Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TbxHhK6lsS.exe

Overview

General Information

Sample name:TbxHhK6lsS.exe
renamed because original name is a hash value
Original sample name:5d032ac0758ae1e144a1b551b3c0700f.exe
Analysis ID:1581580
MD5:5d032ac0758ae1e144a1b551b3c0700f
SHA1:56da3f7ab2ce67eb2c5c0f2c5f5d2a8ffb2f2607
SHA256:bca0e02b9f5476783bdd8f063170d8c577bb83c533a220ef7e88409ad7ef71fa
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
HTTP GET or POST without a user agent
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • TbxHhK6lsS.exe (PID: 908 cmdline: "C:\Users\user\Desktop\TbxHhK6lsS.exe" MD5: 5D032AC0758AE1E144A1B551B3C0700F)
    • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5964 cmdline: C:\Windows\system32\WerFault.exe -u -p 908 -s 368 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: TbxHhK6lsS.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: TbxHhK6lsS.exeJoe Sandbox ML: detected
Source: TbxHhK6lsS.exe, 00000000.00000002.1753347413.0000000140084000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_b60fb56f-0

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49707
Source: global trafficTCP traffic: 192.168.2.8:49707 -> 141.11.185.137:3542
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: TbxHhK6lsS.exe, 00000000.00000002.1752989998.000000000054C000.00000004.00000020.00020000.00000000.sdmp, TbxHhK6lsS.exe, 00000000.00000002.1752905707.000000000014B000.00000004.00000010.00020000.00000000.sdmp, TbxHhK6lsS.exe, 00000000.00000002.1752989998.0000000000556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/version
Source: TbxHhK6lsS.exe, 00000000.00000002.1752989998.0000000000556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/versionketsP1T
Source: TbxHhK6lsS.exe, 00000000.00000002.1753347413.0000000140084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://141.11.18HARDWARE
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: TbxHhK6lsS.exe, 00000000.00000002.1753347413.0000000140084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html

System Summary

barindex
Source: TbxHhK6lsS.exeStatic PE information: section name: .C"0
Source: TbxHhK6lsS.exeStatic PE information: section name: .-<s
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 908 -s 368
Source: classification engineClassification label: mal88.troj.evad.winEXE@3/6@0/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess908
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\65687f5c-21af-4dcb-b9cb-77aea3a964a8Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TbxHhK6lsS.exeReversingLabs: Detection: 23%
Source: unknownProcess created: C:\Users\user\Desktop\TbxHhK6lsS.exe "C:\Users\user\Desktop\TbxHhK6lsS.exe"
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 908 -s 368
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: mswsock.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: TbxHhK6lsS.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: TbxHhK6lsS.exeStatic file information: File size 7577088 > 1048576
Source: TbxHhK6lsS.exeStatic PE information: Raw size of .-<s is bigger than: 0x100000 < 0x738400
Source: initial sampleStatic PE information: section where entry point is pointing to: .-<s
Source: TbxHhK6lsS.exeStatic PE information: section name: .C"0
Source: TbxHhK6lsS.exeStatic PE information: section name: ..Xy
Source: TbxHhK6lsS.exeStatic PE information: section name: .-<s

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 908 base: 7FFBCB910008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 908 base: 7FFBCB7AD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 908 base: 7FFBCB92000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 908 base: 7FFBCB7DCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49707
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: OutputDebugStringW count: 1969
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSpecial instruction interceptor: First address: 140D688A4 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: TbxHhK6lsS.exe, 00000000.00000002.1752989998.0000000000561000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtUnmapViewOfSection: Direct from: 0x140C07C7EJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140C34026Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D0D435Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Indirect: 0x14067E24CJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtClose: Direct from: 0x140BF9DA5
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140D28D18Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtSetInformationThread: Direct from: 0x140C766EAJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140C9AB90Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140CAC969Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtMapViewOfSection: Direct from: 0x140D62817Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140C74015Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D33848Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtSetInformationThread: Direct from: 0x140D4B67CJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140C93DA7Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140C2A283Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D5BAD0Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140CD3942Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140C8AE3DJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140BFEF2BJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D64CB7Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
1
Credential API Hooking
321
Security Software Discovery
Remote Services1
Credential API Hooking
11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TbxHhK6lsS.exe24%ReversingLabs
TbxHhK6lsS.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://141.11.18HARDWARE0%Avira URL Cloudsafe
http://141.11.185.137:3542/versionketsP1T0%Avira URL Cloudsafe
http://141.11.185.137:3542/version0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://141.11.185.137:3542/versionfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://141.11.18HARDWARETbxHhK6lsS.exe, 00000000.00000002.1753347413.0000000140084000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
    high
    http://141.11.185.137:3542/versionketsP1TTbxHhK6lsS.exe, 00000000.00000002.1752989998.0000000000556000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.haxx.se/docs/http-cookies.htmlTbxHhK6lsS.exe, 00000000.00000002.1753347413.0000000140084000.00000002.00000001.01000000.00000003.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      141.11.185.137
      unknownUnited Kingdom
      7470TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHfalse
      IP
      127.0.0.1
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1581580
      Start date and time:2024-12-28 09:28:18 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 53s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:TbxHhK6lsS.exe
      renamed because original name is a hash value
      Original Sample Name:5d032ac0758ae1e144a1b551b3c0700f.exe
      Detection:MAL
      Classification:mal88.troj.evad.winEXE@3/6@0/2
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.190.177.147, 172.202.163.200, 4.245.163.56, 13.107.246.63
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target TbxHhK6lsS.exe, PID 908 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      • VT rate limit hit for: TbxHhK6lsS.exe
      TimeTypeDescription
      03:29:51API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHdb0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
      • 171.103.158.89
      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 171.103.5.185
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 180.214.218.62
      nshkarm5.elfGet hashmaliciousMiraiBrowse
      • 223.24.239.97
      sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 61.91.50.103
      2.elfGet hashmaliciousUnknownBrowse
      • 223.24.215.80
      jew.ppc.elfGet hashmaliciousUnknownBrowse
      • 171.102.72.219
      arm6.elfGet hashmaliciousUnknownBrowse
      • 223.24.239.68
      x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 171.103.83.108
      sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 171.102.110.159
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8248884314333705
      Encrypted:false
      SSDEEP:96:s48Fkgk6osSh5GhiXSKQXIDcQgc6PcE9cw3t+HbHg/8BRTf3o8Fa9l7WUzuNwOyt:s5iz6o00eLnOjpBzuiFwZ24lO8Z
      MD5:77AA8A827806B22108F58CB031EDE80D
      SHA1:3E87C5FA46E912959C8583C4223E4560B508145D
      SHA-256:E270A1A2E703414A85254F2961FB8FBE0AD214E7676A8CC2CFCFF30426DBD547
      SHA-512:D80263D2E014006699B1077453CD7EE04BECF4404B799E7ED16BF637483B7DED88F9180F664B94953B89ED7F8C964333976EF9BA00FD7A068D76FFC08F6729ED
      Malicious:true
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.4.8.1.8.2.1.7.3.5.7.6.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.4.8.1.8.2.5.3.2.9.5.5.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.d.7.8.e.6.b.-.5.5.0.5.-.4.1.c.7.-.b.9.0.8.-.8.e.c.3.6.2.e.0.a.e.d.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.a.2.c.e.a.a.7.-.e.6.2.7.-.4.f.b.0.-.b.6.9.4.-.9.1.1.4.d.2.e.5.4.3.5.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.T.b.x.H.h.K.6.l.s.S...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.8.c.-.0.0.0.1.-.0.0.1.4.-.7.8.5.1.-.f.e.a.0.0.2.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.d.0.1.1.a.2.9.8.2.c.5.e.3.7.9.2.0.a.5.d.2.c.a.b.0.f.d.9.8.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.5.6.d.a.3.f.7.a.b.2.c.e.6.7.e.b.2.c.5.c.0.f.2.c.5.f.5.d.2.a.8.f.f.b.2.f.2.6.0.7.!.T.b.x.H.h.K.6.l.s.S...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.2././.2.8.:.0.2.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Sat Dec 28 08:29:42 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):87160
      Entropy (8bit):1.4940162888159345
      Encrypted:false
      SSDEEP:192:w91SgOjH6II6+f37TrF3g6D26ZX2gOIb25yojvwyAX:ckjH6II6+z3hg6DbZX2gOIb25Nva
      MD5:866639D97D937439465BC1AA55BEE0BE
      SHA1:90822E28485C79B8D69A5493441C20C6A4578AFC
      SHA-256:4D84EDD9FE06DEA2631FFC9BF4C88D46707A7830C9D5C80F77320BECDE5945C3
      SHA-512:35AD1E9AC1FF39F0D29702D3A6C8779AC042B1AA489ECC9C768A37FD85C384287D0D6A36405E9175E10D4E54CEDBE8DC80C7519EEE2D46141545227CB659D762
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .........og............$...............,............<..........T.......8...........T...........p....F......................................................................................................eJ......\.......Lw......................T............og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8822
      Entropy (8bit):3.700317025913182
      Encrypted:false
      SSDEEP:192:R6l7wVeJ/Cf5hv6YSeV/gmfcJF/LpDa89baeEfF4em:R6lXJqfX6Y7NgmfcblalfF4
      MD5:34A7120D1D8AB3E0336C8F880B562B68
      SHA1:F06AFAA818EACBD210AAD3DEA0040AC11200A439
      SHA-256:7AE3BFE8E6A624FB4F1D2A2250BA187461E1AEF42F22D4398FF7210919087B32
      SHA-512:8E858EA73BBB6A4B198AEB260A6D2878DBC3EAE9865D55B0D194124EDD73BC8BE2CD86EFF4D6646E9957F361A902AA779392D224F5D9675F9F9EFE17D44D4354
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.9.0.8.<./.P.i.d.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4766
      Entropy (8bit):4.458015927786367
      Encrypted:false
      SSDEEP:48:cvIwWl8zssJg771I91SVWpW8VYXYm8M4JOBNJsFJyq8vCNJAZxh3QDwMdd:uIjfqI7KSk7VPJOBMWCkJQLdd
      MD5:BCBE9734F4BC11E93A8182353DD3C357
      SHA1:251A0B2A206A10B3B2F2708E6D7F731E2D3D0B80
      SHA-256:36DBD4CD8CE4D296EFD864A89CBA4DFC0D6E83DA8BBB7C84DC9501D294967BBA
      SHA-512:D64F5ADF08472A57B8CB601D53998B96BA2919176CAC58DA4C089C49409952DDDF6435F694135008583DD9D24DC6022CDE577D2AE12035239FA994746F9B8D1C
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="650852" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.372187609950449
      Encrypted:false
      SSDEEP:6144:CFVfpi6ceLP/9skLmb0ByWWSPtaJG8nAge35OlMMhA2AX4WABlguN0iL:KV1byWWI/glMM6kF7mq
      MD5:22003E97044485259E0CF0925EE6D01D
      SHA1:A7B34E9F023209C7EEEE5E34AC76B0072621B0DB
      SHA-256:759AE63709600CE4E16B8FCA3A564E9DE5ED93B2C2D9D9AB0B72AAC181A2C79A
      SHA-512:5E37E86D87E2C16A643C3C2C1E6366DF8D084ABB30426238CD80C32EC662D38E3E39F8DF27D9AFF043C2BC46F105990A9F210045B440E7AB5A2644D500735661
      Malicious:false
      Reputation:low
      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..j..Y..............................................................................................................................................................................................................................................................................................................................................2.}.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\TbxHhK6lsS.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):29
      Entropy (8bit):3.620936064750772
      Encrypted:false
      SSDEEP:3:jhMZvLVLyn:FgvBLyn
      MD5:B75633D66A88E5680C6BB255399254B2
      SHA1:8B41DCEBFD52F58E40232C00D44C703650FBD2CE
      SHA-256:35D596D6F7F4C37B96F18660C901B4F4F5A274C982A0D05991BE7D704B8382EF
      SHA-512:48D3E3164C7FDB851E775D8E21E1B73652F5FE0B6A6399B3874A7557D5901B224B7C4880855BFE2224EED764FD9B9366F2521C64424070489104C5D8D9548090
      Malicious:false
      Reputation:low
      Preview:.. Attempting to connect.....
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):7.987741101784346
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:TbxHhK6lsS.exe
      File size:7'577'088 bytes
      MD5:5d032ac0758ae1e144a1b551b3c0700f
      SHA1:56da3f7ab2ce67eb2c5c0f2c5f5d2a8ffb2f2607
      SHA256:bca0e02b9f5476783bdd8f063170d8c577bb83c533a220ef7e88409ad7ef71fa
      SHA512:3a1586bd2eeb1e2d8d098ee8803badaf6f73e2f1c8c643c3d5020b4120044640a1af9a5a0b66f8a7af7e4af554f65425bdae5409da6bd8845029966277479571
      SSDEEP:98304:SS7vuBF+VYZXBu60ZDHIlb50Tf83Tqn+ZYsLWzKwUXZTT16ONoLrQ1MI5fcXUseh:SavwYOMDZccfyI+ZBWyFp6uJ1MifUe
      TLSH:BA763345AAC26EF5E047CB7A45C234AD703D3FE191B65C063BCE3B414EA2628AD363D5
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....bog..........#....*.(...48................@.............................p............ ................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x140c89f13
      Entrypoint Section:.-<s
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x676F62B2 [Sat Dec 28 02:30:10 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:6123cc4f0fae004f33be7838cf2627be
      Instruction
      call 00007F87A13F5B75h
      push esp
      jp 000053F9h
      mov ebx, 8F1F79CAh
      mov dword ptr [3614AB8Eh], eax
      pop edx
      adc al, byte ptr [ebx+57F389EEh]
      das
      out dx, al
      sti
      adc al, 76h
      fcmovu st(0), st(6)
      mov ebp, dword ptr [edx+472F3729h]
      mov ch, 8Ch
      nop
      lodsb
      wait
      test al, 7Fh
      mov edx, 5EC0E0E8h
      das
      pop ds
      cmc
      dec edi
      aaa
      call far D975h : 4091E834h
      xor al, 6Ch
      mov byte ptr [ebp+30h], bl
      lea ebp, dword ptr [edi]
      push ecx
      xchg eax, esi
      or al, EFh
      or al, 00h
      add byte ptr [eax], al
      mov edx, E0D6C408h
      retn D168h
      jns 00007F87A13453F5h
      stc
      retf
      mov dword ptr [BAE2FBE2h], eax
      ror byte ptr [edx], 1
      or byte ptr [eax-57h], bl
      push E1EB2141h
      nop
      pop ebx
      push 0000004Bh
      xchg eax, ecx
      stosb
      and byte ptr [edx+5Bh], cl
      add byte ptr [edx], 0000004Bh
      dec ebx
      bound edx, dword ptr [edi-28h]
      mov dh, 3Eh
      xor bh, byte ptr [edi+1Eh]
      pop ebp
      pop ebx
      imul esp, dword ptr [edi], AAh
      cmpsd
      pushad
      pop edx
      or cl, byte ptr [edi]
      popfd
      mul dword ptr [ebx+5Bh]
      pop edx
      dec ebx
      fsub dword ptr [edx+3A6F6606h]
      sub eax, DAC771BFh
      jecxz 00007F87A134538Bh
      int F7h
      dec edi
      iretd
      add eax, B93625EBh
      stc
      add edx, dword ptr [eax+22DB6C36h]
      sahf
      or al, A4h
      sub dword ptr [edi-48h], esp
      pop ecx
      sub dword ptr [edx-51B0AB98h], eax
      lds edi, fword ptr [eax]
      movsd
      arpl cx, bp
      inc esi
      aaa
      push edx
      jnp 00007F87A134541Dh
      cmpsb
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8a7c00x1f4.-<s
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc60000x1e0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xdbdc000x771c.-<s
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xdbdac00x140.-<s
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x68b0000x1a8..Xy
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x8269b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x840000x1cc940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa10000x360cc80x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x4020000x4e240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .C"00x4070000x283c6a0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      ..Xy0x68b0000x12d80x14001cef768ea3e50932b400aaa7258cca1dFalse0.033984375data0.21663963508602493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .-<s0x68d0000x73831c0x738400150a384016ea4ef3e8b91cd6bbd40084unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0xdc60000x1e00x2007b8a6d792b0be48adbb2f06a5c3068b1False0.5390625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0xdc60580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
      DLLImport
      KERNEL32.dllGetCurrentProcessId
      USER32.dllGetAsyncKeyState
      ADVAPI32.dllCryptEncrypt
      MSVCP140.dll?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
      WS2_32.dllhtonl
      WLDAP32.dll
      CRYPT32.dllCertCreateCertificateChainEngine
      Normaliz.dllIdnToAscii
      VCRUNTIME140.dllmemcpy
      VCRUNTIME140_1.dll__CxxFrameHandler4
      api-ms-win-crt-runtime-l1-1-0.dll__sys_nerr
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-heap-l1-1-0.dllrealloc
      api-ms-win-crt-utility-l1-1-0.dllqsort
      api-ms-win-crt-convert-l1-1-0.dllstrtoul
      api-ms-win-crt-environment-l1-1-0.dllgetenv
      api-ms-win-crt-stdio-l1-1-0.dll_read
      api-ms-win-crt-filesystem-l1-1-0.dll_access
      api-ms-win-crt-time-l1-1-0.dll_time64
      api-ms-win-crt-string-l1-1-0.dllstrncmp
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      api-ms-win-crt-conio-l1-1-0.dll_getch
      KERNEL32.dllGetSystemTimeAsFileTime
      KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Dec 28, 2024 09:29:41.675338030 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:41.794815063 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:41.794958115 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:41.808159113 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:41.927650928 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121756077 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121793032 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121799946 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121859074 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.121931076 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121938944 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121944904 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121952057 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.121978045 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.122144938 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.122158051 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.122173071 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.122191906 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.122239113 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.241638899 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.241651058 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.241718054 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.323357105 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.323394060 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.323437929 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.327532053 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.327635050 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.327677011 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.335952997 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.336020947 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.336074114 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.344324112 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.344413996 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.344484091 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.352654934 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.352787971 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.352835894 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:43.361018896 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:43.490716934 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:49.121628046 CET354249707141.11.185.137192.168.2.8
      Dec 28, 2024 09:29:49.121692896 CET497073542192.168.2.8141.11.185.137
      Dec 28, 2024 09:29:53.358783007 CET497073542192.168.2.8141.11.185.137
      • 141.11.185.137:3542
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.849707141.11.185.1373542908C:\Users\user\Desktop\TbxHhK6lsS.exe
      TimestampBytes transferredDirectionData
      Dec 28, 2024 09:29:41.808159113 CET65OUTGET /version HTTP/1.1
      Host: 141.11.185.137:3542
      Accept: */*
      Dec 28, 2024 09:29:43.121756077 CET1236INHTTP/1.1 200 OK
      Content-Type: application/json
      Data: 606808280860d230ea3850aa68a2da38da684028d268e23058a240aa603058b258ba6830403870aa40a240b268ba00b26838e2300820ea287828
      Access: 0808482060009238825810a200c29a30b2080020ba08a23830c200a2085018ba30da2838285830a228c200ba00da40ba0058a2386040aa201048
      Date: Sat, 28 Dec 2024 08:29:42 GMT
      Connection: keep-alive
      Keep-Alive: timeout=5
      Transfer-Encoding: chunked
      Data Raw: 36 39 30 65 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 56 6d 30 77 64 32 51 79 55 58 6c 56 57 47 78 57 56 30 64 34 57 46 6c 55 52 6e 64 55 4d 56 70 7a 57 6b 5a 4f 57 46 4a 73 62 44 4e 58 61 32 4d 31 56 6a 46 4b 63 32 4a 45 54 6c 68 68 4d 6b 30 78 56 6a 42 61 53 32 4d 79 53 6b 56 55 62 47 68 6f 54 56 56 77 56 56 5a 74 63 45 74 54 4d 55 6c 35 55 32 74 57 56 57 4a 48 61 47 39 55 56 6c 5a 33 56 6c 5a 61 64 47 4e 46 5a 46 52 4e 62 45 70 4a 56 6d 31 30 63 32 46 57 53 6e 52 56 61 7a 6c 61 56 6a 4e 6f 61 46 70 57 57 6d 46 6b 52 31 5a 48 56 32 31 34 55 32 4a 48 64 7a 46 57 61 32 51 77 59 7a 4a 47 63 31 4e 75 55 6c 5a 68 65 6d 78 68 56 6d 70 4f 55 32 46 47 56 58 68 58 62 55 5a 72 55 6a 41 31 52 31 64 72 57 6e 64 57 4d 44 46 46 55 6c 52 47 56 31 5a 46 62 33 64 57 61 6b 5a 68 56 30 5a 4f 63 6d 46 48 61 46 4e 6c 62 58 68 58 56 6d 30 78 4e 46 6c 56 4d 48 68 58 62 6b 35 59 59 6c 56 61 63 56 5a 74 63 7a 46 6c 52 6c 70 59 5a 55 68 6b 56 30 31 45 52 6c 64 5a 4d 46 70 7a 56 6a 46 61 4e 6c 46 59 61 46 64 53 52 58 42 49 [TRUNCATED]
      Data Ascii: 690e{"message":"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


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:03:29:36
      Start date:28/12/2024
      Path:C:\Users\user\Desktop\TbxHhK6lsS.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\TbxHhK6lsS.exe"
      Imagebase:0x140000000
      File size:7'577'088 bytes
      MD5 hash:5D032AC0758AE1E144A1B551B3C0700F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:03:29:36
      Start date:28/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6ee680000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:03:29:42
      Start date:28/12/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 908 -s 368
      Imagebase:0x7ff639cc0000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly