Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
Analysis ID:1664727
MD5:56e0434188f95dc35a87159a1645b262
SHA1:db7812aeb58b3d076965fdd6cf40d6474f7d9d58
SHA256:26fd65f096bf2b904f775c7d895ff9c07b46baa9e997f2a414ee16fe8b4a2427
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

SheetRat
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected SheetRat
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture screen (.Net source)
Joe Sandbox ML detected suspicious sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file does not import any functions
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
{
  "C2 urls": [
    "italy-fence.gl.at.ply.gg:36402"
  ]
}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_SheetRatYara detected SheetRatJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: italy-fence.gl.at.ply.gg:36402Avira URL Cloud: Label: malware
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMalware Configuration Extractor: SheetRat {"C2 urls": ["italy-fence.gl.at.ply.gg:36402"]}
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeVirustotal: Detection: 45%Perma Link
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeReversingLabs: Detection: 41%
    Source: Submited SampleNeural Call Log Analysis: 90.7%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Ts0cj
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ,
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Win32_VideoController
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Name
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: dd.MM.yyyy
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Win32_Processor
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Admin
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: User
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: true
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: italy-fence.gl.at.ply.gg:36402
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: PlsHelpMeImMental ILL
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 1.8
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: @mfgg%70#kra6hqm4b7rib0h^
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: false
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: k@pd+ps*p6riztkag
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vmd^xsi@fk*ug3zw4oizi5d&)&
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 97&i)1#i5ptbi7)y&a
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 26(y5_6
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Yu--$SZ$Y
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: n(olf515rw(s_kr%(i$a
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 1ul&+t(%ow1jacxrwq(_dxgs!tnp
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: cy&57^clyui+0%!r^+5+43kgw)swj
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: v&m!^%7vu4ag%^bay3g_gx_5t^k+
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ^*rsn&vi+sf1pns0x
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: bepklsju7vxotoc
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: t5qcnjo_#g+9!+#dn)0fva!
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: mzdkho3cz3s
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Connect
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: @
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SbieDll.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: snxhk.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: cmdvrt32.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Sf2.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SxIn.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Select * from Win32_CacheMemory
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Select * from CIM_Memory
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: virtual
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: innotek gmbh
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: tpvcgateway
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: VMXh
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: tpautoconnsvc
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vbox
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vmbox
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vmware
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: virtualbox
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: box
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: thinapp
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: root\CIMV2
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SELECT * FROM Win32_ComputerSystem
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Model
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Manufacturer
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: :\
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: drivers
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: balloon.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: netkvm.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: pvpanic.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: viofs.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: viogpudo.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vioinput.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: viorng.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: vioser.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: viostor.sys
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: qemu-ga
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SPICE Guest Tools
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: sandbox
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: amsi.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: AmsiScanBuffer
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ntdll.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: EtwEventWrite
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: avast
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Error
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Invoke
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SaveInvoke
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Pong
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Exit
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Restart
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: cmd
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /k timeout 5 > NUL && "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: runas
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Uninstall
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Update
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: .exe
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /k timeout 10 > NUL && "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: StubUpdate
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: kernel32.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: GetModuleHandleA
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SetThreadExecutionState
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: user32.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: GetForegroundWindow
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: GetWindowTextA
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: GetDiskFreeSpaceEx
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: NtProtectVirtualMemory
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor:
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: &u^I$y`.M;z(5aW]9<LH8,'CY#d:0bNi6|O{[Vj=~}cSw!7k+o2KgAPFZh4*@Xs_ f"/vqr?Rm>B1pDJ%3ETt)enx\G-UlQ
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: AR-0tM|:YL>8,Jdg1}6Gp5;~%<nwlC3V)B`QFXe7=9sK'hH 4"@SrkZviymju?a_Uc{TD*/E\Pq&I+W^(z]fx2[.$!NoO#b
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Hwid
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: x2
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Win32_DiskDrive
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: WindowsControl
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %Windows%\xdwd.dll
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SOFTWARE
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Microsoft
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Windows NT
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: CurrentVersion
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Windows
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: AppInit_DLLs
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: LoadAppInit_DLLs
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: RequireSignedAppInit_DLLs
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /C taskkill /im explorer.exe /f && TimeOut 2 && start explorer.exe
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: .bat
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: timeout 10 > NUL
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: CD "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: DEL "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: " /f /q
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: CMD
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: netsh advfirewall firewall add rule name="
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: " dir=in action=allow program="
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: " enable=yes & exit
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Tasks
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /c schtasks /deleTe /F /Tn "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: " & exit
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: & exit
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /c schtasks /run /i /tn "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /c schtasks /create /f /sc minute /mo
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /tn "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: " /tr "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: "
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: /RL HIGHEST
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\winlogon
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Userinit
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: C:\Windows\System32\userinit.exe,
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: C:\Windows\System32\userinit.exe
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SELECT * FROM Win32_OperatingSystem
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Caption
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor:
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: OSArchitecture
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Error Get Version
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SELECT * FROM
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: \\
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: \root\SecurityCenter2
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Select * from AntivirusProduct
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: displayName
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ;
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: N/A
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Unknown
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: [Idle]
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SELECT * FROM Win32_PnPEntity WHERE PNPClass = 'Camera'
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: None
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: image/jpeg
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %Windows%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %ProgramFiles%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %ApplicationData%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %UserProfile%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %MyDocuments%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %Cookies%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %CommonPictures%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %LocalApplicationData%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %CommonDocuments%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %Templates%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %MyMusic%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: %MyVideos%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Ping
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: GetDLL
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Plugin.Plugin
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Run
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Load error:
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: System
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: TrustedInsraller
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 147.45.45.218
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: 12345
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: getupdate
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: kkn
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: root\Microsoft\Windows\Defender
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: SELECT * FROM MSFT_MpPreference
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ComputerID
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: MSFT_MpPreference.ComputerID='
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: '
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: Add
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString decryptor: ExclusionPath
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: italy-fence.gl.at.ply.gg:36402
    Source: global trafficTCP traffic: 147.185.221.27 ports 0,2,3,4,6,36402
    Source: global trafficTCP traffic: 192.168.2.5:49695 -> 147.185.221.27:36402
    Source: Joe Sandbox ViewIP Address: 147.185.221.27 147.185.221.27
    Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: italy-fence.gl.at.ply.gg
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://ocsp.digicert.com0X
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, 00000000.00000002.2540049464.0000000003F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeString found in binary or memory: https://www.globalsign.com/repository/0

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, Methods.cs.Net Code: CaptureResizeReduceQuality
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA897C NtProtectVirtualMemory,0_2_00007FF7C7DA897C
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA82C00_2_00007FF7C7DA82C0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA4F710_2_00007FF7C7DA4F71
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA5D210_2_00007FF7C7DA5D21
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA82AD0_2_00007FF7C7DA82AD
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: invalid certificate
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, 00000000.00000000.1293143842.0000000000C7E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZeroTrace Stealer.exeD vs SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeBinary or memory string: OriginalFilenameZeroTrace Stealer.exeD vs SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, SecrityHidden.csSecurity API names: File.GetAccessControl
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, SecrityHidden.csSecurity API names: File.SetAccessControl
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, SecrityHidden.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, Config.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, Config.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMutant created: NULL
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMutant created: \Sessions\1\BaseNamedObjects\@mfgg%70#kra6hqm4b7rib0h^
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeVirustotal: Detection: 45%
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeReversingLabs: Detection: 41%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, PluginLoader.cs.Net Code: Load System.AppDomain.Load(byte[])
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, PluginLoader.cs.Net Code: Load
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, AsmiAndETW.cs.Net Code: AggresivAmsiActivate System.Reflection.Assembly.Load(byte[])
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, Updater.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA00BD pushad ; iretd 0_2_00007FF7C7DA00C1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeCode function: 0_2_00007FF7C7DA9245 pushad ; iretd 0_2_00007FF7C7DA926D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = &apos;Camera&apos;
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMemory allocated: 14A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMemory allocated: 1BF60000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, 00000000.00000002.2543794798.000000001D780000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle="c0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, 00000000.00000002.2543794798.000000001D730000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    32
    Virtualization/Sandbox Evasion
    OS Credential Dumping331
    Security Software Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory32
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager213
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Software Packing
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture11
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe46%VirustotalBrowse
    SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe42%ReversingLabsByteCode-MSIL.Trojan.DCRat
    SAMPLE100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    italy-fence.gl.at.ply.gg:36402100%Avira URL Cloudmalware

    Download Network PCAP: filteredfull

    NameIPActiveMaliciousAntivirus DetectionReputation
    italy-fence.gl.at.ply.gg
    147.185.221.27
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      italy-fence.gl.at.ply.gg:36402true
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe, 00000000.00000002.2540049464.0000000003F61000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        147.185.221.27
        italy-fence.gl.at.ply.ggUnited States
        12087SALSGIVERUStrue
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1664727
        Start date and time:2025-04-14 17:34:10 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 59s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 5
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 23.76.34.6, 4.245.163.56, 150.171.27.254
        • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, c.pki.goog, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        147.185.221.27ZCAZR_XClient.exeGet hashmaliciousXWormBrowse
          jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
            jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
              Fatality.exeGet hashmaliciousSheetRatBrowse
                Extreme Injector v3.1.exeGet hashmaliciousDracula Stealer, SheetRatBrowse
                  dc.exeGet hashmaliciousXWormBrowse
                    XClient.batGet hashmaliciousXWormBrowse
                      roblox.exeGet hashmaliciousXWormBrowse
                        cheatstandoff2.exeGet hashmaliciousAsyncRAT, XWormBrowse
                          Spicetify.batGet hashmaliciousUnknownBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            SALSGIVERUSZCAZR_XClient.exeGet hashmaliciousXWormBrowse
                            • 147.185.221.27
                            jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
                            • 147.185.221.27
                            jre-8u441-windows-x64.exeGet hashmaliciousUnknownBrowse
                            • 147.185.221.27
                            9lBc54z9La.exeGet hashmaliciousAsyncRATBrowse
                            • 147.185.221.22
                            BootstrapperNew.exeGet hashmalicious44Caliber Stealer, BlackGuard, Njrat, Rags StealerBrowse
                            • 147.185.221.19
                            Fatality.exeGet hashmaliciousSheetRatBrowse
                            • 147.185.221.27
                            Extreme Injector v3.1.exeGet hashmaliciousDracula Stealer, SheetRatBrowse
                            • 147.185.221.27
                            fatality.exeGet hashmaliciousSheetRatBrowse
                            • 147.185.221.26
                            MemesenseCrackByPugCheat!.exeGet hashmaliciousSheetRat, XWormBrowse
                            • 147.185.221.20
                            MinecraftLauncher.exeGet hashmaliciousUnknownBrowse
                            • 147.185.221.26
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.2296110752509115
                            TrID:
                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                            • Win64 Executable GUI (202006/5) 46.43%
                            • Win64 Executable (generic) (12005/4) 2.76%
                            • Generic Win/DOS Executable (2004/3) 0.46%
                            • DOS Executable Generic (2002/1) 0.46%
                            File name:SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
                            File size:54'928 bytes
                            MD5:56e0434188f95dc35a87159a1645b262
                            SHA1:db7812aeb58b3d076965fdd6cf40d6474f7d9d58
                            SHA256:26fd65f096bf2b904f775c7d895ff9c07b46baa9e997f2a414ee16fe8b4a2427
                            SHA512:e18ab4bf0d83814d2f83d46867b551bdf4614cafdc15303b32fc48cea630d520587737348dc4c10f523ae69f371937669a1246c3e209576332e3d878a9963c3f
                            SSDEEP:768:OsegLg+8qF21xEHUzPcF/CTervkRBObyCmwwQSRG1911wZYBxk2DVRlubEA:OseVVEHQa/pg3OblxwlG19bwax1pK
                            TLSH:AC337C407B884A52CDAF4EBEA39A52099630D3338983C74B7CDB8DF566877C19B40DD6
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...a..f.........."...0.................. .....@..... ....................................@...@......@............... .....
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x140000000
                            Entrypoint Section:
                            Digitally signed:true
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66CCF161 [Mon Aug 26 21:19:29 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:
                            Signature Valid:false
                            Signature Issuer:CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 10/09/2019 04:45:17 10/09/2022 04:45:17
                            Subject Chain
                            • CN="GIGA-BYTE TECHNOLOGY CO., LTD.", O="GIGA-BYTE TECHNOLOGY CO., LTD.", L=New Taipei, S=New Taipei, C=TW
                            Version:3
                            Thumbprint MD5:056A1542A1C0082487E191B797928604
                            Thumbprint SHA-1:119773603D061409C5317676EA023AD976F4F48C
                            Thumbprint SHA-256:A050EF89BA6921F1283BB80E3A8A1D0D950E128BF87EF8486E004A30C87F52A7
                            Serial:4FD3DFBE31A46854DE5720DE
                            Instruction
                            dec ebp
                            pop edx
                            nop
                            add byte ptr [ebx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x5e8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xb4000x2290
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xabac0xac00eced0f4c447d70f05060f66e1286b64fFalse0.4988190406976744data5.872214917324844IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xe0000x5e80x600704a1992ac8828f0d1a9463795f31c44False0.4303385416666667data4.320799370389766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0xe0a00x35cdata0.4011627906976744
                            RT_MANIFEST0xe3fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DescriptionData
                            Translation0x0000 0x04b0
                            Comments
                            CompanyName
                            FileDescriptionZeroTrace Stealer
                            FileVersion1.0.0.0
                            InternalNameZeroTrace Stealer.exe
                            LegalCopyrightCopyright 2024
                            LegalTrademarks
                            OriginalFilenameZeroTrace Stealer.exe
                            ProductNameZeroTrace Stealer
                            ProductVersion1.0.0.0
                            Assembly Version1.0.0.0

                            Download Network PCAP: filteredfull

                            • Total Packets: 56
                            • 36402 undefined
                            • 53 (DNS)
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 14, 2025 17:35:04.075189114 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:04.194808006 CEST3640249695147.185.221.27192.168.2.5
                            Apr 14, 2025 17:35:04.197977066 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:04.275212049 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:04.651354074 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:05.029181957 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:05.760509968 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:07.229401112 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:08.697997093 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:10.166738033 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:13.088689089 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:18.932302952 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:30.619988918 CEST4969536402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:30.876183033 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:30.995356083 CEST3640249699147.185.221.27192.168.2.5
                            Apr 14, 2025 17:35:30.995501995 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:31.003362894 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:31.385488987 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:31.771763086 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:32.510473967 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:33.994796991 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:36.947938919 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:42.838754892 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:54.619786024 CEST4969936402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:54.825059891 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:54.944364071 CEST3640249700147.185.221.27192.168.2.5
                            Apr 14, 2025 17:35:54.944751978 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:54.945018053 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:55.307267904 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:55.666615009 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:56.369760036 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:35:57.775978088 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:00.590749979 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:06.198014021 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:17.400918007 CEST4970036402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:17.607178926 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:17.726447105 CEST3640249702147.185.221.27192.168.2.5
                            Apr 14, 2025 17:36:17.726578951 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:17.726990938 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:18.088416100 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:18.447825909 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:19.166553020 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:20.588500977 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:23.432183027 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:29.120439053 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:40.494649887 CEST4970236402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:40.699939966 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:40.819188118 CEST3640249703147.185.221.27192.168.2.5
                            Apr 14, 2025 17:36:40.819354057 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:40.820015907 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:41.182167053 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:41.541510105 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:42.244622946 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:43.651154995 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:46.463378906 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:36:52.072724104 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:37:03.275846004 CEST4970336402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:37:03.480654955 CEST4970436402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:37:04.494621992 CEST4970436402192.168.2.5147.185.221.27
                            Apr 14, 2025 17:37:06.510250092 CEST4970436402192.168.2.5147.185.221.27
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 14, 2025 17:35:03.586165905 CEST5949153192.168.2.51.1.1.1
                            Apr 14, 2025 17:35:04.070338964 CEST53594911.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 14, 2025 17:35:03.586165905 CEST192.168.2.51.1.1.10xa444Standard query (0)italy-fence.gl.at.ply.ggA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 14, 2025 17:35:04.070338964 CEST1.1.1.1192.168.2.50xa444No error (0)italy-fence.gl.at.ply.gg147.185.221.27A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            • File
                            • Registry
                            • Network

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:11:35:01
                            Start date:14/04/2025
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoad4.16832.20289.2228.exe"
                            Imagebase:0xc70000
                            File size:54'928 bytes
                            MD5 hash:56E0434188F95DC35A87159A1645B262
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Execution Graph

                            Execution Coverage

                            Dynamic/Packed Code Coverage

                            Signature Coverage

                            Execution Coverage:23.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:100%
                            Total number of Nodes:3
                            Total number of Limit Nodes:0
                            Show Legend
                            Hide Nodes/Edges
                            execution_graph 2677 7ff7c7da897c 2678 7ff7c7da89d1 NtProtectVirtualMemory 2677->2678 2680 7ff7c7da8a55 2678->2680

                            Executed Functions

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2544632537.00007FF7C7DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C7DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7c7da0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MemoryProtectVirtual
                            • String ID:
                            • API String ID: 2706961497-0
                            • Opcode ID: f61edb804657afdbe7e1bb382ddc53308e7ad00657f3c7a22df5d44ea22f1dda
                            • Instruction ID: 4912541ceab4a9f9b24c6d61aaf032b3c16546ac487b6c1b311e6c11a2aa93c6
                            • Opcode Fuzzy Hash: f61edb804657afdbe7e1bb382ddc53308e7ad00657f3c7a22df5d44ea22f1dda
                            • Instruction Fuzzy Hash: 7751F731A1CB484FDB19EB2C9C057E9BBE1FB99321F0042AFD449C3292CE74684587C2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 330 7ff7c7da82c0-7ff7c7da8316 334 7ff7c7da8318-7ff7c7da831c 330->334 335 7ff7c7da831e-7ff7c7da831f 330->335 336 7ff7c7da8322-7ff7c7da8387 334->336 335->336 344 7ff7c7da8426-7ff7c7da8429 336->344 345 7ff7c7da838d-7ff7c7da8394 336->345 346 7ff7c7da843f-7ff7c7da844a 344->346 347 7ff7c7da842b-7ff7c7da843e 344->347 348 7ff7c7da8397-7ff7c7da83b6 345->348 351 7ff7c7da83ec-7ff7c7da8423 346->351 352 7ff7c7da844c-7ff7c7da84b0 346->352 354 7ff7c7da83bd-7ff7c7da83d2 348->354 351->344 365 7ff7c7da84b3 352->365 359 7ff7c7da83d4-7ff7c7da83e3 354->359 360 7ff7c7da83e7-7ff7c7da83eb 354->360 359->348 362 7ff7c7da83e5 359->362 360->351 362->344 366 7ff7c7da84b5-7ff7c7da84bd 365->366 367 7ff7c7da84be-7ff7c7da84cf 365->367 366->367 368 7ff7c7da84d1-7ff7c7da84d9 367->368 369 7ff7c7da84da-7ff7c7da84ea 367->369 368->369 369->365 370 7ff7c7da84ec-7ff7c7da85b6 369->370 380 7ff7c7da85b8-7ff7c7da8618 call 7ff7c7da1440 * 2 370->380 388 7ff7c7da861a-7ff7c7da863f call 7ff7c7da7028 380->388 392 7ff7c7da8641-7ff7c7da8650 388->392 393 7ff7c7da8653-7ff7c7da8657 388->393 392->393 395 7ff7c7da8659-7ff7c7da8667 393->395 396 7ff7c7da8668-7ff7c7da8671 393->396 397 7ff7c7da86b5-7ff7c7da86da 396->397 398 7ff7c7da8673-7ff7c7da8689 396->398 403 7ff7c7da86a3-7ff7c7da86b4 397->403 404 7ff7c7da86dc-7ff7c7da86ea 397->404 401 7ff7c7da869d-7ff7c7da86a1 398->401 402 7ff7c7da868b-7ff7c7da8699 398->402 401->403 402->401 406 7ff7c7da86f1-7ff7c7da86f4 404->406 407 7ff7c7da86ec call 7ff7c7da7010 404->407 408 7ff7c7da86f6-7ff7c7da86fa 406->408 409 7ff7c7da8719-7ff7c7da875f 406->409 407->406 411 7ff7c7da8701-7ff7c7da8718 408->411
                            Memory Dump Source
                            • Source File: 00000000.00000002.2544632537.00007FF7C7DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C7DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7c7da0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 301c22b3b47870fc37978733c75651942b499ea60d2d620926c910eb00a284db
                            • Instruction ID: 01fcb068c17f07c1308e802e2ae040d5eb68e116d5345f01cb58922210533d06
                            • Opcode Fuzzy Hash: 301c22b3b47870fc37978733c75651942b499ea60d2d620926c910eb00a284db
                            • Instruction Fuzzy Hash: F3E13631E1CA494FE31DAB29A8552B5B7D1FF95320F54027ED48AC3297DD2878438391

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 417 7ff7c7da4f71-7ff7c7da4fd7 420 7ff7c7da5043 417->420 421 7ff7c7da4fd9-7ff7c7da4fe2 417->421 422 7ff7c7da5045-7ff7c7da506a 420->422 421->420 423 7ff7c7da4fe4-7ff7c7da4ff0 421->423 430 7ff7c7da50d6 422->430 431 7ff7c7da506c-7ff7c7da5075 422->431 424 7ff7c7da4ff2-7ff7c7da5004 423->424 425 7ff7c7da5029-7ff7c7da5041 423->425 426 7ff7c7da5006 424->426 427 7ff7c7da5008-7ff7c7da501b 424->427 425->422 426->427 427->427 429 7ff7c7da501d-7ff7c7da5025 427->429 429->425 432 7ff7c7da50d8-7ff7c7da5180 430->432 431->430 433 7ff7c7da5077-7ff7c7da5083 431->433 444 7ff7c7da5182-7ff7c7da518c 432->444 445 7ff7c7da51ee 432->445 434 7ff7c7da5085-7ff7c7da5097 433->434 435 7ff7c7da50bc-7ff7c7da50d4 433->435 437 7ff7c7da5099 434->437 438 7ff7c7da509b-7ff7c7da50ae 434->438 435->432 437->438 438->438 440 7ff7c7da50b0-7ff7c7da50b8 438->440 440->435 444->445 447 7ff7c7da518e-7ff7c7da519b 444->447 446 7ff7c7da51f0-7ff7c7da5219 445->446 453 7ff7c7da5283 446->453 454 7ff7c7da521b-7ff7c7da5226 446->454 448 7ff7c7da51d4-7ff7c7da51ec 447->448 449 7ff7c7da519d-7ff7c7da51af 447->449 448->446 451 7ff7c7da51b1 449->451 452 7ff7c7da51b3-7ff7c7da51c6 449->452 451->452 452->452 455 7ff7c7da51c8-7ff7c7da51d0 452->455 457 7ff7c7da5285-7ff7c7da5316 453->457 454->453 456 7ff7c7da5228-7ff7c7da5236 454->456 455->448 458 7ff7c7da526f-7ff7c7da5281 456->458 459 7ff7c7da5238-7ff7c7da524a 456->459 465 7ff7c7da531c-7ff7c7da532b 457->465 458->457 460 7ff7c7da524c 459->460 461 7ff7c7da524e-7ff7c7da5261 459->461 460->461 461->461 463 7ff7c7da5263-7ff7c7da526b 461->463 463->458 466 7ff7c7da5333-7ff7c7da538b call 7ff7c7da53b4 465->466 467 7ff7c7da532d 465->467 467->466
                            Memory Dump Source
                            • Source File: 00000000.00000002.2544632537.00007FF7C7DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C7DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7c7da0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3962dea701ed6f4e1a0a43e1e090b2c9d5995bc6a430fed23ad420489559815b
                            • Instruction ID: 9078b3a6b40c19a157a466343af4e0b07a0f7387013c86baf2036fb4477f6034
                            • Opcode Fuzzy Hash: 3962dea701ed6f4e1a0a43e1e090b2c9d5995bc6a430fed23ad420489559815b
                            • Instruction Fuzzy Hash: 43D17030918A4D8FEBA8EF28C8557E977E1FB54320F50427AE80EC7395DF74A9458B81

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 474 7ff7c7da5d21-7ff7c7da5d87 477 7ff7c7da5df3 474->477 478 7ff7c7da5d89-7ff7c7da5d92 474->478 480 7ff7c7da5df5-7ff7c7da5e1a 477->480 478->477 479 7ff7c7da5d94-7ff7c7da5da0 478->479 481 7ff7c7da5da2-7ff7c7da5db4 479->481 482 7ff7c7da5dd9-7ff7c7da5df1 479->482 486 7ff7c7da5e86 480->486 487 7ff7c7da5e1c-7ff7c7da5e25 480->487 484 7ff7c7da5db6 481->484 485 7ff7c7da5db8-7ff7c7da5dcb 481->485 482->480 484->485 485->485 488 7ff7c7da5dcd-7ff7c7da5dd5 485->488 490 7ff7c7da5e88-7ff7c7da5ead 486->490 487->486 489 7ff7c7da5e27-7ff7c7da5e33 487->489 488->482 491 7ff7c7da5e35-7ff7c7da5e47 489->491 492 7ff7c7da5e6c-7ff7c7da5e84 489->492 497 7ff7c7da5eaf-7ff7c7da5eb9 490->497 498 7ff7c7da5f1b 490->498 493 7ff7c7da5e49 491->493 494 7ff7c7da5e4b-7ff7c7da5e5e 491->494 492->490 493->494 494->494 496 7ff7c7da5e60-7ff7c7da5e68 494->496 496->492 497->498 500 7ff7c7da5ebb-7ff7c7da5ec8 497->500 499 7ff7c7da5f1d-7ff7c7da5f4b 498->499 507 7ff7c7da5fbb 499->507 508 7ff7c7da5f4d-7ff7c7da5f58 499->508 501 7ff7c7da5f01-7ff7c7da5f19 500->501 502 7ff7c7da5eca-7ff7c7da5edc 500->502 501->499 504 7ff7c7da5ee0-7ff7c7da5ef3 502->504 505 7ff7c7da5ede 502->505 504->504 506 7ff7c7da5ef5-7ff7c7da5efd 504->506 505->504 506->501 510 7ff7c7da5fbd-7ff7c7da60aa 507->510 508->507 509 7ff7c7da5f5a-7ff7c7da5f68 508->509 511 7ff7c7da5fa1-7ff7c7da5fb9 509->511 512 7ff7c7da5f6a-7ff7c7da5f7c 509->512 521 7ff7c7da60b2-7ff7c7da60cc 510->521 522 7ff7c7da60ac 510->522 511->510 514 7ff7c7da5f80-7ff7c7da5f93 512->514 515 7ff7c7da5f7e 512->515 514->514 517 7ff7c7da5f95-7ff7c7da5f9d 514->517 515->514 517->511 525 7ff7c7da60d5-7ff7c7da6107 call 7ff7c7da6130 521->525 522->521
                            Memory Dump Source
                            • Source File: 00000000.00000002.2544632537.00007FF7C7DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C7DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7c7da0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 17dc37fc8770347c10e2abd842f10a5edf729da572ffa88fb4a56d5fae72fb8d
                            • Instruction ID: b12657c26384e482ab96c5719f14a305af10892d5911c44b46a4de1470a01b15
                            • Opcode Fuzzy Hash: 17dc37fc8770347c10e2abd842f10a5edf729da572ffa88fb4a56d5fae72fb8d
                            • Instruction Fuzzy Hash: E3D16030918A4E8FEBA8EF28C8557E977D1FB54320F54833AD80EC7295DF74A9458B81
                            Memory Dump Source
                            • Source File: 00000000.00000002.2544632537.00007FF7C7DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C7DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7c7da0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c11220683485c745cf977884d3f0eb028a254ac90cf3d517bb3d9f572ac0a621
                            • Instruction ID: 920cd80b5f741ff66d6f692b6dd9e361fd346258eeb7c0877d2ec1fe9443dd27
                            • Opcode Fuzzy Hash: c11220683485c745cf977884d3f0eb028a254ac90cf3d517bb3d9f572ac0a621
                            • Instruction Fuzzy Hash: E851D031D18A098BE71DFB2598461FAB3E1FF95320F44447ED88BC3592ED38B4478681