Edit tour

Windows Analysis Report
flexi.exe

Overview

General Information

Sample name:flexi.exe
Analysis ID:1653503
MD5:a5c8f336f1650812ca490982db01e986
SHA1:8e3efaf68a85102ef6da4e471bd47b4e12847eda
SHA256:bbcfc9e5628567631dc81e101282e2d2f402a4921fe8cb0cbaa4d80aa22bd832
Infos:

Detection

Score:2
Range:0 - 100
Confidence:80%

Signatures

Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w11x64_office
  • flexi.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\flexi.exe" MD5: A5C8F336F1650812CA490982DB01E986)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: flexi.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: browser.events.data.msn.cn
Source: flexi.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: flexi.exeStatic PE information: Section: .AKS1 ZLIB complexity 1.0003226143973214
Source: classification engineClassification label: clean2.winEXE@1/0@1/0
Source: C:\Users\user\Desktop\flexi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: alleg44.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: libgcc_s_dw2-1.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: libstdc++-6.dllJump to behavior
Source: C:\Users\user\Desktop\flexi.exeSection loaded: tvichw32.dllJump to behavior
Source: flexi.exeStatic file information: File size 5590503 > 1048576
Source: flexi.exeStatic PE information: Raw size of .AKS2 is bigger than: 0x100000 < 0x3a2a00
Source: initial sampleStatic PE information: section where entry point is pointing to: .AKS3
Source: flexi.exeStatic PE information: real checksum: 0x3ff9dc should be: 0x560270
Source: flexi.exeStatic PE information: section name: .AKS1
Source: flexi.exeStatic PE information: section name: .AKS2
Source: flexi.exeStatic PE information: section name: .AKS3
Source: flexi.exeStatic PE information: section name: .AKS1 entropy: 7.999350780667601
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
2
Software Packing
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1653503 Sample: flexi.exe Startdate: 01/04/2025 Architecture: WINDOWS Score: 2 7 onedscolprdwus21.westus.cloudapp.azure.com 2->7 9 global.asimov.events.data.trafficmanager.net 2->9 11 browser.events.data.msn.cn 2->11 5 flexi.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
onedscolprdwus21.westus.cloudapp.azure.com
20.189.173.27
truefalse
    high
    browser.events.data.msn.cn
    unknown
    unknownfalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1653503
      Start date and time:2025-04-01 10:47:15 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 54s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
      Number of analysed new started processes analysed:20
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:flexi.exe
      Detection:CLEAN
      Classification:clean2.winEXE@1/0@1/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.109.210.53
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      onedscolprdwus21.westus.cloudapp.azure.comvigilanz.exeGet hashmaliciousUnknownBrowse
      • 20.189.173.27
      Setup.exeGet hashmaliciousUnknownBrowse
      • 20.189.173.27
      VtrZVhhVGV.msiGet hashmaliciousRedLineBrowse
      • 20.189.173.27
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Entropy (8bit):7.103011134576926
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.94%
      • Win16/32 Executable Delphi generic (2074/23) 0.02%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • VXD Driver (31/22) 0.00%
      File name:flexi.exe
      File size:5'590'503 bytes
      MD5:a5c8f336f1650812ca490982db01e986
      SHA1:8e3efaf68a85102ef6da4e471bd47b4e12847eda
      SHA256:bbcfc9e5628567631dc81e101282e2d2f402a4921fe8cb0cbaa4d80aa22bd832
      SHA512:5030b3aa1a3007ee2a93adfcb9cb34cceab15456b57e3db832d83f902761693e7dd5be98b9ef58477b9c0605e2dde8e59e7a184dcc1f4a9d6af2fb46eaa4d20f
      SSDEEP:98304:L/3Ec2rVbet4oevgWCn0dTVpmUCyhoSChvJld95N0:L/3d2r5etTBaVp9CQ36Jld9j0
      TLSH:2B4612B076A4DD4DD941063D5DB6C2DA2B39BD41CF22575332E07F6FAEBA2C22E51202
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P.......C...................."...._...........@...........................`.......?....... ............................
      Icon Hash:90969696969696a8
      Entrypoint:0x9ff000
      Entrypoint Section:.AKS3
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      DLL Characteristics:
      Time Stamp:0x2E2E350 [Thu Jul 15 11:02:40 1971 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:36eccbb6fdd5e9f03b588dff2b113ed7
      Instruction
      push edi
      push esi
      push ebx
      push ecx
      call 00007F1E80B78726h
      mov edi, 05720558h
      add byte ptr [eax], al
      push eax
      mov esi, dword ptr [eax]
      add esi, eax
      mov edi, esi
      lodsd
      shl eax, 0Ch
      mov ecx, eax
      push eax
      lodsd
      sub ecx, eax
      add ecx, edi
      mov esi, ecx
      mov ecx, eax
      push edi
      push ecx
      call 00007F1E80B78726h
      mov ecx, 47C2815Ah
      add eax, 128A0000h
      sub ecx, 01h
      jne 00007F1E80B78723h
      or dword ptr [ebx+edx*8+0224850Fh], 00810000h
      jmp 00007F1E80B7872Bh
      jc 00007F1E80B789B0h
      jmp 00007F1E80B788E1h
      cmp ecx, edx
      jnc 00007F1E80B7876Bh
      mov ebx, ecx
      lodsb
      inc ecx
      jne 00007F1E80B78723h
      mov eax, 850FD38Ch
      dec ebp
      add al, byte ptr [eax]
      add byte ptr [eax+7209EBC1h], bh
      xor al, 24h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xb70000x458.AKS2
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6000000x284.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x5ff5a00x18.AKS3
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xb71a40x88.AKS2
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .AKS10x10000xb60000x540009905ad0b42d73b5c771f64fab3fe6f9eFalse1.0003226143973214OpenPGP Secret Key7.999350780667601IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .AKS20xb70000x5480000x3a2a008f5f2bbcdae3c6d5fb595a4efb94d620unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .AKS30x5ff0000x5e30x6007d2ab3aa7e8ca18288bd1bd2eecaa522False0.798828125data6.355007480390883IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x6000000x2840x4008179e4231cf9119c315519b983403345False0.3447265625data3.911572949878916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x6000580x22cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5503597122302158
      DLLImport
      KERNEL32GetModuleHandleA, GetProcAddress
      user32.dllGetDC
      advapi32.dllGetAce
      iphlpapi.dllGetIfTable
      shell32.dllILFree
      hid.dllHidP_GetCaps
      setupapi.dllSetupInstallFileA
      dhcpcsvc.dllDhcpIsEnabled
      dhcpcsvc6.dllDhcpv6IsEnabled
      psapi.dllEnumProcesses
      wsock32.dllbind
      alleg44.dllblit
      libgcc_s_dw2-1.dll__udivdi3
      libstdc++-6.dll_Znaj
      TVicHW32.dll_MaskIRQ@8
      msvcrt.dllcos
      GDI32.dllDeleteDC
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Download Network PCAP: filteredfull

      TimestampSource PortDest PortSource IPDest IP
      Apr 1, 2025 10:48:08.798752069 CEST5939353192.168.2.241.1.1.1
      Apr 1, 2025 10:48:08.883622885 CEST53593931.1.1.1192.168.2.24
      Apr 1, 2025 10:48:55.385200024 CEST5356394162.159.36.2192.168.2.24
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 1, 2025 10:48:08.798752069 CEST192.168.2.241.1.1.10x2782Standard query (0)browser.events.data.msn.cnA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 1, 2025 10:48:08.883622885 CEST1.1.1.1192.168.2.240x2782No error (0)browser.events.data.msn.cnglobal.asimov.events.data.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
      Apr 1, 2025 10:48:08.883622885 CEST1.1.1.1192.168.2.240x2782No error (0)global.asimov.events.data.trafficmanager.netonedscolprdwus21.westus.cloudapp.azure.comCNAME (Canonical name)IN (0x0001)false
      Apr 1, 2025 10:48:08.883622885 CEST1.1.1.1192.168.2.240x2782No error (0)onedscolprdwus21.westus.cloudapp.azure.com20.189.173.27A (IP address)IN (0x0001)false
      050100s020406080100

      Click to jump to process

      050100s0.00510MB

      Click to jump to process

      Target ID:1
      Start time:04:48:16
      Start date:01/04/2025
      Path:C:\Users\user\Desktop\flexi.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\flexi.exe"
      Imagebase:0x400000
      File size:5'590'503 bytes
      MD5 hash:A5C8F336F1650812CA490982DB01E986
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      No disassembly