository/0

System Summary

barindex
Source: e5mIhMkcj5.exeStatic PE information: section name: .!Zx
Source: e5mIhMkcj5.exeStatic PE information: section name: .]#m
Source: e5mIhMkcj5.exeStatic PE information: section name: .2"V
Source: e5mIhMkcj5.exe, 00000000.00000000.1692687442.0000000001214000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe
Source: e5mIhMkcj5.exeBinary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe
Source: e5mIhMkcj5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeFile created: C:\Users\user\AppData\Roaming\987CE2CEJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMutant created: \Sessions\1\BaseNamedObjects\987CE2CE2024
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: e5mIhMkcj5.exeVirustotal: Detection: 19%
Source: e5mIhMkcj5.exeReversingLabs: Detection: 23%
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: python313.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winhttpcom.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeWindow found: window name: TEditJump to behavior
Source: e5mIhMkcj5.exeStatic PE information: certificate valid
Source: e5mIhMkcj5.exeStatic file information: File size 8816544 > 1048576
Source: e5mIhMkcj5.exeStatic PE information: Raw size of .2"V is bigger than: 0x100000 < 0x851e00
Source: e5mIhMkcj5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .2"V
Source: e5mIhMkcj5.exeStatic PE information: section name: .!Zx
Source: e5mIhMkcj5.exeStatic PE information: section name: .]#m
Source: e5mIhMkcj5.exeStatic PE information: section name: .2"V

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1390005 value: E9 8B 2F B7 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02F90 value: E9 7A D0 48 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13A0005 value: E9 5B 2E B6 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02E60 value: E9 AA D1 49 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13B0005 value: E9 EB 3E B5 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F03EF0 value: E9 1A C1 4A 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13C0005 value: E9 DB 2F B4 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02FE0 value: E9 2A D0 4B 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13D0005 value: E9 BB 2D B3 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02DC0 value: E9 4A D2 4C 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13E0005 value: E9 CB 2A B2 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02AD0 value: E9 3A D5 4D 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 13F0005 value: E9 7B 2B B1 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02B80 value: E9 8A D4 4E 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 18C0005 value: E9 1B 2F 64 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02F20 value: E9 EA D0 9B 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 18D0005 value: E9 FB 2C 63 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02D00 value: E9 0A D3 9C 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 18E0005 value: E9 DB 2D 62 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02DE0 value: E9 2A D2 9D 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 18F0005 value: E9 AB 3E 61 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F03EB0 value: E9 5A C1 9E 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1900005 value: E9 2B 2F 60 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02F30 value: E9 DA D0 9F 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1910005 value: E9 9B 2F 5F 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02FA0 value: E9 6A D0 A0 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D10005 value: E9 0B 2D 1F 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02D10 value: E9 FA D2 E0 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D20005 value: E9 CB 3B 1E 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F03BD0 value: E9 3A C4 E1 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D30005 value: E9 2B 2D 1D 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02D30 value: E9 DA D2 E2 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D40005 value: E9 4B 47 1C 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F04750 value: E9 BA B8 E3 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D50005 value: E9 BB 2C 1B 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02CC0 value: E9 4A D3 E4 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D60005 value: E9 8B 3B 1A 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F03B90 value: E9 7A C4 E5 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D80005 value: E9 5B 2B 18 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02B60 value: E9 AA D4 E7 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 1D90005 value: E9 6B 2B 17 75 Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeMemory written: PID: 5480 base: 76F02B70 value: E9 9A D4 E8 8A Jump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1134A82
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 113C187
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 9CDC5E
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1150C0D
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 11CA09C
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: A77795
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 11474FB
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 114370D
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 11436D6
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 9FBC19
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 10F0021
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1175372
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1117553
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeAPI/Special instruction interceptor: Address: 1130063
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 2308Thread sleep time: -30000s >= -30000sJump to behavior
Source: e5mIhMkcj5.exe, 00000000.00000003.2342584334.00000000019AF000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342534930.00000000019A6000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342703862.00000000019B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWindows\System32\en-US\mswsock.dll.mui
Source: e5mIhMkcj5.exe, 00000000.00000003.2342723122.0000000001990000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx-
Source: e5mIhMkcj5.exe, 00000000.00000003.2342584334.00000000019AF000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342534930.00000000019A6000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342703862.00000000019B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Windows Defender\MsMpeng.exe
Source: C:\Users\user\Desktop\e5mIhMkcj5.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
1
Credential API Hooking
121
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS111
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
e5mIhMkcj5.exe19%VirustotalBrowse
e5mIhMkcj5.exe24%ReversingLabsWin32.Trojan.Ousaban
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://23.94.207.151/he5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://23.94.207.151/avs_pro/index.phpice5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001979000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://23.94.207.151/Me5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://23.94.207.151/e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://23.94.207.151/&e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            23.94.207.151
            unknownUnited States
            36352AS-COLOCROSSINGUSfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1578841
            Start date and time:2024-12-20 15:32:50 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 50s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:e5mIhMkcj5.exe
            renamed because original name is a hash value
            Original Sample Name:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c.exe
            Detection:MAL
            Classification:mal64.evad.winEXE@1/0@0/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            23.94.207.151PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
            • 23.94.207.151/avs_pro/index.php
            RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
            • 23.94.207.151/avs_pro/index.php
            tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
            • 23.94.207.151/avs_coin/index.php
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AS-COLOCROSSINGUSPVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
            • 23.94.207.151
            RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
            • 23.94.207.151
            tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
            • 23.94.207.151
            arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 107.174.209.17
            uctgkfb7.exeGet hashmaliciousXWormBrowse
            • 192.210.175.202
            file.exeGet hashmaliciousRemcosBrowse
            • 107.173.4.16
            SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
            • 192.210.150.17
            Document.xlaGet hashmaliciousUnknownBrowse
            • 172.245.123.12
            greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaGet hashmaliciousCobalt Strike, RemcosBrowse
            • 23.95.235.29
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.993493827980054
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:e5mIhMkcj5.exe
            File size:8'816'544 bytes
            MD5:d11828146ff9e2e340c555f9531cac47
            SHA1:ca027ca9bea1e48a0ac4d01370d3f4bc9d5e5088
            SHA256:48590573f48e243dea35b018401933e3b5cbc19edb94377c7d54394f127e214c
            SHA512:2305b6b9a5b530651b33958093b96ccdbee63d03530a082c39c94809278458658faca472b66a090493928ec26f6e3d28c8ba278faf6ac9cb7afc8ab70a918779
            SSDEEP:196608:q8NN2mvIbRvnSZkIeQZ8eYMa46OdXxVQIB:qeN2uOnRIIehVQ4
            TLSH:8096335AFEEF3CC8F40A6D3005359CFC7875EC680A54CE28559ABA4998B7053B73A163
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..e...............&.....H......m........ ....@.......................................@................................
            Icon Hash:18c21a3e0e660418
            Entrypoint:0x123976d
            Entrypoint Section:.2"V
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x65F0C531 [Tue Mar 12 21:12:17 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:c8fda3b55e4040ba39dbeb455bda13b3
            Signature Valid:true
            Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 13/12/2024 21:10:46 14/12/2025 21:10:46
            Subject Chain
            • E=pagamentosdigitaais@gmail.com, CN=PAGAMENTOS DIGITAIS LTDA, O=PAGAMENTOS DIGITAIS LTDA, L=JOAO PESSOA, S=PARAIBA, C=BR, OID.1.3.6.1.4.1.311.60.2.1.3=BR, SERIALNUMBER=55.972.702/0001-29, OID.2.5.4.15=Private Organization
            Version:3
            Thumbprint MD5:FC24237D18BE5D7114AA3DCDAAE6AD6C
            Thumbprint SHA-1:3C9DB92427EA2A17F23D86D1B5704C90C1949548
            Thumbprint SHA-256:19BAF25862979BC0C7CB3971187128986BEB6DB4A4C6986B452A286850E570B0
            Serial:0B98FD483EA0DD6E7C6A6317
            Instruction
            push edi
            pushfd
            mov edi, C411C603h
            sub edi, B30F4939h
            mov edi, E5A3E327h
            or edi, edi
            not edi
            mov edi, dword ptr [esp+04h]
            mov dword ptr [esp+04h], D5D8AD42h
            push dword ptr [esp+00h]
            popfd
            lea esp, dword ptr [esp+04h]
            call 00007F811141E400h
            dec esp
            mov dword ptr [esp+08h], edx
            inc sp
            mov edx, dword ptr [ebp+00h]
            call 00007F8111466E90h
            add ebp, 00000002h
            jmp 00007F8110D37F3Ch
            add dl, 00000029h
            xor dl, FFFFFFBBh
            mov dword ptr [esp+00h], 8D038F26h
            add dl, FFFFFF92h
            rol dl, 1
            xor dl, 00000037h
            xor bl, dl
            neg dword ptr [esp+00h]
            call 00007F8110CC72DDh
            jp 00007F8110CC5B22h
            sbb edi, 00000002h
            mov dword ptr [esp+00h], 41095A3Dh
            and dword ptr [esp+00h], 639FE311h
            call 00007F811148E07Ah
            xor esi, edx
            rep outsd
            sar dword ptr [eax-3F857761h], FFFFFFA1h
            and al, C1h
            sti
            push eax
            push edi
            in eax, dx
            les ecx, fword ptr [ecx-28AF8E80h]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x757c380x8c.2"V
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xec40000x13579.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x865e000x29a0.2"V
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xed80000x390.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xec3ab00x40.2"V
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x6710000x30.]#m
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xce10x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x20000xb400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x30000x3c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .!Zx0x40000x66cad40x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .]#m0x6710000x480x2002266ec4049a04fc3a59c1b526a72b2feFalse0.080078125data0.3459259103346658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .2"V0x6720000x851c600x851e0028cc6be39d4f7aa84057d316b4b9de52unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0xec40000x135790x13600f4f9f19583650c28f7ee2c4e7d3ca429False0.4890751008064516data6.167129680442765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xed80000x3900x4006223522a7ebf9ac317fb34927716e181False0.5185546875data3.9146739003418265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xec43400x3a47PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9777464977545411
            RT_ICON0xec7d880x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.29319464033850495
            RT_ICON0xec93b00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.3702025586353945
            RT_ICON0xeca2580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4002707581227437
            RT_ICON0xecab000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.4735023041474654
            RT_ICON0xecb1c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3713872832369942
            RT_ICON0xecb7300x2e29PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.976982313615977
            RT_ICON0xece55c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13491969768540388
            RT_ICON0xed27840x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.18869294605809128
            RT_ICON0xed4d2c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.25961538461538464
            RT_ICON0xed5dd40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.33114754098360655
            RT_ICON0xed675c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3962765957446808
            RT_GROUP_ICON0xed6bc40xaedataEnglishUnited States0.632183908045977
            RT_VERSION0xed6c740x3c0dataEnglishUnited States0.4197916666666667
            RT_MANIFEST0xed70340x545XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4558932542624166
            DLLImport
            api-ms-win-crt-runtime-l1-1-0.dll_set_app_type
            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
            api-ms-win-crt-stdio-l1-1-0.dll__p__commode
            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
            api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
            KERNEL32.dllGetCurrentThreadId
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Dec 20, 2024 15:33:47.561419010 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:47.719602108 CET804973323.94.207.151192.168.2.4
            Dec 20, 2024 15:33:47.719736099 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:47.720009089 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:47.720026016 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:47.839821100 CET804973323.94.207.151192.168.2.4
            Dec 20, 2024 15:33:47.839994907 CET804973323.94.207.151192.168.2.4
            Dec 20, 2024 15:33:49.022763968 CET804973323.94.207.151192.168.2.4
            Dec 20, 2024 15:33:49.074184895 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:54.028276920 CET804973323.94.207.151192.168.2.4
            Dec 20, 2024 15:33:54.028369904 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:54.029428959 CET4973380192.168.2.423.94.207.151
            Dec 20, 2024 15:33:54.148890018 CET804973323.94.207.151192.168.2.4
            • 23.94.207.151
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.44973323.94.207.151805480C:\Users\user\Desktop\e5mIhMkcj5.exe
            TimestampBytes transferredDirectionData
            Dec 20, 2024 15:33:47.720009089 CET250OUTPOST /avs_pro/index.php HTTP/1.1
            Connection: Keep-Alive
            Content-Type: application/x-www-form-urlencoded; Charset=UTF-8
            Accept: */*
            User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
            Content-Length: 135
            Host: 23.94.207.151
            Dec 20, 2024 15:33:47.720026016 CET135OUTData Raw: 6f 70 3d 4b 43 59 76 46 5a 74 42 4d 56 35 43 53 69 56 79 61 32 77 52 61 41 30 4e 41 58 52 39 43 79 6b 75 4d 56 6b 6a 42 6c 6c 66 56 6c 78 44 52 68 59 47 43 42 6c 62 57 30 4a 4b 57 42 68 65 52 56 64 66 46 41 4d 43 64 56 46 4e 47 54 5a 50 49 53 38
            Data Ascii: op=KCYvFZtBMV5CSiVya2wRaA0NAXR9CykuMVkjBllfVlxDRhYGCBlbW0JKWBheRVdfFAMCdVFNGTZPIS8YfnV9ZGcVcnJ+fCQvKSglcmsDAhwFBxkFCAteS1xDQmIDCwYFaRY=
            Dec 20, 2024 15:33:49.022763968 CET203INHTTP/1.1 200 OK
            Date: Fri, 20 Dec 2024 14:33:48 GMT
            Server: Apache/2.4.41 (Ubuntu)
            Content-Length: 0
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: text/html; charset=UTF-8


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:09:33:42
            Start date:20/12/2024
            Path:C:\Users\user\Desktop\e5mIhMkcj5.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\e5mIhMkcj5.exe"
            Imagebase:0x350000
            File size:8'816'544 bytes
            MD5 hash:D11828146FF9E2E340C555F9531CAC47
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Reputation:low
            Has exited:false

            No disassembly