Edit tour

Windows Analysis Report
StreamViewerBot.exe

Overview

General Information

Sample name:StreamViewerBot.exe
Analysis ID:1653652
MD5:b8a2f2a0459a724be181b415dd447929
SHA1:58ed4b55c74fc08c08a19a393a15d581d92c6c70
SHA256:4c54f3ecae5da1ea51d8d43547d443ba725a1b88c62ae62bd9d766134158710e
Tags:exejmutanensoftwareOyuser-SquiblydooBlog
Infos:

Detection

Score:3
Range:0 - 100
Confidence:80%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • StreamViewerBot.exe (PID: 6404 cmdline: "C:\Users\user\Desktop\StreamViewerBot.exe" MD5: B8A2F2A0459A724BE181B415DD447929)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: StreamViewerBot.exeStatic PE information: certificate valid
Source: StreamViewerBot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Administrator\source\repos\NewTorp\NewTorp\obj\x64\Release\StreamViewerBot.pdb source: StreamViewerBot.exe
Source: C:\Users\user\Desktop\StreamViewerBot.exeCode function: 4x nop then dec eax
Source: StreamViewerBot.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: StreamViewerBot.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
Source: StreamViewerBot.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: StreamViewerBot.exeString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
Source: StreamViewerBot.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
Source: StreamViewerBot.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: StreamViewerBot.exeString found in binary or memory: http://ocsps.ssl.com0
Source: StreamViewerBot.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: StreamViewerBot.exeString found in binary or memory: http://ocsps.ssl.com0P
Source: StreamViewerBot.exe, 00000000.00000002.849165525.000001AC29BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: StreamViewerBot.exeString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
Source: StreamViewerBot.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: StreamViewerBot.exeString found in binary or memory: https://www.ssl.com/repository0
Source: StreamViewerBot.exeStatic PE information: No import functions for PE file found
Source: classification engineClassification label: clean3.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\StreamViewerBot.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\StreamViewerBot.exe.logJump to behavior
Source: C:\Users\user\Desktop\StreamViewerBot.exeMutant created: NULL
Source: StreamViewerBot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: StreamViewerBot.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\StreamViewerBot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: mscoree.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\Desktop\StreamViewerBot.exeSection loaded: ucrtbase_clr0400.dll
Source: StreamViewerBot.exeStatic PE information: certificate valid
Source: StreamViewerBot.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: StreamViewerBot.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: StreamViewerBot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: StreamViewerBot.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Administrator\source\repos\NewTorp\NewTorp\obj\x64\Release\StreamViewerBot.pdb source: StreamViewerBot.exe
Source: StreamViewerBot.exeStatic PE information: 0xB7091D78 [Sat Apr 23 23:44:56 2067 UTC]
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\StreamViewerBot.exeMemory allocated: 1AC27FF0000 memory reserve | memory write watch
Source: C:\Users\user\Desktop\StreamViewerBot.exeMemory allocated: 1AC41BD0000 memory reserve | memory write watch
Source: C:\Users\user\Desktop\StreamViewerBot.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\StreamViewerBot.exe TID: 6464Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\StreamViewerBot.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\StreamViewerBot.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\StreamViewerBot.exeQueries volume information: C:\Users\user\Desktop\StreamViewerBot.exe VolumeInformation
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1653652 Sample: StreamViewerBot.exe Startdate: 01/04/2025 Architecture: WINDOWS Score: 3 4 StreamViewerBot.exe 1 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
StreamViewerBot.exe3%ReversingLabs
StreamViewerBot.exe6%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0StreamViewerBot.exefalse
    high
    http://crls.ssl.com/ssl.com-rsa-RootCA.crl0StreamViewerBot.exefalse
      high
      http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0StreamViewerBot.exefalse
        high
        https://www.ssl.com/repository0StreamViewerBot.exefalse
          high
          http://ocsps.ssl.com0?StreamViewerBot.exefalse
            high
            http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0StreamViewerBot.exefalse
              high
              http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QStreamViewerBot.exefalse
                high
                http://ocsps.ssl.com0StreamViewerBot.exefalse
                  high
                  http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0StreamViewerBot.exefalse
                    high
                    http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0StreamViewerBot.exefalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStreamViewerBot.exe, 00000000.00000002.849165525.000001AC29BD1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0StreamViewerBot.exefalse
                          high
                          http://ocsps.ssl.com0PStreamViewerBot.exefalse
                            high
                            No contacted IP infos
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1653652
                            Start date and time:2025-04-01 14:07:14 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 1m 54s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:2
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:StreamViewerBot.exe
                            Detection:CLEAN
                            Classification:clean3.winEXE@1/1@0/0
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 60%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): dllhost.exe
                            • Execution Graph export aborted for target StreamViewerBot.exe, PID 6404 because it is empty
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\StreamViewerBot.exe
                            File Type:CSV text
                            Category:dropped
                            Size (bytes):226
                            Entropy (8bit):5.355760272568367
                            Encrypted:false
                            SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2FDkwIyp1v:Q3La/KDLI4MWuPXcp1v
                            MD5:FC3575D5BE1A5405683DC33B66D36243
                            SHA1:1C816D34B7D5B96E077DC3EF640BA8C7BA370502
                            SHA-256:1D7F7FBA862417A1D0351C1BF454F1A9BB0ED7FFD5DF1112EED802C01BDDA50C
                            SHA-512:68914FE00F8550A623074F9ACC31ACEF8A3F6DFDDBD9FDA23512079BEC5E8A4D4E82BC8CD8D536E6C88F4DA3A704AC376785B44343BD3BED83E440857A3C0164
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..
                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.654645673199643
                            TrID:
                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                            • Win64 Executable GUI (202006/5) 46.43%
                            • Win64 Executable (generic) (12005/4) 2.76%
                            • Generic Win/DOS Executable (2004/3) 0.46%
                            • DOS Executable Generic (2002/1) 0.46%
                            File name:StreamViewerBot.exe
                            File size:16'952 bytes
                            MD5:b8a2f2a0459a724be181b415dd447929
                            SHA1:58ed4b55c74fc08c08a19a393a15d581d92c6c70
                            SHA256:4c54f3ecae5da1ea51d8d43547d443ba725a1b88c62ae62bd9d766134158710e
                            SHA512:c2efeaa6b71f3e07034925280ad5a71feb61071c22a81d149fbeac74f3576856bda48e1090b1da11f7d0c272dfb424e10866d87a8433a4f263b23414fb86630b
                            SSDEEP:384:sSblHQ4dy7v6PptYcFwVc03KEFCpmwVJCMhCm/HQ:/pM6htYcFwVc6KEFW9qpKw
                            TLSH:65724C864A984271DF724B31F8F29B43DF33A9DB69499EDF704CC4053F91781AA2316A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...x............."...0.................. .....@..... .......................`.......C....`...@......@............... .....
                            Icon Hash:2535952dd2d2dad2
                            Entrypoint:0x140000000
                            Entrypoint Section:
                            Digitally signed:true
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0xB7091D78 [Sat Apr 23 23:44:56 2067 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:
                            Signature Valid:true
                            Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                            Signature Validation Error:The operation completed successfully
                            Error Number:0
                            Not Before, Not After
                            • 03/03/2025 18:10:55 03/03/2026 18:10:55
                            Subject Chain
                            • OID.1.3.6.1.4.1.311.60.2.1.3=FI, OID.2.5.4.15=Private Organization, CN=jmutanen software Oy, SERIALNUMBER=2728936-9, O=jmutanen software Oy, L=Jyv\xe4skyl\xe4, S=Central Finland, C=FI
                            Version:3
                            Thumbprint MD5:33B8345A353510998036729A4C78BF94
                            Thumbprint SHA-1:7B4DC3ABE54BD12C68D053F7CA414006B6AAADE5
                            Thumbprint SHA-256:822EF8B22669C1721F29C194B8EFF2DE3BEB2598A567E38F4E57C35CA2475089
                            Serial:5D0F3064FC92CC703EF200CA9C344F56
                            Instruction
                            dec ebp
                            pop edx
                            nop
                            add byte ptr [ebx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x130c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2038
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2b080x38.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xbb00xc0042a980e134f75420868dedf0b3c384b4False0.5543619791666666data5.206489257009738IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x40000x130c0x1400a8888ff1b25a6c12374c5bbc7380dabfFalse0.3640625data4.877452559887312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x41000x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.3108108108108108
                            RT_GROUP_ICON0x42380x14data1.15
                            RT_VERSION0x425c0x348data0.42857142857142855
                            RT_MANIFEST0x45b40xd53XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.38463793608912344
                            DescriptionData
                            Translation0x0000 0x04b0
                            CommentsStream Viewer Bot
                            CompanyName
                            FileDescriptionStreamViewerBot
                            FileVersion24.06.20.0
                            InternalNameStreamViewerBot.exe
                            LegalCopyright
                            LegalTrademarks
                            OriginalFilenameStreamViewerBot.exe
                            ProductNameSVB
                            ProductVersion24.06.20.0
                            Assembly Version24.6.20.0
                            No network behavior found
                            No statistics
                            Target ID:0
                            Start time:08:08:05
                            Start date:01/04/2025
                            Path:C:\Users\user\Desktop\StreamViewerBot.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\StreamViewerBot.exe"
                            Imagebase:0x1ac27cc0000
                            File size:16'952 bytes
                            MD5 hash:B8A2F2A0459A724BE181B415DD447929
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            No disassembly