Edit tour

Windows Analysis Report
visionApps.exe

Overview

General Information

Sample name:visionApps.exe
Analysis ID:1582401
MD5:a9bcdee7dad18adc545c4003b77a2d62
SHA1:22c26b9477fd4ab239c7b87d455c33d4b3812955
SHA256:afae7ce6ac27def4018c9d72c62a615cefaa9d31c1efb94a06ead659d235bba1
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Yara detected Credential Stealer

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w7x64
  • visionApps.exe (PID: 3380 cmdline: "C:\Users\user\Desktop\visionApps.exe" MD5: A9BCDEE7DAD18ADC545C4003B77A2D62)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: visionApps.exe PID: 3380JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Process Memory Space: visionApps.exe PID: 3380JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: visionApps.exeAvira: detected
      Source: visionApps.exeReversingLabs: Detection: 52%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.2% probability
      Source: visionApps.exeJoe Sandbox ML: detected
      Source: Binary string: T.pDbW source: visionApps.exe, 00000000.00000002.885538405.0000000002412000.00000040.00000001.01000000.00000003.sdmp
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMedia
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0A
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0X
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://pki-ocsp.symauth.com0
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004C1000.00000004.00001000.00020000.00000000.sdmp, visionApps.exe, 00000000.00000002.885395189.00000000012D1000.00000020.00000001.01000000.00000003.sdmp, visionApps.exe, 00000000.00000003.363139560.0000000000140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/

      System Summary

      barindex
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\visionApps.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\visionApps.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
      Source: visionApps.exeStatic PE information: Number of sections : 18 > 10
      Source: visionApps.exe, 00000000.00000002.885223342.000000000048D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs visionApps.exe
      Source: visionApps.exeStatic PE information: Section: ZLIB complexity 1.001953125
      Source: visionApps.exeStatic PE information: Section: ZLIB complexity 0.9945721293604651
      Source: visionApps.exeStatic PE information: Section: ZLIB complexity 1.000351688102894
      Source: visionApps.exeStatic PE information: Section: ZLIB complexity 0.997314453125
      Source: visionApps.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
      Source: classification engineClassification label: mal100.spyw.evad.winEXE@1/1@0/0
      Source: C:\Users\user\Desktop\visionApps.exeFile created: C:\Users\user\Desktop\error.logJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeMutant created: \Sessions\1\BaseNamedObjects\fedd1d1122aa65028c81e16ceb85d9c73790a2fa
      Source: C:\Users\user\Desktop\visionApps.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: visionApps.exeReversingLabs: Detection: 52%
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: wow64win.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: wow64cpu.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: magnification.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: d3d9.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: d3d8thk.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: security.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: idndl.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: winnsi.dllJump to behavior
      Source: visionApps.exeStatic file information: File size 12638224 > 1048576
      Source: visionApps.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x138400
      Source: visionApps.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x9af000
      Source: Binary string: T.pDbW source: visionApps.exe, 00000000.00000002.885538405.0000000002412000.00000040.00000001.01000000.00000003.sdmp
      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name:
      Source: visionApps.exeStatic PE information: section name: .themida
      Source: visionApps.exeStatic PE information: section name: .boot
      Source: visionApps.exeStatic PE information: section name: entropy: 7.932894477716919

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\visionApps.exeWindow searched: window name: RegmonClassJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeWindow searched: window name: FilemonClassJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\visionApps.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSection loaded: OutputDebugStringW count: 1960
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 name: DriverDescJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeWindow / User API: threadDelayed 9165Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exe TID: 3452Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exe TID: 3456Thread sleep time: -83500s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exe TID: 3452Thread sleep time: -99000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exe TID: 3452Thread sleep time: -9165000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\visionApps.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: regmonclass
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: gbdyllo
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: procmon_window_class
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: ollydbg
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: filemonclass
      Source: C:\Users\user\Desktop\visionApps.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\visionApps.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\visionApps.exeProcess queried: DebugPortJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: Process Memory Space: visionApps.exe PID: 3380, type: MEMORYSTR
      Source: visionApps.exe, 00000000.00000002.885338793.00000000005A2000.00000004.00000020.00020000.00000000.sdmp, visionApps.exe, 00000000.00000002.885223342.000000000052F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager

      Stealing of Sensitive Information

      barindex
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004DE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: /C:\Users\user\AppData\Roaming\Electrum\wallets
      Source: visionApps.exe, 00000000.00000002.885223342.000000000050B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: RC:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbq
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ethereum
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004C8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 4C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsp
      Source: visionApps.exe, 00000000.00000002.885223342.00000000004AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: Yara matchFile source: Process Memory Space: visionApps.exe PID: 3380, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping52
      Security Software Discovery
      Remote Services1
      Data from Local System
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      441
      Virtualization/Sandbox Evasion
      LSASS Memory2
      Process Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Software Packing
      Security Account Manager441
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Obfuscated Files or Information
      Cached Domain Credentials2
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582401 Sample: visionApps.exe Startdate: 30/12/2024 Architecture: WINDOWS Score: 100 8 Antivirus / Scanner detection for submitted sample 2->8 10 Multi AV Scanner detection for submitted file 2->10 12 Yara detected Powershell download and execute 2->12 14 3 other signatures 2->14 5 visionApps.exe 1 2->5         started        process3 signatures4 16 Query firmware table information (likely to detect VMs) 5->16 18 Tries to detect sandboxes and other dynamic analysis tools (window names) 5->18 20 Found many strings related to Crypto-Wallets (likely being stolen) 5->20 22 4 other signatures 5->22

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      visionApps.exe53%ReversingLabsWin32.Trojan.Midie
      visionApps.exe100%AviraTR/Crypt.ZPACK.Gen
      visionApps.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMediavisionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpfalse
          high
          http://www.indyproject.org/visionApps.exe, 00000000.00000002.885223342.00000000004C1000.00000004.00001000.00020000.00000000.sdmp, visionApps.exe, 00000000.00000002.885395189.00000000012D1000.00000020.00000001.01000000.00000003.sdmp, visionApps.exe, 00000000.00000003.363139560.0000000000140000.00000004.00001000.00020000.00000000.sdmpfalse
            high
            http://pki-ocsp.symauth.com0visionApps.exe, 00000000.00000002.885464821.0000000001795000.00000002.00000001.01000000.00000003.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1582401
              Start date and time:2024-12-30 14:57:12 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 1s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:visionApps.exe
              Detection:MAL
              Classification:mal100.spyw.evad.winEXE@1/1@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
              • VT rate limit hit for: visionApps.exe
              TimeTypeDescription
              08:58:14API Interceptor7875162x Sleep call for process: visionApps.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\visionApps.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):68
              Entropy (8bit):4.649367989164738
              Encrypted:false
              SSDEEP:3:HMMABc9IKRUeemm1SzORWyEHgy:HMcIKCeS1SzOAyMgy
              MD5:73809BC1934D68CBF5F52CF7F34022C1
              SHA1:2C512F93E713CAFB037D851119F28033D38EE64B
              SHA-256:FC4D5B2946811DBB6E26C2D6E0560D2C9FF856FEA46A9280E416E6A7A6EEC3C8
              SHA-512:EE3C36510FA265955D6FDD8EFEB3786D00BB2E7951BCFD6CBF1F1F5D664073B75CE02B7F84B2C9A8B6EEB3501E483DC148BAFC7D8212775099712B7892AD86C1
              Malicious:false
              Reputation:low
              Preview:The specified path was not found..[C:\Users\user\Desktop\Wallets]..
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.963063695848639
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:visionApps.exe
              File size:12'638'224 bytes
              MD5:a9bcdee7dad18adc545c4003b77a2d62
              SHA1:22c26b9477fd4ab239c7b87d455c33d4b3812955
              SHA256:afae7ce6ac27def4018c9d72c62a615cefaa9d31c1efb94a06ead659d235bba1
              SHA512:45225a0710d69ddf86085c3a4a133355dfb23687e1a86427a29c5b6927b5ceb8fc6ba9cd3ca5da121a02900841c1a229cdf5da8ca5469747ed9ef342c34a3443
              SSDEEP:196608:kLIW3bfS8FJRPqGmun3eyBeen8+tSchLsjOuUq//NVS0dvu1xsVxIpPnNBlpPWwb:kE4LSgJwAD8IRcTBdvu1nj1tP
              TLSH:F0D633E72D817EA6C0A642B27C53893D8C67EC174B021626F61FF6E8817648CDFB4725
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:6d69ccc6cee8698e
              Entrypoint:0x183b058
              Entrypoint Section:.boot
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
              Time Stamp:0x676CB17A [Thu Dec 26 01:29:30 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:a40063ea92d50d06089bbce29ca8b0fd
              Instruction
              call 00007FA27C5013A0h
              push ebx
              mov ebx, esp
              push ebx
              mov esi, dword ptr [ebx+08h]
              mov edi, dword ptr [ebx+10h]
              cld
              mov dl, 80h
              mov al, byte ptr [esi]
              inc esi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FA27C50123Ch
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FA27C5012A3h
              xor eax, eax
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jnc 00007FA27C501337h
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              je 00007FA27C50125Ah
              push edi
              mov eax, eax
              sub edi, eax
              mov al, byte ptr [edi]
              pop edi
              mov byte ptr [edi], al
              inc edi
              mov ebx, 00000002h
              jmp 00007FA27C5011EBh
              mov eax, 00000001h
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc eax, eax
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FA27C50123Ch
              sub eax, ebx
              mov ebx, 00000001h
              jne 00007FA27C50127Ah
              mov ecx, 00000001h
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              adc ecx, ecx
              add dl, dl
              jne 00007FA27C501257h
              mov dl, byte ptr [esi]
              inc esi
              adc dl, dl
              jc 00007FA27C50123Ch
              push esi
              mov esi, edi
              sub esi, ebp
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x5be0000x73.edata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x5bf19c0x184.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c10000x5170.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1dea0000x10.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x5c00680x18.tls
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x38f0000x60ee
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              0x10000x35aab40x13840042872fb584633a956e8eec17ce610986unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x35c0000x29b40x1600838dbba2e73b1deda6b6dcfc16bea71cFalse1.001953125data7.932894477716919IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              0x35f0000x236680xac00d70c1edd0a4453ed956272fbfed1e4fdFalse0.9945721293604651data7.955529544161205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x3830000x74e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x38b0000x39700x6006e436bebae7564ae9fc9aab5a192763cFalse0.75data6.259561689972243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x38f0000x60ee0x1a0022a8d9bf1e133aa732e8677836bfcfbeFalse0.9281850961538461data7.816525222438721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3960000x730x20016bceb89e14849853bddcee162e1d3cbFalse0.869140625data6.507695025778999IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x3970000x540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x3980000x5d0x2008bf6dcf1de84fb33652c34e7f142f211False0.783203125data6.0615254170991335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x3990000x469180x26e00251a44cc1a2cc59992ac634ea4e28ae3False1.000351688102894data7.977464852784368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              0x3e00000x1dde000xeb0004093838d03193b41696cd624f7bc3756False0.997314453125data7.948755428431936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .edata0x5be0000x10000x20025f05a68c8caf70819ef9d4ad2877234False0.185546875data1.3684183947250006IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .idata0x5bf0000x10000x400f431fd4b7e7939991a477eb9a2763ddaFalse0.3876953125data3.4782460840285476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x5c00000x10000x2003278ffaa0a03a7a41e5dfb4614b91ce1False0.044921875data0.09262353601004472IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x5c10000x52000x5200bd47e9106fa77945b2fe790e3f15c8f4False0.11332888719512195data3.284124516417105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .themida0x5c70000xe740000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .boot0x143b0000x9af0000x9af0003f616ae884dec5a194261e8f4a23eeccunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .reloc0x1dea0000x10000x102dedd6598f48c4787036d1e4bd127119False1.5GLS_BINARY_LSB_FIRST2.202819531114783IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x5c114c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.04292631081719414
              RT_STRING0x5c53840x48cdata0.40463917525773196
              RT_GROUP_ICON0x5c58200x14dataEnglishUnited States1.1
              RT_VERSION0x5c58440x20cdataEnglishUnited States0.4770992366412214
              RT_MANIFEST0x5c5a600x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
              DLLImport
              kernel32.dllGetModuleHandleA
              winspool.drvDocumentPropertiesW
              comctl32.dllImageList_GetImageInfo
              shell32.dllShell_NotifyIconW
              user32.dllMoveWindow
              version.dllGetFileVersionInfoSizeW
              oleaut32.dllSafeArrayPutElement
              advapi32.dllRegSetValueExW
              msvcrt.dllisupper
              WTSAPI32.DLLWTSUnRegisterSessionNotification
              ole32.dllIsEqualGUID
              gdi32.dllPie
              Magnification.dllMagSetWindowSource
              NameOrdinalAddress
              __dbk_fcall_wrapper20x4119f8
              dbkFCallWrapperAddr10x786644
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found
              050100150200s020406080100

              Click to jump to process

              050100150200s0.00102030MB

              Click to jump to process

              • File
              • Registry

              Click to dive into process behavior distribution

              Target ID:0
              Start time:08:58:13
              Start date:30/12/2024
              Path:C:\Users\user\Desktop\visionApps.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\visionApps.exe"
              Imagebase:0x12d0000
              File size:12'638'224 bytes
              MD5 hash:A9BCDEE7DAD18ADC545C4003B77A2D62
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low
              Has exited:false

              No disassembly