Loading ...

Play interactive tourEdit tour

Windows Analysis Report SignerLib.exe

Overview

General Information

Sample Name:SignerLib.exe
Analysis ID:441008
MD5:796b3e4674b68b33c906ce32c3275d83
SHA1:af8dc103b73c194816743ee22023a3cee934ac54
SHA256:afb5cbe324865253c7a9dcadbe66c66746ea360f0cd184a2f4e1bbf104533ccd
Infos:

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Found potential dummy code loops (likely to delay analysis)
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
PE file contains strange resources
Program does not show much activity (idle)
Uses 32bit PE files

Classification

Process Tree

  • System is w10x64
  • SignerLib.exe (PID: 6076 cmdline: 'C:\Users\user\Desktop\SignerLib.exe' MD5: 796B3E4674B68B33C906CE32C3275D83)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: SignerLib.exeVirustotal: Detection: 15%Perma Link
Source: SignerLib.exeReversingLabs: Detection: 17%
Source: 0.0.SignerLib.exe.1220000.0.unpackAvira: Label: TR/ATRAPS.Gen4
Source: SignerLib.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
Source: C:\Users\user\Desktop\SignerLib.exeProcess Stats: CPU usage > 98%
Source: SignerLib.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SignerLib.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
Source: classification engineClassification label: mal52.evad.winEXE@1/0@0/0
Source: SignerLib.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SignerLib.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SignerLib.exeVirustotal: Detection: 15%
Source: SignerLib.exeReversingLabs: Detection: 17%
Source: SignerLib.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SignerLib.exeStatic file information: File size 7115776 > 1048576
Source: SignerLib.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x6bc400
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SignerLib.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SignerLib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SignerLib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SignerLib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SignerLib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SignerLib.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Users\user\Desktop\SignerLib.exeProcess Stats: CPU usage > 90% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SignerLib.exeMemory allocated: page read and write | page guardJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionVirtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
SignerLib.exe16%VirustotalBrowse
SignerLib.exe17%ReversingLabsWin32.Trojan.Generic

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.0.SignerLib.exe.1220000.0.unpack100%AviraTR/ATRAPS.Gen4Download File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:441008
Start date:27.06.2021
Start time:19:33:55
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 16s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:SignerLib.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:32
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Max analysis timeout: 220s exceeded, the analysis took too long
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.591342929980768
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SignerLib.exe
File size:7115776
MD5:796b3e4674b68b33c906ce32c3275d83
SHA1:af8dc103b73c194816743ee22023a3cee934ac54
SHA256:afb5cbe324865253c7a9dcadbe66c66746ea360f0cd184a2f4e1bbf104533ccd
SHA512:1c47a540582e4030a5e4ffd91df559936f3e585d8e679eb4cf65a03740c35ac2f27126b21af107b08c33b301d6626ff8296be1789ee7638077fcd4ae451cd50c
SSDEEP:196608:FaSSW6I52i0ezA2avJ25OjX7qo+YDuTNROilLZGfNaSvY9P0QmXSSZINaWMFUtnr:gSS6/3ahKOjrqquTNROilLZoazsQmrZ0
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........p....C...C...C...B...C...BS..C...B...Cg..B...Cg..B...Cg..B...C...B...C...C...C...C...C@..B...CRich...C........PE..L......`...

File Icon

Icon Hash:3636b5a5a6b5b112

Static PE Info

General

Entrypoint:0xaafe69
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
Time Stamp:0x60D5FB1C [Fri Jun 25 15:49:48 2021 UTC]
TLS Callbacks:0xaa5970
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:b4a4f42eeacc77c5d3caaa7d5ec68819

Entrypoint Preview

Instruction
call 00007F5D548C5312h
jmp 00007F5D548C4E39h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push ebx
push esi
mov eax, dword ptr [esp+18h]
or eax, eax
jne 00007F5D548C4FDAh
mov ecx, dword ptr [esp+14h]
mov eax, dword ptr [esp+10h]
xor edx, edx
div ecx
mov ebx, eax
mov eax, dword ptr [esp+0Ch]
div ecx
mov edx, ebx
jmp 00007F5D548C5003h
mov ecx, eax
mov ebx, dword ptr [esp+14h]
mov edx, dword ptr [esp+10h]
mov eax, dword ptr [esp+0Ch]
shr ecx, 1
rcr ebx, 1
shr edx, 1
rcr eax, 1
or ecx, ecx
jne 00007F5D548C4FB6h
div ebx
mov esi, eax
mul dword ptr [esp+18h]
mov ecx, eax
mov eax, dword ptr [esp+14h]
mul esi
add edx, ecx
jc 00007F5D548C4FD0h
cmp edx, dword ptr [esp+10h]
jnbe 00007F5D548C4FCAh
jc 00007F5D548C4FC9h
cmp eax, dword ptr [esp+0Ch]
jbe 00007F5D548C4FC3h
dec esi
xor edx, edx
mov eax, esi
pop esi
pop ebx
retn 0010h
int3
int3
int3
int3
int3
int3
int3
int3
push ecx
lea ecx, dword ptr [esp+04h]
sub ecx, eax
sbb eax, eax
not eax
and ecx, eax
mov eax, esp
and eax, FFFFF000h
cmp ecx, eax
jc 00007F5D548C4FCEh
mov eax, ecx
pop ecx
xchg eax, esp
mov eax, dword ptr [eax]
mov dword ptr [esp], eax
ret
sub eax, 00001000h
test dword ptr [eax], eax
jmp 00007F5D548C4FA9h
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
push esi
mov ecx, dword ptr [eax+3Ch]
add ecx, eax
movzx eax, word ptr [ecx+14h]
lea edx, dword ptr [ecx+18h]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x6c740c0x28.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6ca0000x51c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6cb0000x1cc0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x6c6c0c0x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x6c6d000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6c6c280x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6be0000x164.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x6bc2e70x6bc400unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x6be0000x9c4a0x9e00False0.443482990506data5.36754570285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x6c80000x139c0xa00False0.14453125data1.86819954265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x6ca0000x51c0x600False0.503255208333data4.62197862235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6cb0000x1cc00x1e00False0.760026041667GLS_BINARY_LSB_FIRST6.51987828401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x6ca0a00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_GROUP_ICON0x6ca5080x14dataEnglishUnited States

Imports

DLLImport
KERNEL32.dllGetCommandLineA, GetTickCount, GetLastError, GetVersion, GetCurrentProcess, GetProcessHeap, GetEnvironmentStrings, VirtualAlloc, GetSystemInfo, GetModuleHandleA, GetProcAddress, TlsGetValue, TlsSetValue, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, AcquireSRWLockShared, ReleaseSRWLockShared, SetLastError, GetEnvironmentVariableW, GetStdHandle, GetConsoleMode, WriteFile, WriteConsoleW, GetCurrentThread, RtlCaptureContext, ReleaseMutex, GetCurrentDirectoryW, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, CloseHandle, TlsAlloc, GetModuleHandleW, FormatMessageW, InitializeCriticalSection, TryEnterCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapAlloc, HeapFree, HeapReAlloc, AddVectoredExceptionHandler, SetThreadStackGuarantee, CreateFileW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, TerminateProcess, RtlUnwind, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, CompareStringW, LCMapStringW, HeapSize, FlushFileBuffers, GetConsoleCP, SetFilePointerEx, DecodePointer

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

System Behavior

General

Start time:19:34:41
Start date:27/06/2021
Path:C:\Users\user\Desktop\SignerLib.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\SignerLib.exe'
Imagebase:0x1220000
File size:7115776 bytes
MD5 hash:796B3E4674B68B33C906CE32C3275D83
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:0%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:2
    Total number of Limit Nodes:0

    Graph

    execution_graph 82733 12211c9 GetEnvironmentStringsA 82734 12211ce 82733->82734

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_012B0BAA 1 Function_01221020 2 Function_012210A0 39 Function_01221180 2->39 3 Function_01230FA0 46 Function_01221190 3->46 4 Function_01235520 4->46 5 Function_012393A0 5->46 6 Function_012650A0 6->46 7 Function_012211A5 8 Function_012773A0 8->46 9 Function_012211AB 10 Function_012B02A1 11 Function_012B0CA1 12 Function_012AEEA1 13 Function_012AF8A1 14 Function_012AFDA1 15 Function_012AFCBB 16 Function_01221030 62 Function_01221040 16->62 17 Function_012210B0 17->2 17->16 40 Function_01221100 17->40 18 Function_012AF2B8 19 Function_012AF3B8 20 Function_012AF7B8 21 Function_012211B1 22 Function_012B01B8 23 Function_012B06B8 24 Function_012B02BF 25 Function_012B07BF 26 Function_012211B7 27 Function_012AEEBF 28 Function_012AF8BF 29 Function_012AFDBF 30 Function_012737B0 30->46 31 Function_0127A4B0 31->46 32 Function_012B0CBC 33 Function_012862B0 33->46 34 Function_0129F030 34->46 35 Function_012211BD 36 Function_012AF08B 37 Function_01221000 37->1 38 Function_01221080 41 Function_01261500 41->46 42 Function_0127C900 42->46 43 Function_012AF38D 44 Function_0128E980 44->46 45 Function_01221110 45->17 63 Function_01221140 45->63 79 Function_01221150 45->79 51 Function_01221195 46->51 47 Function_01246510 47->46 48 Function_0124B590 48->46 49 Function_01253710 49->46 50 Function_012B079E 52 Function_01272510 52->46 53 Function_01221160 54 Function_0123FF60 54->46 55 Function_01269160 55->46 56 Function_01289E60 56->46 57 Function_0122A7F0 57->46 58 Function_0124D970 58->46 59 Function_01275FF0 59->46 60 Function_012ABD70 60->46 61 Function_012211C3 64 Function_012245C0 64->46 65 Function_01250740 65->46 66 Function_0125ED40 66->46 67 Function_01280240 67->46 68 Function_01291640 68->46 69 Function_012A0440 69->46 70 Function_012211C9 71 Function_012AF5C7 72 Function_012AFFC7 73 Function_012AF0C4 74 Function_012AFAC4 75 Function_012B04C4 76 Function_012B09C4 77 Function_012B0EC4 78 Function_01221050 78->53 80 Function_012211D4 80->46 81 Function_012635D0 81->46 82 Function_0126E550 82->46 83 Function_01259CDD 83->46 84 Function_01295A50 84->46 85 Function_0129A3D0 85->46 86 Function_012A6D50 86->46

    Executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 12211c9-12211ce GetEnvironmentStringsA
    APIs
    • GetEnvironmentStringsA.KERNEL32 ref: 012211C9
    Memory Dump Source
    • Source File: 00000000.00000002.581128027.0000000001221000.00000020.00020000.sdmp, Offset: 01220000, based on PE: true
    • Associated: 00000000.00000002.580658094.0000000001220000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1220000_SignerLib.jbxd
    Similarity
    • API ID: EnvironmentStrings
    • String ID:
    • API String ID: 2794021878-0
    • Opcode ID: 089d9486223b67812fce7978404d60285dd6758b3b94393d3e5b724ad1855514
    • Instruction ID: 620160ef96846537967366a5139775d1f73df7cc9a259a855fb558e7b8096b32
    • Opcode Fuzzy Hash: 089d9486223b67812fce7978404d60285dd6758b3b94393d3e5b724ad1855514
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions