Play interactive tourEdit tour

Analysis Report api.exe

Overview

General Information

Sample Name:api.exe
Analysis ID:371964
MD5:b63932cde2143b739551fa5501394146
SHA1:3d64abbc533021eb46a860d13f8465d2e448fcd3
SHA256:c592d92f14fd97f4f4b29a3c71ec2a119d4cf5df4750f76fc455e1f82bc8b798
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Machine Learning detection for sample
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • api.exe (PID: 2588 cmdline: 'C:\Users\user\Desktop\api.exe' MD5: B63932CDE2143B739551FA5501394146)
    • WerFault.exe (PID: 2980 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 712 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: api.exeVirustotal: Detection: 44%Perma Link
Source: api.exeReversingLabs: Detection: 34%
Machine Learning detection for sample
Source: api.exeJoe Sandbox ML: detected
Source: api.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: api.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: urlmon.pdb&t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.639234027.00000000034C2000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: dnsapi.pdbZt&& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.639192907.00000000033C0000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbtx&` source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb2t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: webio.pdbNt2& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: urlmon.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.639201883.00000000033CC000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb>t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb\t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.639192907.00000000033C0000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: C:\Users\ser\Downloads\new flow IVAN\ivan_test\loader_test\Release\WindowsProject1.pdb( source: api.exe
Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc6.pdbPt(&n source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: WindowsProject1.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: webio.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdbDt4& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb(t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: C:\Users\ser\Downloads\new flow IVAN\ivan_test\loader_test\Release\WindowsProject1.pdb source: api.exe
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb4t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.642187842.0000000005406000.00000004.00000040.sdmp
Source: Binary string: sechost.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.639201883.00000000033CC000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.639197452.00000000033C6000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000004.00000003.642187842.0000000005406000.00000004.00000040.sdmp
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F398DE FindFirstFileExW,
Source: global trafficHTTP traffic detected: GET /evreigate.php HTTP/1.1Connection: Keep-AliveUser-Agent: deus vultHost: doought.com
Source: global trafficHTTP traffic detected: GET /hit.php?a=%7BbWW0uZJNBoadTsmEUEzhG%7Did=29 HTTP/1.1Connection: Keep-AliveUser-Agent: deus vultHost: doought.com
Source: unknownDNS traffic detected: queries for: doought.com
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F36070
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2E229
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F28BC0
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F3E3A9
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2DB60
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F21B30
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F42337
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2E4F0
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F3DC96
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F42457
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F3FC35
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2DC0D
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F29D10
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F3BEFB
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F326B7
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2E7AB
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2DF7F
Source: C:\Users\user\Desktop\api.exeCode function: String function: 00F2B2A0 appears 37 times
Source: C:\Users\user\Desktop\api.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 712
Source: api.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: api.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: api.exe, 00000000.00000002.654322369.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs api.exe
Source: api.exeBinary or memory string: OriginalFilenameGoogleUpdateSetup.exe< vs api.exe
Source: api.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: classification engineClassification label: mal64.evad.winEXE@2/4@1/2
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F226D0 RegOpenKeyExA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,Process32Next,Process32Next,lstrcmpiA,Process32Next,FindCloseChangeNotification,CloseHandle,
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2588
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBBD.tmpJump to behavior
Source: C:\Users\user\Desktop\api.exeCommand line argument: VMWARE
Source: C:\Users\user\Desktop\api.exeCommand line argument: Identifier
Source: C:\Users\user\Desktop\api.exeCommand line argument: qemu-ga.exe
Source: C:\Users\user\Desktop\api.exeCommand line argument: arga\
Source: C:\Users\user\Desktop\api.exeCommand line argument: anandamarga
Source: C:\Users\user\Desktop\api.exeCommand line argument: rga
Source: C:\Users\user\Desktop\api.exeCommand line argument: arga\
Source: C:\Users\user\Desktop\api.exeCommand line argument: anandamarga
Source: C:\Users\user\Desktop\api.exeCommand line argument: urlmon.dll
Source: C:\Users\user\Desktop\api.exeCommand line argument: }id=29
Source: C:\Users\user\Desktop\api.exeCommand line argument: evreigate.php
Source: C:\Users\user\Desktop\api.exeCommand line argument: doought.com
Source: C:\Users\user\Desktop\api.exeCommand line argument: string
Source: C:\Users\user\Desktop\api.exeCommand line argument: doought.com
Source: C:\Users\user\Desktop\api.exeCommand line argument: doought.com
Source: C:\Users\user\Desktop\api.exeCommand line argument: url
Source: C:\Users\user\Desktop\api.exeCommand line argument: count
Source: C:\Users\user\Desktop\api.exeCommand line argument: doought.com
Source: api.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\api.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\api.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\api.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: api.exeVirustotal: Detection: 44%
Source: api.exeReversingLabs: Detection: 34%
Source: api.exeString found in binary or memory: %1!s!-Installer
Source: api.exeString found in binary or memory: r den %1!s!-Installer wird Windows 2000 Service Pack 4 oder h
Source: api.exeString found in binary or memory: Installer ng %1!s! Hindi Alam na Error ng InstallerlNabigo ang pag-install. Nangangailangan ang Installer ng %1!s! ng Windows 2000 Service Pack 4 o mas mahusay.
Source: unknownProcess created: C:\Users\user\Desktop\api.exe 'C:\Users\user\Desktop\api.exe'
Source: C:\Users\user\Desktop\api.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 712
Source: api.exeStatic file information: File size 2071040 > 1048576
Source: api.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x132400
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: api.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: api.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: urlmon.pdb&t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.639234027.00000000034C2000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: dnsapi.pdbZt&& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.639192907.00000000033C0000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbtx&` source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb2t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: webio.pdbNt2& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: urlmon.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.639201883.00000000033CC000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb>t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb\t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.639192907.00000000033C0000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc6.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: C:\Users\ser\Downloads\new flow IVAN\ivan_test\loader_test\Release\WindowsProject1.pdb( source: api.exe
Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: dhcpcsvc6.pdbPt(&n source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: WindowsProject1.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: webio.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: winnsi.pdbDt4& source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: iertutil.pdb(t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: C:\Users\ser\Downloads\new flow IVAN\ivan_test\loader_test\Release\WindowsProject1.pdb source: api.exe
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: fwpuclnt.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb4t source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.642187842.0000000005406000.00000004.00000040.sdmp
Source: Binary string: sechost.pdbk source: WerFault.exe, 00000004.00000003.642150416.0000000005402000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.639201883.00000000033CC000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.642183440.0000000005400000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.639197452.00000000033C6000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.642130706.00000000052E1000.00000004.00000001.sdmp
Source: Binary string: rasadhlp.pdb source: WerFault.exe, 00000004.00000003.642165539.0000000005409000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000004.00000003.642187842.0000000005406000.00000004.00000040.sdmp
Source: api.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: api.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: api.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: api.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: api.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F24490 RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegGetValueA,RegCreateKeyExA,RegSetValueExA,RegCloseKey,LoadLibraryA,GetProcAddress,KiUserExceptionDispatcher,Sleep,Sleep,ExitProcess,RegCloseKey,ExitProcess,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2B2E6 push ecx; ret
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F42FE5 push ecx; ret
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2BFA6 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contain functionality to detect virtual machines
Source: C:\Users\user\Desktop\api.exeCode function: HARDWARE\ACPI\DSDT\VBOX__ SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\VMware, Inc.\VMware Tools VMWARE qemu-ga.exe qemu-ga.exe
Source: C:\Users\user\Desktop\api.exeCode function: qemu-ga.exe qemu-ga.exe
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Source: C:\Users\user\Desktop\api.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: api.exeBinary or memory string: QEMU-GA.EXE
Source: api.exeBinary or memory string: ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/STRING TOO LONGVECTOR<T> TOO LONGGETTRUEQEMU-GA.EXESOFTWARE\VMWARE, INC.\VMWARE TOOLSCHECKING REG KEY %S HARDWARE\DEVICEMAP\SCSI\SCSI PORT 0\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0IDENTIFIERVMWARECHECKING REG KEY %SHARDWARE\ACPI\DSDT\VBOX__ANANDAMARGASOFTWARE\ANANDAMARGA\
Source: C:\Users\user\Desktop\api.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
Source: C:\Users\user\Desktop\api.exe TID: 6068Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F398DE FindFirstFileExW,
Source: api.exeBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: api.exeBinary or memory string: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/string too longvector<T> too longGETtrueqemu-ga.exeSOFTWARE\VMware, Inc.\VMware ToolsChecking reg key %s HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0IdentifierVMWAREChecking reg key %sHARDWARE\ACPI\DSDT\VBOX__anandamargaSoftware\anandamarga\
Source: WerFault.exe, 00000004.00000002.653175200.0000000005050000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: api.exeBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: api.exeBinary or memory string: qemu-ga.exe
Source: WerFault.exe, 00000004.00000002.652588339.00000000034D3000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: api.exeBinary or memory string: VMWARE
Source: api.exe, 00000000.00000003.632707342.0000000000874000.00000004.00000001.sdmpBinary or memory string: \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware ToolsntVersion\Windowsializeution Options\Registry\Mach\Regist\REGISTRY\MACHINE\\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Toolsu
Source: WerFault.exe, 00000004.00000002.653175200.0000000005050000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000004.00000002.653175200.0000000005050000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000004.00000002.653175200.0000000005050000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\api.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\api.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\api.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2ABC7 LdrInitializeThunk,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2B0A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F24490 RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegGetValueA,RegCreateKeyExA,RegSetValueExA,RegCloseKey,LoadLibraryA,GetProcAddress,KiUserExceptionDispatcher,Sleep,Sleep,ExitProcess,RegCloseKey,ExitProcess,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F3794B mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F31BEB mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F21A90 GetProcessHeap,HeapFree,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2B23C SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2B0A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F31821 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2B472 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F2AF02 cpuid
Source: C:\Users\user\Desktop\api.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Users\user\Desktop\api.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Users\user\Desktop\api.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\api.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\api.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\api.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\api.exeCode function: 0_2_00F39393 GetSystemTimeAsFileTime,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter3Application Shimming1Process Injection1Virtualization/Sandbox Evasion13OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsApplication Shimming1Process Injection1LSASS MemorySecurity Software Discovery341Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerVirtualization/Sandbox Evasion13SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery22Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 371964 Sample: api.exe Startdate: 19/03/2021 Architecture: WINDOWS Score: 64 20 Multi AV Scanner detection for submitted file 2->20 22 Machine Learning detection for sample 2->22 24 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->24 6 api.exe 1 2->6         started        process3 dnsIp4 16 doought.com 104.21.18.167, 49747, 80 CLOUDFLARENETUS United States 6->16 26 Contain functionality to detect virtual machines 6->26 28 Tries to detect sandboxes / dynamic malware analysis system (registry check) 6->28 10 WerFault.exe 23 9 6->10         started        signatures5 process6 dnsIp7 18 192.168.2.1 unknown unknown 10->18 14 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 10->14 dropped file8

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
api.exe44%VirustotalBrowse
api.exe34%ReversingLabsWin32.Downloader.Satacom
api.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://doought.com/hit.php?a=%7BbWW0uZJNBoadTsmEUEzhG%7Did=290%Avira URL Cloudsafe
http://doought.com/evreigate.php0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
doought.com
104.21.18.167
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://doought.com/hit.php?a=%7BbWW0uZJNBoadTsmEUEzhG%7Did=29false
    • Avira URL Cloud: safe
    unknown
    http://doought.com/evreigate.phpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.21.18.167
    doought.comUnited States
    13335CLOUDFLARENETUSfalse
    IP
    192.168.2.1

    General Information

    Joe Sandbox Version:31.0.0 Emerald
    Analysis ID:371964
    Start date:19.03.2021
    Start time:12:41:08
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 5s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:api.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal64.evad.winEXE@2/4@1/2
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 2.1% (good quality ratio 2.1%)
    • Quality average: 78%
    • Quality standard deviation: 16.4%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    Warnings:
    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 104.42.151.234, 40.88.32.150, 13.88.21.125, 20.50.102.62, 13.64.90.137, 104.43.193.48, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 92.122.213.247, 92.122.213.194
    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    CLOUDFLARENETUSapi.exeGet hashmaliciousBrowse
    • 172.67.182.193
    APCDOn0lEH.dllGet hashmaliciousBrowse
    • 104.20.185.68
    qzinl7qkwD.exeGet hashmaliciousBrowse
    • 104.21.79.24
    z2xQEFs54b.exeGet hashmaliciousBrowse
    • 172.67.128.139
    qzinl7qkwD.exeGet hashmaliciousBrowse
    • 172.67.188.8
    photoloader.dllGet hashmaliciousBrowse
    • 104.20.184.68
    YpyXT7Tnik.exeGet hashmaliciousBrowse
    • 104.16.154.36
    Direcci#U00f3n de Impuestos y Aduanas Nacionales.vbsGet hashmaliciousBrowse
    • 172.67.219.133
    #Ud83d#Udd0aAudio997.wavv-copy.htmlGet hashmaliciousBrowse
    • 172.67.214.111
    Invoice inv47921168.htmlGet hashmaliciousBrowse
    • 104.16.18.94
    PiS1Flv8Al.exeGet hashmaliciousBrowse
    • 104.17.62.50
    p0Qhewg73f.exeGet hashmaliciousBrowse
    • 104.17.63.50
    b9uMEI1qOT.dllGet hashmaliciousBrowse
    • 104.20.184.68
    wPi28FOPae.exeGet hashmaliciousBrowse
    • 172.67.83.132
    YeTkeRWSot.exeGet hashmaliciousBrowse
    • 172.67.219.133
    tbJ6MFpyVX.exeGet hashmaliciousBrowse
    • 172.67.83.132
    Q1FqODCZV6.exeGet hashmaliciousBrowse
    • 104.17.63.50
    PT5vcWvTNr.exeGet hashmaliciousBrowse
    • 172.67.219.133
    Purchase Order19321.docGet hashmaliciousBrowse
    • 172.67.207.35
    SecuriteInfo.com.Trojan.Win32.Save.a.8501.exeGet hashmaliciousBrowse
    • 104.21.22.219
    No context
    No context
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_api.exe_bde7d97b705cee582afe7bb6c85cb3aacec1b52_3f83328d_0bfdd03f\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):11562
    Entropy (8bit):3.7678449578832627
    Encrypted:false
    SSDEEP:96:sPf25BnA8vHfxIwY9oIaq9NfPpXIQcQvc6QcEDMcw3DhCm+HbHgnoW6HeonsFEJU:ymDHiHBUZMXojGHk/u7s8AS274Itlu
    MD5:9DFE6E12F4E345DFA71F88D88EC81F3B
    SHA1:D681D157507A56E337A87D50A374E0B79CCFA8B4
    SHA-256:09BD649738D81ECBD09F318666BEA5774017D116FF919EC44046C5AC74E04381
    SHA-512:895332C54DF5D71ADE583EBC959580DDAE021A0AAAB059C5CDCCE9641DB5BF8AD752AD15985042E135884D306C80E4A781B8A70AF4241E4B5C6E33CD2A0C7734
    Malicious:true
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.0.6.2.7.7.1.3.1.5.4.9.5.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.0.6.2.7.7.1.6.9.9.8.6.8.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.9.b.f.0.1.c.-.1.5.1.c.-.4.3.b.5.-.b.3.f.1.-.4.c.8.c.c.7.d.2.5.2.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.c.a.3.2.2.7.-.e.a.0.6.-.4.0.5.3.-.b.c.c.c.-.c.6.c.b.2.5.b.a.2.3.6.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.p.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.G.o.o.g.l.e.U.p.d.a.t.e.S.e.t.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.c.-.0.0.0.1.-.0.0.1.b.-.c.0.a.f.-.f.e.d.8.b.4.1.c.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.5.b.2.5.b.e.0.2.8.7.c.2.7.f.7.e.9.5.2.f.e.7.9.9.7.2.0.6.3.5.6.0.0.0.0.0.9.0.4.!.0.0.0.0.3.d.6.4.a.b.b.c.5.3.3.0.2.1.e.b.4.6.a.8.6.0.d.1.3.f.8.4.6.5.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBBD.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 15 streams, Fri Mar 19 11:41:54 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):78320
    Entropy (8bit):1.89753116343559
    Encrypted:false
    SSDEEP:192:E5d++19UFDMajulPCBuFYGQXUnIYzz6PPXgObLmPw353bseOuW6GZ1n7RAFXnTMT:61qgFYBPXXmPwhOuEoXIpB
    MD5:0AF7D16EECCF0618459F06B6353C9EB3
    SHA1:B3C4EBBA0F717E38DF9216904A93C9FC7E012C57
    SHA-256:14BA2CE896028777D4557F378B419F663330A8C3702CA21F5692BD423F7D09EF
    SHA-512:579695B40C8AA0B3EF6816D12BF7CDE639B3B0C139962A7C28BAFE4A8F737251E53135A640CCE68F66FF8B88E080D8D93D1E607130EAFD77E22130382B6DF4C1
    Malicious:false
    Reputation:low
    Preview: MDMP....... .........T`...................U...........B......h.......GenuineIntelW...........T.............T`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFD5.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8264
    Entropy (8bit):3.69548014548556
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiGF6To16YrHSU6+BgmfKSd+pru89b0xsft8m:RrlsNiU6To16YLSU6+BgmfKS+0qfD
    MD5:50654062BFCAD9BEE074DD2AACEFDC65
    SHA1:0BDB7C67744C4A66CFCAA23FDE121823A822CA5F
    SHA-256:F47A08952BC147703C771ABE04771AA18397D210D0F68D75938ABE546E1A34F6
    SHA-512:59E829E89D9F7C24B2C77204650E73C75DFF07B243700C6F77245A0044E36579178AD14FC5146CC69F9F45D1677A1EBD47FC9A8BCC7F3299C8DB5A9C0831E2D6
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.8.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERC19B.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4602
    Entropy (8bit):4.43980057180413
    Encrypted:false
    SSDEEP:48:cvIwSD8zsYJgtWI9Rj9WSC8Bg8fm8M4JQ3FUL+q8iejDDTg0d:uITfeeMSNzJ3mjvM0d
    MD5:EEF75C94B6B3925D9C71E57F02E6A7CE
    SHA1:1674FE0F30761DECF8BE045E057C94ACCAA89652
    SHA-256:9E814112D51D21516C65E1BF6A3FB3251FCAAA9200BB0CFD8E13464244243CAD
    SHA-512:D047794F284096533DFB57766C969750F8179A4C2A031872F075A610AFDC9097187859CC03EF508C66A5D4A7A3A83981761FE26A68CE706927B6A491848E77B7
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="908452" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.935954826556636
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:api.exe
    File size:2071040
    MD5:b63932cde2143b739551fa5501394146
    SHA1:3d64abbc533021eb46a860d13f8465d2e448fcd3
    SHA256:c592d92f14fd97f4f4b29a3c71ec2a119d4cf5df4750f76fc455e1f82bc8b798
    SHA512:f69185b41c3e7657ebfc8653aa4222dd2ae3c047d989f45d92f428ac212d7a1116a6f1a9cfecf61f894c69ba0e4caeb847dc71510909859a2927f32a82c75a93
    SSDEEP:49152:noT1j3FsVjlgHnPcN/45z7p9PgYGG8BQBCqnNKxTmORI/CaX+ijHFPPP:noT1bpcO5F8eC+NkBRGXLjH9PP
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8.q.|...|...|...'...q...'.......'...j...'...}.......3.......m.......e...'...o...|.......}...u...}...}...}...}...Rich|..........

    File Icon

    Icon Hash:6863eee6b292c6ee

    General

    Entrypoint:0x40ae2b
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x6054676F [Fri Mar 19 08:57:19 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:212ad670c01686a5b7fce94f52bc41d1
    Instruction
    call 00007F046C8593C2h
    jmp 00007F046C858D1Fh
    push ebp
    mov ebp, esp
    push esi
    push dword ptr [ebp+08h]
    mov esi, ecx
    call 00007F046C850912h
    mov dword ptr [esi], 00425340h
    mov eax, esi
    pop esi
    pop ebp
    retn 0004h
    and dword ptr [ecx+04h], 00000000h
    mov eax, ecx
    and dword ptr [ecx+08h], 00000000h
    mov dword ptr [ecx+04h], 00425348h
    mov dword ptr [ecx], 00425340h
    ret
    push ebp
    mov ebp, esp
    push esi
    push dword ptr [ebp+08h]
    mov esi, ecx
    call 00007F046C8508DFh
    mov dword ptr [esi], 0042535Ch
    mov eax, esi
    pop esi
    pop ebp
    retn 0004h
    and dword ptr [ecx+04h], 00000000h
    mov eax, ecx
    and dword ptr [ecx+08h], 00000000h
    mov dword ptr [ecx+04h], 00425364h
    mov dword ptr [ecx], 0042535Ch
    ret
    push ebp
    mov ebp, esp
    push esi
    mov esi, ecx
    lea eax, dword ptr [esi+04h]
    mov dword ptr [esi], 00425334h
    push eax
    call 00007F046C85AC18h
    test byte ptr [ebp+08h], 00000001h
    pop ecx
    je 00007F046C858EACh
    push 0000000Ch
    push esi
    call 00007F046C858ACCh
    pop ecx
    pop ecx
    mov eax, esi
    pop esi
    pop ebp
    retn 0004h
    push ebp
    mov ebp, esp
    sub esp, 0Ch
    lea ecx, dword ptr [ebp-0Ch]
    call 00007F046C858E1Fh
    push 00433C24h
    lea eax, dword ptr [ebp-0Ch]
    push eax
    call 00007F046C85ADFFh
    int3
    push ebp
    mov ebp, esp
    sub esp, 0Ch
    lea ecx, dword ptr [ebp-0Ch]
    call 00007F046C858E35h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x343a40x8c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x132246.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x16a0000x228c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x323700x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x324840x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x323e00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x250000x1c0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x23ce80x23e00False0.558042519599data6.64138021056IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x250000xfdb60xfe00False0.518531619094data5.70182022829IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x350000x1f680x1200False0.182074652778DOS executable (block device driver \277DN)3.01785095247IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x370000x1322460x132400False0.982848373724data7.9869015532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x16a0000x228c0x2400False0.7314453125data6.6640906817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    B0x378280x12a154LZMA compressed data, non-streamed, size 8381306
    GOOGLEUPDATE0x16197c0x4data
    RT_ICON0x1619800x128GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x161aa80x568GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x1620100x2e8dataEnglishUnited States
    RT_ICON0x1622f80x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8816262, next used block 9868950EnglishUnited States
    RT_ICON0x162ba00x668dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 224, next used block 65281EnglishUnited States
    RT_ICON0x1632080xea8dataEnglishUnited States
    RT_STRING0x1640b00x12adataArabicSaudi Arabia
    RT_STRING0x1641dc0x196dataBulgarianBulgaria
    RT_STRING0x1643740x182dataCatalanSpain
    RT_STRING0x1644f80xb8dataChineseTaiwan
    RT_STRING0x1645b00x176dataCzechCzech Republic
    RT_STRING0x1647280x146dataDanishDenmark
    RT_STRING0x1648700x156dataGermanGermany
    RT_STRING0x1649c80x19cdataGreekGreece
    RT_STRING0x164b640x120dataEnglishUnited States
    RT_STRING0x164c840x174dataFinnishFinland
    RT_STRING0x164df80x1acdataFrenchFrance
    RT_STRING0x164fa40x12edataHebrewIsrael
    RT_STRING0x1650d40x150dataHungarianHungary
    RT_STRING0x1652240x13cdataIcelandicIceland
    RT_STRING0x1653600x19cdataItalianItaly
    RT_STRING0x1654fc0xeadataJapaneseJapan
    RT_STRING0x1655e80xdedataKoreanNorth Korea
    RT_STRING0x1655e80xdedataKoreanSouth Korea
    RT_STRING0x1656c80x19cdataDutchNetherlands
    RT_STRING0x1658640x16cdataNorwegianNorway
    RT_STRING0x1659d00x17cdataPolishPoland
    RT_STRING0x165b4c0x14adataPortugueseBrazil
    RT_STRING0x165c980x1b2dataRomanianRomania
    RT_STRING0x165e4c0x182dataRussianRussia
    RT_STRING0x165fd00x188dataCroatianCroatia
    RT_STRING0x1661580x16cdataSlovakSlovakia
    RT_STRING0x1662c40x18cdataSwedishSweden
    RT_STRING0x1664500x146dataThaiThailand
    RT_STRING0x1665980x146dataTurkishTurkey
    RT_STRING0x1666e00x118dataUrduPakistan
    RT_STRING0x1666e00x118dataUrduIndia
    RT_STRING0x1667f80x164dataIndonesianIndonesia
    RT_STRING0x16695c0x15adataUkrainianUkrain
    RT_STRING0x166ab80x1a8dataSlovenianSlovenia
    RT_STRING0x166c600x138dataEstonianEstonia
    RT_STRING0x166d980x1c4dataLatvianLativa
    RT_STRING0x166f5c0x174dataLithuanianLithuania
    RT_STRING0x1670d00x124dataFarsiIran
    RT_STRING0x1670d00x124dataFarsiAfganistan
    RT_STRING0x1670d00x124dataFarsiTajikistan
    RT_STRING0x1670d00x124dataFarsiUzbekistan
    RT_STRING0x1671f40x144dataVietnameseVietnam
    RT_STRING0x1673380x128dataHindiIndia
    RT_STRING0x1674600x148dataMalayMalaysia
    RT_STRING0x1675a80x15edataSwahiliKenya
    RT_STRING0x1675a80x15edataSwahiliMozambiq
    RT_STRING0x1677080x122dataBengaliIndia
    RT_STRING0x16782c0x13edataGujaratiIndia
    RT_STRING0x16796c0x13adataTamilIndia
    RT_STRING0x16796c0x13adataTamilSri Lanka
    RT_STRING0x167aa80x140dataTeluguIndia
    RT_STRING0x167be80x142dataKannadaKanada
    RT_STRING0x167d2c0x186dataMalayalamIndia
    RT_STRING0x167eb40x164dataMarathiIndia
    RT_STRING0x1680180xdcdataAmharicEthiopia
    RT_STRING0x1680f40x168dataFilipinoPhilippines
    RT_STRING0x16825c0xbadataChineseChina
    RT_STRING0x1683180x120dataEnglishGreat Britain
    RT_STRING0x1684380x13edataSpanishMexico
    RT_STRING0x1685780x174dataPortuguesePortugal
    RT_STRING0x1686ec0x196data
    RT_STRING0x1688840x1aadataSerbianCyrillic
    RT_GROUP_ICON0x168a300x5adataEnglishUnited States
    RT_VERSION0x168a8c0x32cdataEnglishUnited States
    RT_MANIFEST0x168db80x48eXML 1.0 document, ASCII text
    DLLImport
    KERNEL32.dllHeapAlloc, GetProcAddress, GetProcessHeap, FreeLibrary, IsBadReadPtr, CreateProcessA, Process32First, GetCurrentProcess, GetModuleHandleA, CreateToolhelp32Snapshot, Sleep, GetLastError, GetNativeSystemInfo, CloseHandle, ExitProcess, lstrcmpiA, ReadFile, WriteFile, GetTempPathA, CreateFileA, DeleteFileA, GetFileSize, HeapSize, GetConsoleCP, FlushFileBuffers, CreateFileW, LoadLibraryA, VirtualAlloc, VirtualFree, SetLastError, HeapFree, Process32Next, VirtualProtect, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetConsoleMode, SetFilePointerEx, GetFileType, HeapReAlloc, WriteConsoleW, GetStdHandle, GetModuleFileNameW, GetModuleHandleExW, LoadLibraryExW, RaiseException, RtlUnwind, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, CreateEventW, GetModuleHandleW, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, WideCharToMultiByte, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringW, GetLocaleInfoW, GetStringTypeW, GetCPInfo
    USER32.dllwsprintfA
    ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, RegGetValueA
    SHELL32.dllShellExecuteA
    SHLWAPI.dllStrStrIA
    WINHTTP.dllWinHttpCloseHandle, WinHttpSendRequest, WinHttpQueryDataAvailable, WinHttpOpenRequest, WinHttpReadData, WinHttpSetTimeouts, WinHttpOpen, WinHttpReceiveResponse, WinHttpConnect
    DescriptionData
    LegalCopyrightCopyright 2018 Google LLC
    InternalNameGoogle Update Setup
    FileVersion1.3.35.342
    CompanyNameGoogle LLC
    LanguageIden
    ProductNameGoogle Update
    ProductVersion1.3.35.342
    FileDescriptionGoogle Update Setup
    OriginalFilenameGoogleUpdateSetup.exe
    Translation0x0409 0x04b0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    ArabicSaudi Arabia
    BulgarianBulgaria
    CatalanSpain
    ChineseTaiwan
    CzechCzech Republic
    DanishDenmark
    GermanGermany
    GreekGreece
    FinnishFinland
    FrenchFrance
    HebrewIsrael
    HungarianHungary
    IcelandicIceland
    ItalianItaly
    JapaneseJapan
    KoreanNorth Korea
    KoreanSouth Korea
    DutchNetherlands
    NorwegianNorway
    PolishPoland
    PortugueseBrazil
    RomanianRomania
    RussianRussia
    CroatianCroatia
    SlovakSlovakia
    SwedishSweden
    ThaiThailand
    TurkishTurkey
    UrduPakistan
    UrduIndia
    IndonesianIndonesia
    UkrainianUkrain
    SlovenianSlovenia
    EstonianEstonia
    LatvianLativa
    LithuanianLithuania
    FarsiIran
    FarsiAfganistan
    FarsiTajikistan
    FarsiUzbekistan
    VietnameseVietnam
    MalayMalaysia
    SwahiliKenya
    SwahiliMozambiq
    TamilSri Lanka
    KannadaKanada
    AmharicEthiopia
    FilipinoPhilippines
    ChineseChina
    EnglishGreat Britain
    SpanishMexico
    PortuguesePortugal
    SerbianCyrillic

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    03/19/21-12:35:59.641669TCP1201ATTACK-RESPONSES 403 Forbidden8049732172.67.182.193192.168.2.4
    03/19/21-12:35:59.756694TCP1201ATTACK-RESPONSES 403 Forbidden8049732172.67.182.193192.168.2.4

    Network Port Distribution

    • Total Packets: 46
    • 80 (HTTP)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    Mar 19, 2021 12:41:50.123013020 CET4974780192.168.2.4104.21.18.167
    Mar 19, 2021 12:41:50.166119099 CET8049747104.21.18.167192.168.2.4
    Mar 19, 2021 12:41:50.166275024 CET4974780192.168.2.4104.21.18.167
    Mar 19, 2021 12:41:50.167229891 CET4974780192.168.2.4104.21.18.167
    Mar 19, 2021 12:41:50.208826065 CET8049747104.21.18.167192.168.2.4
    Mar 19, 2021 12:41:50.219945908 CET8049747104.21.18.167192.168.2.4
    Mar 19, 2021 12:41:50.235914946 CET4974780192.168.2.4104.21.18.167
    Mar 19, 2021 12:41:50.277554035 CET8049747104.21.18.167192.168.2.4
    Mar 19, 2021 12:41:50.286350965 CET8049747104.21.18.167192.168.2.4
    Mar 19, 2021 12:41:50.340141058 CET4974780192.168.2.4104.21.18.167
    Mar 19, 2021 12:42:00.154618025 CET4974780192.168.2.4104.21.18.167
    TimestampSource PortDest PortSource IPDest IP
    Mar 19, 2021 12:41:42.849868059 CET5585453192.168.2.48.8.8.8
    Mar 19, 2021 12:41:42.899146080 CET53558548.8.8.8192.168.2.4
    Mar 19, 2021 12:41:43.327034950 CET6454953192.168.2.48.8.8.8
    Mar 19, 2021 12:41:43.384898901 CET53645498.8.8.8192.168.2.4
    Mar 19, 2021 12:41:44.534482956 CET6315353192.168.2.48.8.8.8
    Mar 19, 2021 12:41:44.584237099 CET53631538.8.8.8192.168.2.4
    Mar 19, 2021 12:41:48.546674967 CET5299153192.168.2.48.8.8.8
    Mar 19, 2021 12:41:48.596236944 CET53529918.8.8.8192.168.2.4
    Mar 19, 2021 12:41:49.550297022 CET5370053192.168.2.48.8.8.8
    Mar 19, 2021 12:41:49.600048065 CET53537008.8.8.8192.168.2.4
    Mar 19, 2021 12:41:50.013761044 CET5172653192.168.2.48.8.8.8
    Mar 19, 2021 12:41:50.077419043 CET53517268.8.8.8192.168.2.4
    Mar 19, 2021 12:41:56.323702097 CET5679453192.168.2.48.8.8.8
    Mar 19, 2021 12:41:56.376306057 CET53567948.8.8.8192.168.2.4
    Mar 19, 2021 12:41:57.294467926 CET5653453192.168.2.48.8.8.8
    Mar 19, 2021 12:41:57.346875906 CET53565348.8.8.8192.168.2.4
    Mar 19, 2021 12:41:57.534070969 CET5662753192.168.2.48.8.8.8
    Mar 19, 2021 12:41:57.586289883 CET53566278.8.8.8192.168.2.4
    Mar 19, 2021 12:41:59.086359024 CET5662153192.168.2.48.8.8.8
    Mar 19, 2021 12:41:59.146933079 CET53566218.8.8.8192.168.2.4
    Mar 19, 2021 12:42:00.571120024 CET6311653192.168.2.48.8.8.8
    Mar 19, 2021 12:42:00.623409033 CET53631168.8.8.8192.168.2.4
    Mar 19, 2021 12:42:01.373596907 CET6407853192.168.2.48.8.8.8
    Mar 19, 2021 12:42:01.423741102 CET53640788.8.8.8192.168.2.4
    Mar 19, 2021 12:42:02.602166891 CET6480153192.168.2.48.8.8.8
    Mar 19, 2021 12:42:02.654356956 CET53648018.8.8.8192.168.2.4
    Mar 19, 2021 12:42:03.941096067 CET6172153192.168.2.48.8.8.8
    Mar 19, 2021 12:42:03.993263960 CET53617218.8.8.8192.168.2.4
    Mar 19, 2021 12:42:07.002767086 CET5125553192.168.2.48.8.8.8
    Mar 19, 2021 12:42:07.060898066 CET53512558.8.8.8192.168.2.4
    Mar 19, 2021 12:42:07.884759903 CET6152253192.168.2.48.8.8.8
    Mar 19, 2021 12:42:07.937033892 CET53615228.8.8.8192.168.2.4
    Mar 19, 2021 12:42:12.121313095 CET5233753192.168.2.48.8.8.8
    Mar 19, 2021 12:42:12.171473026 CET53523378.8.8.8192.168.2.4
    Mar 19, 2021 12:42:12.323532104 CET5504653192.168.2.48.8.8.8
    Mar 19, 2021 12:42:12.372864008 CET53550468.8.8.8192.168.2.4
    Mar 19, 2021 12:42:12.919662952 CET4961253192.168.2.48.8.8.8
    Mar 19, 2021 12:42:12.973860025 CET53496128.8.8.8192.168.2.4
    Mar 19, 2021 12:42:17.952696085 CET4928553192.168.2.48.8.8.8
    Mar 19, 2021 12:42:18.002171040 CET53492858.8.8.8192.168.2.4
    Mar 19, 2021 12:42:19.130839109 CET5060153192.168.2.48.8.8.8
    Mar 19, 2021 12:42:19.180336952 CET53506018.8.8.8192.168.2.4
    Mar 19, 2021 12:42:20.286911011 CET6087553192.168.2.48.8.8.8
    Mar 19, 2021 12:42:20.336321115 CET53608758.8.8.8192.168.2.4
    Mar 19, 2021 12:42:21.449606895 CET5644853192.168.2.48.8.8.8
    Mar 19, 2021 12:42:21.499216080 CET53564488.8.8.8192.168.2.4
    Mar 19, 2021 12:42:28.631556988 CET5917253192.168.2.48.8.8.8
    Mar 19, 2021 12:42:28.734754086 CET53591728.8.8.8192.168.2.4
    Mar 19, 2021 12:42:29.295288086 CET6242053192.168.2.48.8.8.8
    Mar 19, 2021 12:42:29.422442913 CET53624208.8.8.8192.168.2.4
    Mar 19, 2021 12:42:29.853671074 CET6057953192.168.2.48.8.8.8
    Mar 19, 2021 12:42:29.947283983 CET53605798.8.8.8192.168.2.4
    Mar 19, 2021 12:42:29.974452972 CET5018353192.168.2.48.8.8.8
    Mar 19, 2021 12:42:30.049989939 CET53501838.8.8.8192.168.2.4
    Mar 19, 2021 12:42:30.399065971 CET6153153192.168.2.48.8.8.8
    Mar 19, 2021 12:42:30.456696033 CET53615318.8.8.8192.168.2.4
    Mar 19, 2021 12:42:30.980238914 CET4922853192.168.2.48.8.8.8
    Mar 19, 2021 12:42:31.038223028 CET53492288.8.8.8192.168.2.4
    Mar 19, 2021 12:42:31.554480076 CET5979453192.168.2.48.8.8.8
    Mar 19, 2021 12:42:31.612416983 CET53597948.8.8.8192.168.2.4
    Mar 19, 2021 12:42:32.139904976 CET5591653192.168.2.48.8.8.8
    Mar 19, 2021 12:42:32.189273119 CET53559168.8.8.8192.168.2.4
    Mar 19, 2021 12:42:33.435105085 CET5275253192.168.2.48.8.8.8
    Mar 19, 2021 12:42:33.503179073 CET53527528.8.8.8192.168.2.4
    Mar 19, 2021 12:42:34.325062990 CET6054253192.168.2.48.8.8.8
    Mar 19, 2021 12:42:34.386035919 CET53605428.8.8.8192.168.2.4
    Mar 19, 2021 12:42:34.872929096 CET6068953192.168.2.48.8.8.8
    Mar 19, 2021 12:42:34.933021069 CET53606898.8.8.8192.168.2.4
    Mar 19, 2021 12:42:38.843983889 CET6420653192.168.2.48.8.8.8
    Mar 19, 2021 12:42:38.905520916 CET53642068.8.8.8192.168.2.4
    Mar 19, 2021 12:42:47.425586939 CET5090453192.168.2.48.8.8.8
    Mar 19, 2021 12:42:47.477922916 CET53509048.8.8.8192.168.2.4
    Mar 19, 2021 12:42:47.596848011 CET5752553192.168.2.48.8.8.8
    Mar 19, 2021 12:42:47.668210983 CET53575258.8.8.8192.168.2.4
    Mar 19, 2021 12:42:50.328815937 CET5381453192.168.2.48.8.8.8
    Mar 19, 2021 12:42:50.388324022 CET53538148.8.8.8192.168.2.4
    Mar 19, 2021 12:43:21.109225035 CET5341853192.168.2.48.8.8.8
    Mar 19, 2021 12:43:21.158648014 CET53534188.8.8.8192.168.2.4
    Mar 19, 2021 12:43:22.850086927 CET6283353192.168.2.48.8.8.8
    Mar 19, 2021 12:43:22.910229921 CET53628338.8.8.8192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Mar 19, 2021 12:41:50.013761044 CET192.168.2.48.8.8.80xe685Standard query (0)doought.comA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Mar 19, 2021 12:41:50.077419043 CET8.8.8.8192.168.2.40xe685No error (0)doought.com104.21.18.167A (IP address)IN (0x0001)
    Mar 19, 2021 12:41:50.077419043 CET8.8.8.8192.168.2.40xe685No error (0)doought.com172.67.182.193A (IP address)IN (0x0001)
    • doought.com
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.449747104.21.18.16780C:\Users\user\Desktop\api.exe
    TimestampkBytes transferredDirectionData
    Mar 19, 2021 12:41:50.167229891 CET937OUTGET /evreigate.php HTTP/1.1
    Connection: Keep-Alive
    User-Agent: deus vult
    Host: doought.com
    Mar 19, 2021 12:41:50.219945908 CET938INHTTP/1.1 403 Forbidden
    Date: Fri, 19 Mar 2021 11:41:50 GMT
    Content-Type: text/plain; charset=UTF-8
    Content-Length: 16
    Connection: keep-alive
    Set-Cookie: __cfduid=dab42806a5e8315c577fe881f53752cb91616154110; expires=Sun, 18-Apr-21 11:41:50 GMT; path=/; domain=.doought.com; HttpOnly; SameSite=Lax
    X-Frame-Options: SAMEORIGIN
    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Expires: Thu, 01 Jan 1970 00:00:01 GMT
    cf-request-id: 08ebe3c0f3000005dc33b2c000000001
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=cuBvQgOvOCcoQxCysfWzHKhHFs%2Fp78xWVaK4rvKKtgOmEHtHOKBjDl2O7WY7jHr1jYrYDAqW9cCOo7CCiQejtLFRa%2BuLXfvKotecNA%3D%3D"}],"max_age":604800,"group":"cf-nel"}
    NEL: {"max_age":604800,"report_to":"cf-nel"}
    Server: cloudflare
    CF-RAY: 63266f14b91b05dc-FRA
    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
    Data Ascii: error code: 1020
    Mar 19, 2021 12:41:50.235914946 CET938OUTGET /hit.php?a=%7BbWW0uZJNBoadTsmEUEzhG%7Did=29 HTTP/1.1
    Connection: Keep-Alive
    User-Agent: deus vult
    Host: doought.com
    Mar 19, 2021 12:41:50.286350965 CET939INHTTP/1.1 403 Forbidden
    Date: Fri, 19 Mar 2021 11:41:50 GMT
    Content-Type: text/plain; charset=UTF-8
    Content-Length: 16
    Connection: keep-alive
    Set-Cookie: __cfduid=dab42806a5e8315c577fe881f53752cb91616154110; expires=Sun, 18-Apr-21 11:41:50 GMT; path=/; domain=.doought.com; HttpOnly; SameSite=Lax
    X-Frame-Options: SAMEORIGIN
    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Expires: Thu, 01 Jan 1970 00:00:01 GMT
    cf-request-id: 08ebe3c137000005dc87943000000001
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=f95WW97Bu%2Fq%2Bf6Wzvrc4we0eMt1olLT9aDPGEvGk%2Fcn38At2qhfps0fKix8P7ZGrW9Vz0BZLZrUs0Tkqh5EzhRLNAsHi0ORMJziVYQ%3D%3D"}],"max_age":604800,"group":"cf-nel"}
    NEL: {"max_age":604800,"report_to":"cf-nel"}
    Server: cloudflare
    CF-RAY: 63266f1529cd05dc-FRA
    Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
    Data Ascii: error code: 1020


    Code Manipulations

    Statistics

    Behavior

    Click to jump to process

    System Behavior

    Start time:12:41:49
    Start date:19/03/2021
    Path:C:\Users\user\Desktop\api.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\api.exe'
    Imagebase:0xf20000
    File size:2071040 bytes
    MD5 hash:B63932CDE2143B739551FA5501394146
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Start time:12:41:51
    Start date:19/03/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 712
    Imagebase:0xf30000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis