Windows
Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe (PID: 7356 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win64.Malw areX-gen.2 0145.17567 .exe" MD5: D8AB1C200E61D70A36D4A0FE6EA55732) conhost.exe (PID: 7376 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe (PID: 7620 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win64.Malw areX-gen.2 0145.17567 .exe" MD5: D8AB1C200E61D70A36D4A0FE6EA55732)
- cleanup
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF60F54CDB8 | |
Source: | Code function: | 2_2_00007FF60F54CDB8 |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00007FF60F49E090 |
Source: | Binary or memory string: | memstr_11a1cf4e-4 |
Source: | Code function: | 0_2_00007FF60F569068 | |
Source: | Code function: | 0_2_00007FF60F4818D0 | |
Source: | Code function: | 0_2_00007FF60F474790 | |
Source: | Code function: | 0_2_00007FF60F472760 | |
Source: | Code function: | 0_2_00007FF60F477800 | |
Source: | Code function: | 0_2_00007FF60F48E7DC | |
Source: | Code function: | 0_2_00007FF60F55D654 | |
Source: | Code function: | 0_2_00007FF60F48D6BA | |
Source: | Code function: | 0_2_00007FF60F566540 | |
Source: | Code function: | 0_2_00007FF60F54CDB8 | |
Source: | Code function: | 0_2_00007FF60F481490 | |
Source: | Code function: | 0_2_00007FF60F486C73 | |
Source: | Code function: | 0_2_00007FF60F482C60 | |
Source: | Code function: | 0_2_00007FF60F473940 | |
Source: | Code function: | 0_2_00007FF60F474210 | |
Source: | Code function: | 0_2_00007FF60F496A00 | |
Source: | Code function: | 0_2_00007FF60F5681F4 | |
Source: | Code function: | 2_2_00007FF60F566540 | |
Source: | Code function: | 2_2_00007FF60F569068 | |
Source: | Code function: | 2_2_00007FF60F4818D0 | |
Source: | Code function: | 2_2_00007FF60F474790 | |
Source: | Code function: | 2_2_00007FF60F472760 | |
Source: | Code function: | 2_2_00007FF60F477800 | |
Source: | Code function: | 2_2_00007FF60F48E7BA | |
Source: | Code function: | 2_2_00007FF60F55D654 | |
Source: | Code function: | 2_2_00007FF60F48D6BA | |
Source: | Code function: | 2_2_00007FF60F54CDB8 | |
Source: | Code function: | 2_2_00007FF60F481490 | |
Source: | Code function: | 2_2_00007FF60F486C73 | |
Source: | Code function: | 2_2_00007FF60F482C60 | |
Source: | Code function: | 2_2_00007FF60F473940 | |
Source: | Code function: | 2_2_00007FF60F474210 | |
Source: | Code function: | 2_2_00007FF60F496A00 | |
Source: | Code function: | 2_2_00007FF60F5681F4 |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | API coverage: | ||
Source: | API coverage: |
Source: | Code function: | 0_2_00007FF60F54CDB8 | |
Source: | Code function: | 2_2_00007FF60F54CDB8 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Debugger detection routine: | graph_0-22678 |
Source: | Code function: | 0_2_00007FF60F555CB0 |
Source: | Code function: | 0_2_00007FF60F555CB0 | |
Source: | Code function: | 0_2_00007FF60F550A28 | |
Source: | Code function: | 2_2_00007FF60F555CB0 | |
Source: | Code function: | 2_2_00007FF60F550A28 |
Source: | Code function: | 0_2_00007FF60F472760 |
Source: | Code function: | 0_2_00007FF60F5790C0 | |
Source: | Code function: | 0_2_00007FF60F56AFE0 | |
Source: | Code function: | 0_2_00007FF60F578660 | |
Source: | Code function: | 0_2_00007FF60F56AF10 | |
Source: | Code function: | 0_2_00007FF60F578EC8 | |
Source: | Code function: | 0_2_00007FF60F56B43C | |
Source: | Code function: | 0_2_00007FF60F578A94 | |
Source: | Code function: | 0_2_00007FF60F56AB00 | |
Source: | Code function: | 0_2_00007FF60F54C998 | |
Source: | Code function: | 0_2_00007FF60F5789C4 | |
Source: | Code function: | 2_2_00007FF60F5790C0 | |
Source: | Code function: | 2_2_00007FF60F56AFE0 | |
Source: | Code function: | 2_2_00007FF60F578660 | |
Source: | Code function: | 2_2_00007FF60F56AF10 | |
Source: | Code function: | 2_2_00007FF60F578EC8 | |
Source: | Code function: | 2_2_00007FF60F56B43C | |
Source: | Code function: | 2_2_00007FF60F578A94 | |
Source: | Code function: | 2_2_00007FF60F56AB00 | |
Source: | Code function: | 2_2_00007FF60F54C998 | |
Source: | Code function: | 2_2_00007FF60F5789C4 |
Source: | Code function: | 0_2_00007FF60F5508B4 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | 21 Input Capture | 1 System Time Discovery | Remote Services | 21 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 111 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 3 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
31% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high | |
api.github.com | 140.82.114.6 | true | false | high | |
pki-goog.l.google.com | 173.194.219.94 | true | false | high | |
c.pki.goog | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
140.82.114.6 | api.github.com | United States | 36459 | GITHUBUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1666628 |
Start date and time: | 2025-04-16 19:28:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 39s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
Detection: | MAL |
Classification: | mal52.evad.winEXE@4/1@2/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Excluded domains from analysis
(whitelisted): ctldl.windowsu pdate.com.delivery.microsoft.c om, ctldl.windowsupdate.com, w u-b-net.trafficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
140.82.114.6 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Coinhive, Sapphire, TrojanRansom, WarGame, Xmrig, Zhen | Browse | |||
Get hash | malicious | Conti, Sapphire, TrojanRansom | Browse | |||
Get hash | malicious | Coinhive, Sapphire, TrojanRansom, WarGame, Xmrig | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
pki-goog.l.google.com | Get hash | malicious | DBatLoader, FormBook | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
api.github.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
GITHUBUS | Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| |
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Tycoon2FA | Browse |
| ||
Get hash | malicious | Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Latrodectus | Browse |
| ||
Get hash | malicious | Latrodectus | Browse |
| ||
Get hash | malicious | Latrodectus | Browse |
| ||
Get hash | malicious | Latrodectus | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7044 |
Entropy (8bit): | 5.3843618559966995 |
Encrypted: | false |
SSDEEP: | 96:oZ9kCZ9J9XcFyEaBMGEVCsCNge3NvBIZ2EpbsaFyEaBMGEVCsCYsyAZKOZlJJuRD:3Q3N5sRnf6kalS8UlKmKfh7qR |
MD5: | B151938CB4EEFA50108EA0FA0380CEDF |
SHA1: | 219BEC0A831A0CB5071EA6E48B4AE3C8533C6420 |
SHA-256: | 9D7F92924364021BBF94DADDF77935723C792EC016C428F68D813E625D338278 |
SHA-512: | 44A018FCF2B3F23F833A357277C50596F104A3158D92FCFE564A2D818BC9B97E21D8D7D4B7E73DFE6F9EF33A5BE654996E93A27BC05C9609BA5F7CA27A97B620 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.7499130713964055 |
TrID: |
|
File name: | SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
File size: | 2'195'968 bytes |
MD5: | d8ab1c200e61d70a36d4a0fe6ea55732 |
SHA1: | bac1697026629f0fd27afb5abdcc466d91ee52a9 |
SHA256: | 32eaf02e9ed25e01438eb36404e8c6b0daf9bdedaf727407e15b17048c7d4ec4 |
SHA512: | 03408db44315a02130cb3b023ce94b7c0ca4e6403621e0adb9c6e965e1dd19e91797689453e9474b7e2d5dea0ab44e1910042449d2d631fc4d69c6c8dbd03ba8 |
SSDEEP: | 49152:X+8sWMnIhCQ2eh0DNGYcmHDkxtmC2gcCA7Dv1:7sWM60nDQmC2HCA7DN |
TLSH: | 7DA5CF56B2A401E8C0ABC238C9569907E7723C450F70AAEF17E476952FB37E19E7B710 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f#.j.M.j.M.j.M...I.I.M...N.}.M.{.I.x.M.{.N.f.M.{.H...M...L.q.M.j.L.A.M...H...M...D.M.M.....k.M.j...k.M...O.k.M.Richj.M........ |
Icon Hash: | 92b2809aaa9680c2 |
Entrypoint: | 0x1400e0214 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67FFC75A [Wed Apr 16 15:06:02 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 893c23881340fac332fc8cdc30208b8c |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F6BC88D0DCCh |
dec eax |
add esp, 28h |
jmp 00007F6BC88D05A7h |
int3 |
int3 |
dec eax |
sub esp, 28h |
dec ebp |
mov eax, dword ptr [ecx+38h] |
dec eax |
mov ecx, edx |
dec ecx |
mov edx, ecx |
call 00007F6BC88D0742h |
mov eax, 00000001h |
dec eax |
add esp, 28h |
ret |
int3 |
int3 |
int3 |
inc eax |
push ebx |
inc ebp |
mov ebx, dword ptr [eax] |
dec eax |
mov ebx, edx |
inc ecx |
and ebx, FFFFFFF8h |
dec esp |
mov ecx, ecx |
inc ecx |
test byte ptr [eax], 00000004h |
dec esp |
mov edx, ecx |
je 00007F6BC88D0745h |
inc ecx |
mov eax, dword ptr [eax+08h] |
dec ebp |
arpl word ptr [eax+04h], dx |
neg eax |
dec esp |
add edx, ecx |
dec eax |
arpl ax, cx |
dec esp |
and edx, ecx |
dec ecx |
arpl bx, ax |
dec edx |
mov edx, dword ptr [eax+edx] |
dec eax |
mov eax, dword ptr [ebx+10h] |
mov ecx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [ebx+08h] |
test byte ptr [ecx+eax+03h], 0000000Fh |
je 00007F6BC88D073Dh |
movzx eax, byte ptr [ecx+eax+03h] |
and eax, FFFFFFF0h |
dec esp |
add ecx, eax |
dec esp |
xor ecx, edx |
dec ecx |
mov ecx, ecx |
pop ebx |
jmp 00007F6BC88D0752h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
cmp ecx, dword ptr [0009A039h] |
jne 00007F6BC88D0742h |
dec eax |
rol ecx, 10h |
test cx, FFFFh |
jne 00007F6BC88D0733h |
ret |
dec eax |
ror ecx, 10h |
jmp 00007F6BC88D0EB3h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x177d7c | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x200000 | 0x1edc0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x1f2000 | 0xc168 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x21f000 | 0x1480 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x15d2e0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x15d500 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x15d1a0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x11b000 | 0x810 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x119c6c | 0x119e00 | 46205126e993b827b2c0b30fb8d99ab2 | False | 0.5065297602549889 | data | 6.524151939015259 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x11b000 | 0x5e884 | 0x5ea00 | 6d9f061b6dfc86836a0e163dc67ac287 | False | 0.43745613854029064 | data | 6.250580708050886 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x17a000 | 0x77904 | 0x72e00 | 828b36f01b58a63407a345c23a694d1e | False | 0.738778563656148 | data | 6.928922356245117 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x1f2000 | 0xc168 | 0xc200 | f6e26f6ea77da3f99156ea3d2f3f4c90 | False | 0.4876369201030928 | data | 6.088047429249062 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.fptable | 0x1ff000 | 0x100 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x200000 | 0x1edc0 | 0x1ee00 | ecf795a3d843ab0f0cfb31d3e2b3348c | False | 0.339353491902834 | data | 4.732749510564224 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x21f000 | 0x1480 | 0x1600 | 8da7bfd2013cb9c670f90b10deb8a490 | False | 0.3796164772727273 | data | 5.278500106885986 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x2001e0 | 0x64ec | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9940006192909119 |
RT_ICON | 0x2066d0 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 19685 x 19685 px/m | English | United States | 0.14207973500532356 |
RT_ICON | 0x216ef8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 19685 x 19685 px/m | English | United States | 0.1807982994803968 |
RT_ICON | 0x21b120 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 19685 x 19685 px/m | English | United States | 0.2196058091286307 |
RT_ICON | 0x21d6c8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 19685 x 19685 px/m | English | United States | 0.2687617260787992 |
RT_ICON | 0x21e770 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 19685 x 19685 px/m | English | United States | 0.4423758865248227 |
RT_GROUP_ICON | 0x21ebd8 | 0x5a | data | English | United States | 0.8 |
RT_MANIFEST | 0x21ec38 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
d3d11.dll | D3D11CreateDeviceAndSwapChain |
dwmapi.dll | DwmExtendFrameIntoClientArea |
KERNEL32.dll | GetConsoleTitleA, GetModuleFileNameA, GetTempPathA, GetModuleHandleW, OutputDebugStringA, Sleep, GetTimeZoneInformation, GetTempPathW, GetTempFileNameW, GetFileSizeEx, SetConsoleTitleA, CreateMutexA, CreateFile2, UnmapViewOfFile, CloseHandle, CreateFileMappingFromApp, MapViewOfFileFromApp, AllocConsole, IsDebuggerPresent, GetStartupInfoW, GetCommandLineW, GetCurrentProcess, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, ExitProcess, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, SetStdHandle, HeapReAlloc, ReadConsoleW, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, VirtualProtect, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, GetConsoleMode, HeapFree, HeapAlloc, GetCommandLineA, WriteFile, GetModuleFileNameW, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, PeekNamedPipe, GetFileType, GetDriveTypeW, ReadFile, FreeLibraryAndExitThread, ExitThread, CreateThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, SetLastError, RtlUnwindEx, TerminateProcess, InitializeSListHead, SetConsoleMode, GetStdHandle, QueryPerformanceCounter, FreeLibrary, GetProcAddress, QueryPerformanceFrequency, LoadLibraryA, GetLocaleInfoA, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GlobalAlloc, MultiByteToWideChar, GetLastError, SetEnvironmentVariableW, GetCurrentProcessId, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetCPInfo, CompareStringEx, LCMapStringEx, DecodePointer, EncodePointer, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, GetSystemTimeAsFileTime, GetProcessHeap, HeapSize, WriteConsoleW, RtlUnwind, SetEndOfFile, InitializeCriticalSectionEx, WakeAllConditionVariable, WakeConditionVariable, InitOnceBeginInitialize, InitOnceComplete, GetModuleHandleExW, CloseThreadpoolWork, SubmitThreadpoolWork, CreateThreadpoolWork, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, SleepConditionVariableSRW, WaitForSingleObjectEx, GetExitCodeThread, GetNativeSystemInfo, LocalFree, FormatMessageA, GetLocaleInfoEx, GetCurrentDirectoryW, CreateDirectoryW, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFileAttributesW, GetFileAttributesExW, GetFileInformationByHandle, GetFullPathNameW, SetFileAttributesW, SetFileInformationByHandle, AreFileApisANSI, GetFileInformationByHandleEx, GetStringTypeW, RtlPcToFileHeader, RaiseException, IsProcessorFeaturePresent, FreeLibraryWhenCallbackReturns |
USER32.dll | GetAsyncKeyState, GetCursorPos, SetCursorPos, SetForegroundWindow, mouse_event, ShowWindow, SendInput, ReleaseDC, FindWindowA, GetClientRect, ClientToScreen, GetCursorInfo, GetDC, GetSystemMetrics, SetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard, SetCursor, LoadCursorW, ScreenToClient, GetForegroundWindow, SetWindowDisplayAffinity, GetKeyState, MessageBoxA, DefWindowProcW, DestroyWindow, SetWindowPos, SetWindowLongPtrW, CreateWindowExW, UnregisterClassW, RegisterClassExW, DispatchMessageW, PeekMessageW, GetRawInputData, MapVirtualKeyA, SetLayeredWindowAttributes, RegisterRawInputDevices, TranslateMessage, PostQuitMessage, UpdateWindow, GetKeyNameTextA, GetKeyboardLayout |
GDI32.dll | GetPixel |
ADVAPI32.dll | SetThreadToken, CreateProcessAsUserW, RegQueryValueExW, RegOpenKeyExW, RegCloseKey, GetTokenInformation, OpenProcessToken, LookupPrivilegeValueW, RevertToSelf, PrivilegeCheck, SetTokenInformation, DuplicateTokenEx |
SHELL32.dll | ShellExecuteExA, ShellExecuteA |
ole32.dll | CoCreateInstance, CoUninitialize, CoInitialize |
WS2_32.dll | bind, setsockopt, freeaddrinfo, ntohs, socket, getsockname, WSAStartup, getaddrinfo, WSASocketW, WSAAccept, listen, shutdown, select, closesocket, getpeername, WSACleanup, getnameinfo, recv, send |
IMM32.dll | ImmReleaseContext, ImmSetCompositionWindow, ImmSetCandidateWindow, ImmGetContext |
D3DCOMPILER_47.dll | D3DCompile |
WINMM.dll | waveOutSetVolume, mciSendStringW |
WININET.dll | InternetOpenW, HttpQueryInfoW, InternetCloseHandle, InternetReadFile, InternetOpenUrlW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Download Network PCAP: filtered – full
- Total Packets: 17
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 16, 2025 19:29:12.210865021 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.210917950 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.211069107 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.222672939 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.222691059 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.467408895 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.467506886 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.570297956 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.570316076 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.571065903 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.571129084 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.574312925 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.616266012 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.748873949 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.748927116 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.748939991 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.748954058 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.748975039 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.748980999 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.749016047 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.749039888 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.749046087 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.749059916 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.749080896 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.749085903 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.749131918 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.749138117 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.749150038 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Apr 16, 2025 19:29:12.749193907 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.753916025 CEST | 49692 | 443 | 192.168.2.5 | 140.82.114.6 |
Apr 16, 2025 19:29:12.753926039 CEST | 443 | 49692 | 140.82.114.6 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 16, 2025 19:29:06.563925028 CEST | 51912 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 16, 2025 19:29:06.670991898 CEST | 53 | 51912 | 1.1.1.1 | 192.168.2.5 |
Apr 16, 2025 19:29:12.096327066 CEST | 54286 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 16, 2025 19:29:12.202769995 CEST | 53 | 54286 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 16, 2025 19:29:06.563925028 CEST | 192.168.2.5 | 1.1.1.1 | 0x5c20 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 16, 2025 19:29:12.096327066 CEST | 192.168.2.5 | 1.1.1.1 | 0xa1ad | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 16, 2025 19:29:06.002351046 CEST | 1.1.1.1 | 192.168.2.5 | 0x24cc | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Apr 16, 2025 19:29:06.002351046 CEST | 1.1.1.1 | 192.168.2.5 | 0x24cc | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Apr 16, 2025 19:29:06.670991898 CEST | 1.1.1.1 | 192.168.2.5 | 0x5c20 | No error (0) | pki-goog.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 16, 2025 19:29:06.670991898 CEST | 1.1.1.1 | 192.168.2.5 | 0x5c20 | No error (0) | 173.194.219.94 | A (IP address) | IN (0x0001) | false | ||
Apr 16, 2025 19:29:12.202769995 CEST | 1.1.1.1 | 192.168.2.5 | 0xa1ad | No error (0) | 140.82.114.6 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49692 | 140.82.114.6 | 443 | 7356 | C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-16 17:29:12 UTC | 135 | OUT | |
2025-04-16 17:29:12 UTC | 1306 | IN | |
2025-04-16 17:29:12 UTC | 64 | IN | |
2025-04-16 17:29:12 UTC | 1370 | IN | |
2025-04-16 17:29:12 UTC | 1370 | IN | |
2025-04-16 17:29:12 UTC | 1370 | IN | |
2025-04-16 17:29:12 UTC | 1370 | IN | |
2025-04-16 17:29:12 UTC | 1370 | IN | |
2025-04-16 17:29:12 UTC | 130 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 13:29:10 |
Start date: | 16/04/2025 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff60f470000 |
File size: | 2'195'968 bytes |
MD5 hash: | D8AB1C200E61D70A36D4A0FE6EA55732 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:29:10 |
Start date: | 16/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e2000000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:29:11 |
Start date: | 16/04/2025 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20145.17567.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff60f470000 |
File size: | 2'195'968 bytes |
MD5 hash: | D8AB1C200E61D70A36D4A0FE6EA55732 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 0.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 187 |
Total number of Limit Nodes: | 8 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 2.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 269 |
Total number of Limit Nodes: | 25 |
Graph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|