Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TbxHhK6lsS.exe

Overview

General Information

Sample name:TbxHhK6lsS.exe
renamed because original name is a hash value
Original sample name:5d032ac0758ae1e144a1b551b3c0700f.exe
Analysis ID:1581580
MD5:5d032ac0758ae1e144a1b551b3c0700f
SHA1:56da3f7ab2ce67eb2c5c0f2c5f5d2a8ffb2f2607
SHA256:bca0e02b9f5476783bdd8f063170d8c577bb83c533a220ef7e88409ad7ef71fa
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
HTTP GET or POST without a user agent
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • TbxHhK6lsS.exe (PID: 7848 cmdline: "C:\Users\user\Desktop\TbxHhK6lsS.exe" MD5: 5D032AC0758AE1E144A1B551B3C0700F)
    • conhost.exe (PID: 7868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 8076 cmdline: C:\Windows\system32\WerFault.exe -u -p 7848 -s 368 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: TbxHhK6lsS.exeVirustotal: Detection: 25%Perma Link
Source: TbxHhK6lsS.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: TbxHhK6lsS.exeJoe Sandbox ML: detected
Source: TbxHhK6lsS.exe, 00000000.00000002.2002570819.0000000140084000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_ff2d3ef8-e

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49711
Source: global trafficTCP traffic: 192.168.2.11:49711 -> 141.11.185.137:3542
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: TbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/version
Source: TbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/versionm32
Source: TbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/versionncH
Source: TbxHhK6lsS.exe, 00000000.00000002.2002570819.0000000140084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://141.11.18HARDWARE
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: TbxHhK6lsS.exe, 00000000.00000002.2002570819.0000000140084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html

System Summary

barindex
Source: TbxHhK6lsS.exeStatic PE information: section name: .C"0
Source: TbxHhK6lsS.exeStatic PE information: section name: .-<s
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7848 -s 368
Source: classification engineClassification label: mal88.troj.evad.winEXE@3/6@0/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7868:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7848
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6c563636-55ee-4ae4-807f-0d0f8b447968Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TbxHhK6lsS.exeVirustotal: Detection: 25%
Source: TbxHhK6lsS.exeReversingLabs: Detection: 23%
Source: unknownProcess created: C:\Users\user\Desktop\TbxHhK6lsS.exe "C:\Users\user\Desktop\TbxHhK6lsS.exe"
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7848 -s 368
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: mswsock.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: TbxHhK6lsS.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: TbxHhK6lsS.exeStatic file information: File size 7577088 > 1048576
Source: TbxHhK6lsS.exeStatic PE information: Raw size of .-<s is bigger than: 0x100000 < 0x738400
Source: initial sampleStatic PE information: section where entry point is pointing to: .-<s
Source: TbxHhK6lsS.exeStatic PE information: section name: .C"0
Source: TbxHhK6lsS.exeStatic PE information: section name: ..Xy
Source: TbxHhK6lsS.exeStatic PE information: section name: .-<s

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 7848 base: 7FFEFE690008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 7848 base: 7FFEFE52D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 7848 base: 7FFEFE6A000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeMemory written: PID: 7848 base: 7FFEFE55CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49711
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSection loaded: OutputDebugStringW count: 1969
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSpecial instruction interceptor: First address: 140D688A4 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: TbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtSetInformationThread: Direct from: 0x140D1D86DJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtClose: Direct from: 0x140D50978
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D5139AJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D0D435Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Indirect: 0x14067E24CJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140C9AB6EJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtUnmapViewOfSection: Direct from: 0x140BFA82FJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtOpenFile: Direct from: 0x140D3D506Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140C35F08Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D64F76Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140CAC969Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtSetInformationProcess: Direct from: 0x140D6672DJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtMapViewOfSection: Direct from: 0x140C24EE7Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D33848Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D0D45FJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140CB0FD6Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140D5BAD0Jump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtQueryInformationProcess: Direct from: 0x140BFEF2BJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtProtectVirtualMemory: Direct from: 0x140BFAC5FJump to behavior
Source: C:\Users\user\Desktop\TbxHhK6lsS.exeNtSetInformationThread: Direct from: 0x140D0C803Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
1
Credential API Hooking
321
Security Software Discovery
Remote Services1
Credential API Hooking
11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TbxHhK6lsS.exe25%VirustotalBrowse
TbxHhK6lsS.exe24%ReversingLabs
TbxHhK6lsS.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://141.11.18HARDWARE0%Avira URL Cloudsafe
http://141.11.185.137:3542/versionm320%Avira URL Cloudsafe
http://141.11.185.137:3542/version0%Avira URL Cloudsafe
http://141.11.185.137:3542/versionncH0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0035.t-0009.t-msedge.net
13.107.246.63
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://141.11.185.137:3542/versionfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://141.11.18HARDWARETbxHhK6lsS.exe, 00000000.00000002.2002570819.0000000140084000.00000002.00000001.01000000.00000003.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://141.11.185.137:3542/versionm32TbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005BB000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.5.drfalse
      high
      http://141.11.185.137:3542/versionncHTbxHhK6lsS.exe, 00000000.00000002.2002311784.00000000005BB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://curl.haxx.se/docs/http-cookies.htmlTbxHhK6lsS.exe, 00000000.00000002.2002570819.0000000140084000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        141.11.185.137
        unknownUnited Kingdom
        7470TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHfalse
        IP
        127.0.0.1
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1581580
        Start date and time:2024-12-28 09:34:43 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 31s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:TbxHhK6lsS.exe
        renamed because original name is a hash value
        Original Sample Name:5d032ac0758ae1e144a1b551b3c0700f.exe
        Detection:MAL
        Classification:mal88.troj.evad.winEXE@3/6@0/2
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94, 13.107.246.63, 20.190.181.0, 20.109.210.53, 4.245.163.56
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Execution Graph export aborted for target TbxHhK6lsS.exe, PID 7848 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        141.11.185.137Q5f5spSfp9.exeGet hashmaliciousUnknownBrowse
        • 141.11.185.137:3542/version
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0035.t-0009.t-msedge.netMrIOYC1Pns.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        jPJaszTDNt.exeGet hashmaliciousUnknownBrowse
        • 13.107.246.63
        http://track.rbfcu.org/y.z?l=https://google.com/amp/s/t.ly/5SpZS&r=14387614172&d=18473&p=2&t=hGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.63
        http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=N_pyUL0QJkeR_KiXHZsVlyTB1Qoy7S9IkE8Ogzl8coFUMFBJSDkxQ0w3VVZMNFJFUlNDRVkyU05CUi4uGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.63
        eYAXkcBRfQ.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        JpzbUfhXi0.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        738KZNfnzz.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        LPO-0048532025.lnkGet hashmaliciousDarkVision RatBrowse
        • 13.107.246.63
        O53VxanH6A.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        IzDjbVdHha.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.63
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHQ5f5spSfp9.exeGet hashmaliciousUnknownBrowse
        • 141.11.185.137
        db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
        • 171.103.158.89
        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 171.103.5.185
        x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 180.214.218.62
        nshkarm5.elfGet hashmaliciousMiraiBrowse
        • 223.24.239.97
        sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 61.91.50.103
        2.elfGet hashmaliciousUnknownBrowse
        • 223.24.215.80
        jew.ppc.elfGet hashmaliciousUnknownBrowse
        • 171.102.72.219
        arm6.elfGet hashmaliciousUnknownBrowse
        • 223.24.239.68
        No context
        No context
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.824561329629545
        Encrypted:false
        SSDEEP:96:CIuFV+Rk6KsSh5GhiXSKQXIDcQgc6PcE9cw3l+HbHg/8BRTf3o8Fa9l7WUzuNwOk:Wt6K00eLnGjpBzuiFeZ24lO8/
        MD5:09961F2342013B664438CF78A94A188E
        SHA1:2CBC0B62D20ED12A6B34A7DB28103C8728F6D219
        SHA-256:B575D197476BB21A581822435FAF6602F2CA1B4BB665ED3DFAE3094B71D40884
        SHA-512:1DE717697730703C20F25F3FA5E59DC82677A8994A7ADCE49F94A91FEE9578CF823656B87F415CD1191100327859ACE32553539AE25B7E96B014C59A3A3F1BDD
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.4.8.5.4.4.4.9.4.3.7.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.4.8.5.4.4.8.2.2.4.9.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.1.f.5.a.9.5.-.c.b.f.9.-.4.9.2.2.-.8.5.9.4.-.5.d.a.3.c.b.1.5.3.f.b.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.b.d.2.f.b.6.-.a.7.b.0.-.4.c.0.b.-.b.6.d.7.-.5.c.b.b.3.d.1.8.8.b.3.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.T.b.x.H.h.K.6.l.s.S...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.a.8.-.0.0.0.1.-.0.0.1.3.-.5.e.4.4.-.d.6.7.8.0.3.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.d.0.1.1.a.2.9.8.2.c.5.e.3.7.9.2.0.a.5.d.2.c.a.b.0.f.d.9.8.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.5.6.d.a.3.f.7.a.b.2.c.e.6.7.e.b.2.c.5.c.0.f.2.c.5.f.5.d.2.a.8.f.f.b.2.f.2.6.0.7.!.T.b.x.H.h.K.6.l.s.S...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.2././.2.8.:.0.2.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Sat Dec 28 08:35:44 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):87160
        Entropy (8bit):1.4924658384665292
        Encrypted:false
        SSDEEP:192:8n7eorak3Oja7Ez80ybThfdMzgAsU3X2sWVwLPbFMyXd:oaUSjaA8nNdugAB3X2sWVwLBd
        MD5:176BF60394057041E93265CC97155FEE
        SHA1:3A507BB47BC7083EAB0ACA47EAF1C7671FFBBEBF
        SHA-256:BD88463C6A4F5E754128F53F0BEE0B1B0007C7A2763577608F2E5426E1DA506E
        SHA-512:F15BD6059536E0C8C73265E47520E7D2A13965A46E8089B5D9EB3813004465C219E10C942EDAB3498382E714B339D49B0CCDC3A251735136115DAD6F5627C574
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... .......`.og............$...............,............<..........T.......8...........T...........p....F......................................................................................................eJ......\.......Lw......................T...........Z.og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8826
        Entropy (8bit):3.702242380849986
        Encrypted:false
        SSDEEP:192:R6l7wVeJtnfMC6YehLhgmfcJF/pDP89bp+RTfIjm:R6lXJtfMC6YILhgmfcbKp0fR
        MD5:3E45C7357377CF9DDDF6B7BF56E95545
        SHA1:287797B39039B31B75525F822493EE51E7E04A54
        SHA-256:A232F8DB502DA92691374190ADFF3FEF4B5B5B0F31A9D23C0C3DA5BC100769B7
        SHA-512:DDA9D71C2B0F245DB10DD2E45B60209989A56EF95A13AECE4295ED348E4F1C06188DDC5098B3DE57D9FDA69184DACDB0CC191C2CA308697E688B46D6D7020479
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.4.8.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4766
        Entropy (8bit):4.459707954167912
        Encrypted:false
        SSDEEP:48:cvIwWl8zs+Jg771I9nMWpW8VYpYm8M4JOBNJsFaIyq8vCNJ2YZxh3Qnd:uIjf0I7Al7VFJOBBIWClJQnd
        MD5:49D4F53F059F08C659E78A6586BB124A
        SHA1:74B56CAC194E93C289D8372DE476800D758584A5
        SHA-256:87821A2C920D83DA99F3B70A9BB05475107FD6A2DD1EF39A5EAE39D143B79226
        SHA-512:EB72636BEC2DE05411CF6EB91D9F273238D65A6CD71EFC028F103B373D863C54A1AC9EA2620D43A5D37C5CAD7764A2EA67672BCA0F7EEFB52480EC3FFFB24392
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="650858" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.29890309704727
        Encrypted:false
        SSDEEP:6144:UECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8l9SD6VJSR9o:RCsL6seqD5SgSWVARy
        MD5:71B0D44F3862575B90EFDEDF643EE53E
        SHA1:50CFC33ABBE37935D628A22E85E11DF1047D3920
        SHA-256:D2477DE55CA79A49FCEEBF7D6879B22D19E69BEA451F920678E06C9BE4685073
        SHA-512:3B2079246E006D17BC0DF95341884A918E35ABD15EA458B62D8BC7CFF0030E8479D746B5B4944BD99850E0DC88924F01E90520BE7C784C514A8BB65F605237AD
        Malicious:false
        Reputation:low
        Preview:regfD...D....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..a|.Y................................................................................................................................................................................................................................................................................................................................................uH........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\TbxHhK6lsS.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):29
        Entropy (8bit):3.620936064750772
        Encrypted:false
        SSDEEP:3:jhMZvLVLyn:FgvBLyn
        MD5:B75633D66A88E5680C6BB255399254B2
        SHA1:8B41DCEBFD52F58E40232C00D44C703650FBD2CE
        SHA-256:35D596D6F7F4C37B96F18660C901B4F4F5A274C982A0D05991BE7D704B8382EF
        SHA-512:48D3E3164C7FDB851E775D8E21E1B73652F5FE0B6A6399B3874A7557D5901B224B7C4880855BFE2224EED764FD9B9366F2521C64424070489104C5D8D9548090
        Malicious:false
        Reputation:low
        Preview:.. Attempting to connect.....
        File type:PE32+ executable (console) x86-64, for MS Windows
        Entropy (8bit):7.987741101784346
        TrID:
        • Win64 Executable Console (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:TbxHhK6lsS.exe
        File size:7'577'088 bytes
        MD5:5d032ac0758ae1e144a1b551b3c0700f
        SHA1:56da3f7ab2ce67eb2c5c0f2c5f5d2a8ffb2f2607
        SHA256:bca0e02b9f5476783bdd8f063170d8c577bb83c533a220ef7e88409ad7ef71fa
        SHA512:3a1586bd2eeb1e2d8d098ee8803badaf6f73e2f1c8c643c3d5020b4120044640a1af9a5a0b66f8a7af7e4af554f65425bdae5409da6bd8845029966277479571
        SSDEEP:98304:SS7vuBF+VYZXBu60ZDHIlb50Tf83Tqn+ZYsLWzKwUXZTT16ONoLrQ1MI5fcXUseh:SavwYOMDZccfyI+ZBWyFp6uJ1MifUe
        TLSH:BA763345AAC26EF5E047CB7A45C234AD703D3FE191B65C063BCE3B414EA2628AD363D5
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....bog..........#....*.(...48................@.............................p............ ................................
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x140c89f13
        Entrypoint Section:.-<s
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows cui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x676F62B2 [Sat Dec 28 02:30:10 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:6123cc4f0fae004f33be7838cf2627be
        Instruction
        call 00007EFC54FE70A5h
        push esp
        jp 00006929h
        mov ebx, 8F1F79CAh
        mov dword ptr [3614AB8Eh], eax
        pop edx
        adc al, byte ptr [ebx+57F389EEh]
        das
        out dx, al
        sti
        adc al, 76h
        fcmovu st(0), st(6)
        mov ebp, dword ptr [edx+472F3729h]
        mov ch, 8Ch
        nop
        lodsb
        wait
        test al, 7Fh
        mov edx, 5EC0E0E8h
        das
        pop ds
        cmc
        dec edi
        aaa
        call far D975h : 4091E834h
        xor al, 6Ch
        mov byte ptr [ebp+30h], bl
        lea ebp, dword ptr [edi]
        push ecx
        xchg eax, esi
        or al, EFh
        or al, 00h
        add byte ptr [eax], al
        mov edx, E0D6C408h
        retn D168h
        jns 00007EFC54F36925h
        stc
        retf
        mov dword ptr [BAE2FBE2h], eax
        ror byte ptr [edx], 1
        or byte ptr [eax-57h], bl
        push E1EB2141h
        nop
        pop ebx
        push 0000004Bh
        xchg eax, ecx
        stosb
        and byte ptr [edx+5Bh], cl
        add byte ptr [edx], 0000004Bh
        dec ebx
        bound edx, dword ptr [edi-28h]
        mov dh, 3Eh
        xor bh, byte ptr [edi+1Eh]
        pop ebp
        pop ebx
        imul esp, dword ptr [edi], AAh
        cmpsd
        pushad
        pop edx
        or cl, byte ptr [edi]
        popfd
        mul dword ptr [ebx+5Bh]
        pop edx
        dec ebx
        fsub dword ptr [edx+3A6F6606h]
        sub eax, DAC771BFh
        jecxz 00007EFC54F368BBh
        int F7h
        dec edi
        iretd
        add eax, B93625EBh
        stc
        add edx, dword ptr [eax+22DB6C36h]
        sahf
        or al, A4h
        sub dword ptr [edi-48h], esp
        pop ecx
        sub dword ptr [edx-51B0AB98h], eax
        lds edi, fword ptr [eax]
        movsd
        arpl cx, bp
        inc esi
        aaa
        push edx
        jnp 00007EFC54F3694Dh
        cmpsb
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8a7c00x1f4.-<s
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc60000x1e0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xdbdc000x771c.-<s
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xdbdac00x140.-<s
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x68b0000x1a8..Xy
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x8269b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x840000x1cc940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xa10000x360cc80x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x4020000x4e240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .C"00x4070000x283c6a0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        ..Xy0x68b0000x12d80x14001cef768ea3e50932b400aaa7258cca1dFalse0.033984375data0.21663963508602493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .-<s0x68d0000x73831c0x738400150a384016ea4ef3e8b91cd6bbd40084unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xdc60000x1e00x2007b8a6d792b0be48adbb2f06a5c3068b1False0.5390625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0xdc60580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
        DLLImport
        KERNEL32.dllGetCurrentProcessId
        USER32.dllGetAsyncKeyState
        ADVAPI32.dllCryptEncrypt
        MSVCP140.dll?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
        WS2_32.dllhtonl
        WLDAP32.dll
        CRYPT32.dllCertCreateCertificateChainEngine
        Normaliz.dllIdnToAscii
        VCRUNTIME140.dllmemcpy
        VCRUNTIME140_1.dll__CxxFrameHandler4
        api-ms-win-crt-runtime-l1-1-0.dll__sys_nerr
        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
        api-ms-win-crt-heap-l1-1-0.dllrealloc
        api-ms-win-crt-utility-l1-1-0.dllqsort
        api-ms-win-crt-convert-l1-1-0.dllstrtoul
        api-ms-win-crt-environment-l1-1-0.dllgetenv
        api-ms-win-crt-stdio-l1-1-0.dll_read
        api-ms-win-crt-filesystem-l1-1-0.dll_access
        api-ms-win-crt-time-l1-1-0.dll_time64
        api-ms-win-crt-string-l1-1-0.dllstrncmp
        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
        api-ms-win-crt-conio-l1-1-0.dll_getch
        KERNEL32.dllGetSystemTimeAsFileTime
        KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Dec 28, 2024 09:35:43.863270044 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:43.982867956 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:43.982975960 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:43.987380981 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:44.106776953 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262145042 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262203932 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262224913 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262263060 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.262361050 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262382030 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262398958 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.262403011 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262423992 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262430906 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.262444019 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262473106 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.262571096 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262597084 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.262624979 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.381772041 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.381789923 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.381865978 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.454221010 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.454334974 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.454396963 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.458337069 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.459923983 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.459980011 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.459997892 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.468266010 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.468365908 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.468421936 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.476689100 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.476768017 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.476794004 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.485027075 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.485099077 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.485135078 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:45.493343115 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:45.493460894 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:35:51.262923956 CET354249711141.11.185.137192.168.2.11
        Dec 28, 2024 09:35:51.263026953 CET497113542192.168.2.11141.11.185.137
        Dec 28, 2024 09:36:49.721200943 CET497113542192.168.2.11141.11.185.137
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 28, 2024 09:35:37.928070068 CET1.1.1.1192.168.2.110xd263No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Dec 28, 2024 09:35:37.928070068 CET1.1.1.1192.168.2.110xd263No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
        • 141.11.185.137:3542
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.1149711141.11.185.13735427848C:\Users\user\Desktop\TbxHhK6lsS.exe
        TimestampBytes transferredDirectionData
        Dec 28, 2024 09:35:43.987380981 CET65OUTGET /version HTTP/1.1
        Host: 141.11.185.137:3542
        Accept: */*
        Dec 28, 2024 09:35:45.262145042 CET1236INHTTP/1.1 200 OK
        Content-Type: application/json
        Data: 606808280860d230ea3850aa68a2da38da684028d268e23058a240aa603058b258ba6830403870aa403870b268ba00b270a2e2300820ea287828
        Access: 0808482060009238825810a200c29a30b2080020ba08a23830c200a2085018ba30da2838285830a2285830ba00da40ba18c2a2386040aa201048
        Date: Sat, 28 Dec 2024 08:35:45 GMT
        Connection: keep-alive
        Keep-Alive: timeout=5
        Transfer-Encoding: chunked
        Data Raw: 36 39 30 65 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 56 6d 30 77 64 32 51 79 55 58 6c 56 57 47 78 57 56 30 64 34 57 46 6c 55 52 6e 64 55 4d 56 70 7a 57 6b 5a 4f 57 46 4a 73 62 44 4e 58 61 32 4d 31 56 6a 46 4b 63 32 4a 45 54 6c 68 68 4d 6b 30 78 56 6a 42 61 53 32 4d 79 53 6b 56 55 62 47 68 6f 54 56 56 77 56 56 5a 74 63 45 74 54 4d 55 6c 35 55 32 74 57 56 57 4a 48 61 47 39 55 56 6c 5a 33 56 6c 5a 61 64 47 4e 46 5a 46 52 4e 62 45 70 4a 56 6d 31 30 63 32 46 57 53 6e 52 56 61 7a 6c 61 56 6a 4e 6f 61 46 70 57 57 6d 46 6b 52 31 5a 48 56 32 31 34 55 32 4a 48 64 7a 46 57 61 32 51 77 59 7a 4a 47 63 31 4e 75 55 6c 5a 68 65 6d 78 68 56 6d 70 4f 55 32 46 47 56 58 68 58 62 55 5a 72 55 6a 41 31 52 31 64 72 57 6e 64 57 4d 44 46 46 55 6c 52 47 56 31 5a 46 62 33 64 57 61 6b 5a 68 56 30 5a 4f 63 6d 46 48 61 46 4e 6c 62 58 68 58 56 6d 30 78 4e 46 6c 56 4d 48 68 58 62 6b 35 59 59 6c 56 61 63 56 5a 74 63 7a 46 6c 52 6c 70 59 5a 55 68 6b 56 30 31 45 52 6c 64 5a 4d 46 70 7a 56 6a 46 61 4e 6c 46 59 61 46 64 53 52 58 42 49 [TRUNCATED]
        Data Ascii: 690e{"message":"Vm0wd2QyUXlVWGxWV0d4WFlURndUMVpzWkZOWFJsbDNXa2M1VjFKc2JETlhhMk0xVjBaS2MySkVUbGhoTVVwVVZtcEtTMUl5U2tWVWJHaG9UVlZ3VlZadGNFZFRNbEpJVm10c2FWSnRVazlaVjNoaFpWWmFkR1ZHV214U2JHdzFWa2QwYzJGc1NuUlZhemxhVmpOU2FGVXhXbUZrUjA1R1drWndWMDFFUlRGV1ZFb3dWakZhV0ZOcmFHaFNlbXhXVm0xNFlVMHhXbk5YYlVacVZtczFlRlpYZUhkV01ERldZMFpzVjFaNlFYaFdSRXBIVmpGT1dWcEdhR2xTYTNCWlYxZDRiMkl5Vm5OVmJGWlRZbGhTV0ZSV2FFTlRiR3QzV2tSU1ZrMXJjRWxhU0hCRFZqRmFSbUV6YUZaaGExcG9WakJhVDJOdFJrZFhiV3hUVFcxb1dGWnRNVEJXTVd4WFZHdGtWbUpHV2xSWmJHaFRWMFpTVjFkdVpFNVNiRm93V2xWYVQxWlhTa2RqUkVaV1ZqTm9NMVpxUm1GU2JVbDZXa1pvVjJKV1NrbFdiWEJIVkRKU1YxVnVVbXBTYkVwVVZteG9RMWRXV1hoWGJYUk9VakZHTlZaWE5VOVdiVXB6VTI1T1ZtRnJTbWhaTVZwaFpFZE9ObEp0ZUZOaVNFSmFWMnhXYWs1WFJrZFhiazVxVTBkNFdGUldaRzlOTVZweFVtdDBhazFyTlVsWlZWcHJZVWRGZUdOSE9WaGhNVnBvVmtSS1QyUkdTbkpoUjJoVFlYcFdkMVp0Y0V0a


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:03:35:38
        Start date:28/12/2024
        Path:C:\Users\user\Desktop\TbxHhK6lsS.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\TbxHhK6lsS.exe"
        Imagebase:0x140000000
        File size:7'577'088 bytes
        MD5 hash:5D032AC0758AE1E144A1B551B3C0700F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:03:35:38
        Start date:28/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff68cce0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:5
        Start time:03:35:44
        Start date:28/12/2024
        Path:C:\Windows\System32\WerFault.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\WerFault.exe -u -p 7848 -s 368
        Imagebase:0x7ff749550000
        File size:570'736 bytes
        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly