Play interactive tourEdit tour

Windows Analysis Report pdfmain.dll

Overview

General Information

Sample Name:pdfmain.dll (renamed file extension from dll to exe)
Analysis ID:449073
MD5:bc975bb6627c055c3319c8eeab47548e
SHA1:8b3c741982b7006791299fadae13517f311a4f15
SHA256:91e12799063d4723b2dc42e5f6c8eb0d6d9c1d0678fae306dd2e2324ef959ac8
Infos:

Most interesting Screenshot:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Contains functionality to dynamically determine API calls
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • pdfmain.exe (PID: 1744 cmdline: 'C:\Users\user\Desktop\pdfmain.exe' MD5: BC975BB6627C055C3319C8EEAB47548E)
    • conhost.exe (PID: 2168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: pdfmain.exeVirustotal: Detection: 10%Perma Link
Source: pdfmain.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: pdfmain.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal56.evad.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2168:120:WilError_01
Source: C:\Users\user\Desktop\pdfmain.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: pdfmain.exeVirustotal: Detection: 10%
Source: unknownProcess created: C:\Users\user\Desktop\pdfmain.exe 'C:\Users\user\Desktop\pdfmain.exe'
Source: C:\Users\user\Desktop\pdfmain.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\Desktop\pdfmain.exeUnpacked PE file: 0.2.pdfmain.exe.400000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;UPX2:W; vs Unknown_Section0:ER;Unknown_Section1:ER;UPX2:W;
Source: C:\Users\user\Desktop\pdfmain.exeCode function: 0_2_00401023 GetModuleFileNameA,_splitpath,_makepath,LoadLibraryA,GetProcAddress,GetProcAddress,75974600,fprintf,GetProcAddress,GetProcAddress,FreeLibrary,75974600,fprintf,0_2_00401023
Source: initial sampleStatic PE information: section where entry point is pointing to: 1
Source: pdfmain.exeStatic PE information: section name: 0
Source: pdfmain.exeStatic PE information: section name: 1
Source: pdfmain.exeStatic PE information: section name: UPX2
Source: initial sampleStatic PE information: section name: 1 entropy: 6.93983949341
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\pdfmain.exeAPI call chain: ExitProcess graph end nodegraph_0-89
Source: C:\Users\user\Desktop\pdfmain.exeCode function: 0_2_00401023 GetModuleFileNameA,_splitpath,_makepath,LoadLibraryA,GetProcAddress,GetProcAddress,75974600,fprintf,GetProcAddress,GetProcAddress,FreeLibrary,75974600,fprintf,0_2_00401023
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API1Path InterceptionProcess Injection1Software Packing11OS Credential DumpingSystem Information Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 449073 Sample: pdfmain.dll Startdate: 15/07/2021 Architecture: WINDOWS Score: 56 11 Multi AV Scanner detection for submitted file 2->11 6 pdfmain.exe 1 2->6         started        process3 signatures4 13 Detected unpacking (changes PE section rights) 6->13 9 conhost.exe 6->9         started        process5

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
pdfmain.exe10%VirustotalBrowse
pdfmain.exe0%MetadefenderBrowse
pdfmain.exe7%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.0.pdfmain.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.2.pdfmain.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:449073
Start date:15.07.2021
Start time:07:40:25
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 19s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:pdfmain.dll (renamed file extension from dll to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.evad.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 100% (good quality ratio 58.3%)
  • Quality average: 41.4%
  • Quality standard deviation: 40.3%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated
Warnings:
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
\Device\ConDrv
Process:C:\Users\user\Desktop\pdfmain.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):49
Entropy (8bit):4.4102292316937
Encrypted:false
SSDEEP:3:6zLVqL2wOWXp5vVBLVH:0jPWXpF1H
MD5:EA03892B94E1403DA723E606DDFA17B6
SHA1:54C7011C12F35FB41EBD242E0ACFDAA88F716D14
SHA-256:943D73F280EEBC9E3890ECB063DF6EFC75F3E3CBE76F636F09D6F74A471F2656
SHA-512:0135FF0A3399C890D7F63B93D4479C3B3E40D7617EEEA05311A744D4F261D325F0A484124D326A92C5023AD3DBC585DA7A9730696BF74C1BEA808C995CDB9691
Malicious:false
Reputation:low
Preview: could not open C:\Users\user\Desktop\pdf2vec.dll

Static File Info

General

File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):4.940965822296286
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.70%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:pdfmain.exe
File size:3072
MD5:bc975bb6627c055c3319c8eeab47548e
SHA1:8b3c741982b7006791299fadae13517f311a4f15
SHA256:91e12799063d4723b2dc42e5f6c8eb0d6d9c1d0678fae306dd2e2324ef959ac8
SHA512:b8dbcd3433e5f446bb2b99df50e45bb689685694cc56516782dbd2db4e3b2e242418c160ba8aaa4543405d52707006e1d26b8934b463e8651409b47abcc1f413
SSDEEP:48:C22VEKP6HDjaWYE498uaK7DxbSeJY8JTaChsBC:AVEKP6HP3ZcHT7DxJhsg
File Content Preview:MZ......................@...............................................!..L.!This www.verypdf.combe run in DOS mode....$.........J...$...$...$.......$.|.*...$... ...$...%...$...7...$.......$.Rich..$.........PE..L......G.........................@...S...P.

File Icon

Icon Hash:00828e8e8686b000

General

Entrypoint:0x4053f0
Entrypoint Section:1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x47AD92EE [Sat Feb 9 11:47:58 2008 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:68fbbebb05615841b7832139f3545a57
Instruction
pushad
mov esi, 00405000h
lea edi, dword ptr [esi-00004000h]
push edi
or ebp, FFFFFFFFh
jmp 00007FF0B8A67892h
nop
nop
nop
nop
nop
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007FF0B8A67889h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007FF0B8A6786Fh
mov eax, 00000001h
add ebx, ebx
jne 00007FF0B8A67889h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007FF0B8A67871h
jne 00007FF0B8A6788Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007FF0B8A67866h
xor ecx, ecx
sub eax, 03h
jc 00007FF0B8A6788Fh
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007FF0B8A678F6h
mov ebp, eax
add ebx, ebx
jne 00007FF0B8A67889h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jne 00007FF0B8A67889h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jne 00007FF0B8A678A2h
inc ecx
add ebx, ebx
jne 00007FF0B8A67889h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007FF0B8A67871h
jne 00007FF0B8A6788Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007FF0B8A67866h
add ecx, 02h
cmp ebp, FFFFF300h
adc ecx, 01h
lea edx, dword ptr [edi+ebp]
cmp ebp, FFFFFFFCh
jbe 00007FF0B8A67891h
mov al, byte ptr [edx]
inc edx
mov byte ptr [edi], al
inc edi
dec ecx
jne 00007FF0B8A67879h
jmp 00007FF0B8A677E8h
nop
mov eax, dword ptr [edx]
add edx, 04h
mov dword ptr [edi], eax
add edi, 04h
sub ecx, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x60000xb4UPX2
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
00x10000x40000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
10x50000x10000x600False0.875data6.93983949341IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
UPX20x60000x10000x200False0.25data1.6070962666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, ExitProcess
MSVCRT.dll_iob

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

01020s020406080100

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:07:41:13
Start date:15/07/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6b2800000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:55%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:40.7%
Total number of Nodes:27
Total number of Limit Nodes:2

Graph

Show Legend
Hide Nodes/Edges
execution_graph 82 4053f0 83 405408 82->83 84 405502 LoadLibraryA 83->84 85 40553e VirtualProtect VirtualProtect 83->85 86 405519 84->86 87 405572 85->87 86->83 88 405520 GetProcAddress 86->88 87->87 88->86 89 405538 ExitProcess 88->89 112 401000 fwrite 113 401273 _exit 90 40116f __set_app_type __p__fmode __p__commode 91 4011dd 90->91 92 4011f2 91->92 93 4011e6 __setusermatherr 91->93 98 40128c _controlfp 92->98 93->92 95 4011f7 _initterm __getmainargs _initterm __p___initenv 99 401023 GetModuleFileNameA _splitpath _makepath LoadLibraryA 95->99 98->95 100 40114a 99->100 101 4010ab GetProcAddress 99->101 102 401156 fprintf 100->102 103 401120 101->103 104 4010bd 101->104 105 401168 exit _XcptFilter 102->105 103->102 106 4010e5 GetProcAddress 104->106 107 4010ca fprintf 104->107 106->103 108 4010f1 GetProcAddress 106->108 107->105 108->103 110 401108 FreeLibrary 108->110 110->105

Callgraph

Hide Legend
  • Executed
  • Not Executed
  • Opacity -> Relevance
  • Disassembly available
callgraph 0 Function_00401000 1 Function_004053F0 2 Function_004051B0 3 Function_004012A1 4 Function_00401023 5 Function_00401273 6 Function_00405027 7 Function_0040128C 8 Function_004050DD 9 Function_0040129E 10 Function_0040116F 10->3 10->4 10->7 11 Function_0040501F

Executed Functions

Control-flow Graph

APIs
  • GetModuleFileNameA.KERNELBASE(00000000,00000000,000007D0), ref: 00401043
  • _splitpath.MSVCRT ref: 00401069
  • _makepath.MSVCRT ref: 0040108B
  • LoadLibraryA.KERNELBASE(00000000), ref: 0040109B
  • GetProcAddress.KERNEL32(00000000,pstoedit_checkversion), ref: 004010B7
  • fprintf.MSVCRT ref: 004010D8
  • GetProcAddress.KERNEL32(00000000,setPstoeditOutputFunction), ref: 004010EB
  • GetProcAddress.KERNEL32(00000000,pstoedit_plainC), ref: 00401102
  • FreeLibrary.KERNEL32(00000000), ref: 00401116
  • fprintf.MSVCRT ref: 0040115F
Strings
  • pdf2vec, xrefs: 0040107A
  • .dll, xrefs: 0040106F
  • could not find pstoedit_checkversion in %s, xrefs: 00401143
  • setPstoeditOutputFunction, xrefs: 004010E5
  • could not find setPstoeditOutputFunction in %s, xrefs: 00401135
  • wrong version of pstoedit.dll found, xrefs: 004010CF
  • could not open %s, xrefs: 00401151
  • pstoedit_plainC, xrefs: 004010FC
  • could not find pstoedit_plainC in %s, xrefs: 00401127
  • pstoedit_checkversion, xrefs: 004010B1
Memory Dump Source
  • Source File: 00000000.00000002.203265298.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.203261753.0000000000400000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.203270567.0000000000404000.00000040.00020000.sdmp Download File
  • Associated: 00000000.00000002.203275067.0000000000405000.00000080.00020000.sdmp Download File
  • Associated: 00000000.00000002.203278886.0000000000406000.00000004.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_pdfmain.jbxd
Similarity
  • API ID: AddressProc$Libraryfprintf$FileFreeLoadModuleName_makepath_splitpath
  • String ID: .dll$could not find pstoedit_checkversion in %s$could not find pstoedit_plainC in %s$could not find setPstoeditOutputFunction in %s$could not open %s$pdf2vec$pstoedit_checkversion$pstoedit_plainC$setPstoeditOutputFunction$wrong version of pstoedit.dll found
  • API String ID: 4140879771-2740106493
  • Opcode ID: 3194b688d0f4392e987302e1e5734d7adb930b1f98998eacfc58471c0247877f
  • Instruction ID: 6b70c2735132db6c0811c1d1ed400c5f67a4c222332be345858f8f0c234fc4bf
  • Opcode Fuzzy Hash: 3194b688d0f4392e987302e1e5734d7adb930b1f98998eacfc58471c0247877f
  • Instruction Fuzzy Hash: BD319072940319ABEB109B90DF49F9A37BCAB08700F144173F705F51D0DAB8AA45DBAD
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

C-Code - Quality: 29%
			E0040116F(void* __ebx, void* __edi, void* __esi) {
				signed int _v8;
				intOrPtr* _v24;
				intOrPtr _v28;
				char _v32;
				char _v36;
				int _v40;
				char _v44;
				char _v48;
				intOrPtr _v52;
				intOrPtr* _t20;
				void* _t22;
				int _t31;
				intOrPtr* _t32;
				intOrPtr _t39;
				void* _t45;
				intOrPtr _t47;

				 *[fs:0x0] = _t47;
				_v28 = _t47 - 0x20;
				_v8 = _v8 & 0x00000000;
				 *0x402050(1, __edi, __esi, __ebx,  *[fs:0x0], 0x4012b0, 0x402178, 0xffffffff, _t45);
				 *0x403030 =  *0x403030 | 0xffffffff;
				 *0x403034 =  *0x403034 | 0xffffffff;
				 *((intOrPtr*)( *0x40204c())) =  *0x40302c;
				 *((intOrPtr*)( *0x402048())) =  *0x403028;
				_t20 =  *0x402044; // 0x75976be4
				 *0x403038 =  *_t20;
				_t22 = E004012A1( *_t20);
				if( *0x403010 == 0) {
					_t22 =  *0x402040(E0040129E);
				}
				E0040128C(_t22);
				L00401286();
				_v44 =  *0x403024;
				 *0x402038( &_v32,  &_v48,  &_v36,  *0x403020,  &_v44, 0x403008, 0x40300c);
				L00401286();
				 *((intOrPtr*)( *0x402034(0x403000, 0x403004))) = _v36;
				_push(_v36);
				_t31 = E00401023(_v32, _v48); // executed
				_v40 = _t31;
				exit(_t31); // executed
				_t32 = _v24;
				_t39 =  *((intOrPtr*)( *_t32));
				_v52 = _t39;
				_push(_t32);
				_push(_t39);
				L00401280();
				return _t32;
			}



















0x00401185
0x00401192
0x00401195
0x0040119b
0x004011a2
0x004011a9
0x004011bc
0x004011ca
0x004011cc
0x004011d3
0x004011d8
0x004011e4
0x004011eb
0x004011f1
0x004011f2
0x00401201
0x0040120b
0x00401224
0x00401234
0x00401242
0x00401244
0x0040124d
0x00401255
0x00401259
0x0040125f
0x00401264
0x00401266
0x00401269
0x0040126a
0x0040126b
0x00401272

APIs
Memory Dump Source
  • Source File: 00000000.00000002.203265298.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.203261753.0000000000400000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.203270567.0000000000404000.00000040.00020000.sdmp Download File
  • Associated: 00000000.00000002.203275067.0000000000405000.00000080.00020000.sdmp Download File
  • Associated: 00000000.00000002.203278886.0000000000406000.00000004.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_pdfmain.jbxd
Similarity
  • API ID: _initterm$FilterXcpt__getmainargs__p___initenv__p__commode__p__fmode__set_app_type__setusermatherrexit
  • String ID:
  • API String ID: 167530163-0
  • Opcode ID: e8652e79f381f3d0d47ef0d7842fc62d13816e44932fc3919f71db45f8461b47
  • Instruction ID: 73729b73f593aa2b9388828e54b0efc7aae5433e784185558f832ef32fea5106
  • Opcode Fuzzy Hash: e8652e79f381f3d0d47ef0d7842fc62d13816e44932fc3919f71db45f8461b47
  • Instruction Fuzzy Hash: EF310C75902304EFCB14DFA4DE49A9A7FB8FB09325F10426AF611B62F0DB785900CB68
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 26 4053f0-405400 27 405412-405417 26->27 28 405419 27->28 29 405408-40540d 28->29 30 40541b 28->30 31 40540e-405410 29->31 32 405420-405422 30->32 31->27 31->28 33 405424-405429 32->33 34 40542b-40542f 32->34 33->34 34->32 35 405431 34->35 36 405433-40543a 35->36 37 40543c-405441 35->37 36->32 36->37 38 405450-405452 37->38 39 405443-40544c 37->39 42 405454-405459 38->42 43 40545b-40545f 38->43 40 4054c2-4054c5 39->40 41 40544e 39->41 44 4054ca-4054cd 40->44 41->38 42->43 45 405461-405466 43->45 46 405468-40546a 43->46 47 4054cf-4054d1 44->47 45->46 48 40548c-40549b 46->48 49 40546c 46->49 47->44 50 4054d3-4054d6 47->50 52 4054ac-4054b9 48->52 53 40549d-4054a4 48->53 51 40546d-40546f 49->51 50->44 54 4054d8-4054f4 50->54 55 405471-405476 51->55 56 405478-40547c 51->56 52->52 58 4054bb-4054bd 52->58 53->53 57 4054a6 53->57 54->47 59 4054f6 54->59 55->56 56->51 60 40547e 56->60 57->31 58->31 61 4054fc-405500 59->61 62 405480-405487 60->62 63 405489 60->63 64 405502-405518 LoadLibraryA 61->64 65 40553e-40556e VirtualProtect * 2 61->65 62->51 62->63 63->48 66 405519-40551e 64->66 67 405572-405576 65->67 66->61 68 405520-40552f GetProcAddress 66->68 67->67 69 405578 67->69 70 405531-405536 68->70 71 405538 ExitProcess 68->71 70->66
C-Code - Quality: 30%
			_entry_(intOrPtr __eflags, intOrPtr _a92, signed int _a112) {
				intOrPtr* _v24;
				char _v32;
				char _v36;
				int _v40;
				char _v44;
				char _v48;
				intOrPtr _v52;
				char _v132;
				intOrPtr _t34;
				intOrPtr _t37;
				intOrPtr _t38;
				signed int _t40;
				struct HINSTANCE__* _t41;
				unsigned int _t42;
				char _t52;
				signed char* _t54;
				long _t55;
				char* _t58;
				intOrPtr* _t63;
				void* _t65;
				int _t74;
				intOrPtr* _t75;
				signed char _t80;
				intOrPtr _t83;
				intOrPtr _t84;
				intOrPtr _t85;
				intOrPtr _t86;
				char* _t91;
				signed char _t92;
				void* _t93;
				intOrPtr _t100;
				intOrPtr* _t105;
				signed char _t106;
				unsigned int* _t107;
				CHAR* _t109;
				void* _t110;
				char* _t111;
				intOrPtr* _t112;
				unsigned int* _t113;
				signed int _t114;
				struct HINSTANCE__* _t115;
				unsigned int _t116;
				DWORD* _t118;
				intOrPtr _t119;
				intOrPtr _t122;
				intOrPtr _t124;
				intOrPtr _t129;
				intOrPtr _t132;

				_t122 = __eflags;
				asm("pushad");
				_t112 = 0x405000;
				_t1 = _t112 - 0x4000; // 0x401000
				_t106 = _t1;
				_push(_t106);
				_t115 = _t114 | 0xffffffff;
				while(1) {
					_t83 =  *_t112;
					_push(ds);
					_t112 = _t112 - 0xfffffffc;
					asm("adc ebx, ebx");
					do {
						if(_t122 < 0) {
							_t34 =  *_t112;
							_t112 = _t112 + 1;
							 *_t106 = _t34;
							_t106 = _t106 + 1;
							__eflags = _t106;
							goto L5;
						}
						goto L10;
						do {
							do {
								L10:
								_t84 = _t83 + _t83;
								if(_t84 == 0) {
									_t84 =  *_t112;
									_t112 = _t112 - 0xfffffffc;
									asm("adc ebx, ebx");
								}
								asm("adc eax, eax");
								_t83 = _t84 + _t84;
								_t124 = _t83;
							} while (_t124 >= 0);
							if(_t124 != 0) {
								break;
							}
							_t83 =  *_t112;
							_t112 = _t112 - 0xfffffffc;
							asm("adc ebx, ebx");
						} while (_t112 >= 0);
						_t92 = 0;
						if(0xfffffffffffffffe < 0) {
							L18:
							_t85 = _t83 + _t83;
							if(_t85 == 0) {
								_t85 =  *_t112;
								_t112 = _t112 - 0xfffffffc;
								asm("adc ebx, ebx");
							}
							asm("adc ecx, ecx");
							_t83 = _t85 + _t85;
							_t129 = _t83;
							if(_t129 == 0) {
								_t83 =  *_t112;
								_t112 = _t112 - 0xfffffffc;
								asm("adc ebx, ebx");
							}
							asm("adc ecx, ecx");
							if(_t129 != 0) {
								L30:
								asm("adc ecx, 0x1");
								_t105 = _t115 + _t106;
								if(_t115 <= 0xfffffffc) {
									do {
										_t37 =  *_t105;
										_t105 = _t105 + 4;
										 *_t106 = _t37;
										_t106 = _t106 + 4;
										_t92 = _t92 - 4;
										__eflags = _t92;
									} while (_t92 > 0);
									_t106 = _t106 + _t92;
									goto L5;
								} else {
									goto L31;
								}
								do {
									L31:
									_t38 =  *_t105;
									_t105 = _t105 + 1;
									 *_t106 = _t38;
									_t106 = _t106 + 1;
									_t92 = _t92 - 1;
								} while (_t92 != 0);
								goto L5;
							}
							_t93 = _t92 + 1;
							goto L24;
							do {
								do {
									L24:
									_t86 = _t83 + _t83;
									if(_t86 == 0) {
										_t86 =  *_t112;
										_t112 = _t112 - 0xfffffffc;
										asm("adc ebx, ebx");
									}
									asm("adc ecx, ecx");
									_t83 = _t86 + _t86;
									_t132 = _t83;
								} while (_t132 >= 0);
								if(_t132 != 0) {
									break;
								}
								_t83 =  *_t112;
								_t112 = _t112 - 0xfffffffc;
								asm("adc ebx, ebx");
							} while (_t112 >= 0);
							_t92 = _t93 + 2;
							goto L30;
						}
						_t40 =  *_t112;
						_t112 = _t112 + 1;
						_t41 = _t40 ^ 0xffffffff;
						if(_t41 == 0) {
							_pop(_t113);
							_t107 = _t113;
							goto L36;
							do {
								do {
									L36:
									_t42 =  *_t107;
									_t107 =  &(_t107[0]);
									__eflags = _t42 - 0xe8 - 1;
								} while (_t42 - 0xe8 > 1);
								__eflags =  *_t107;
							} while ( *_t107 != 0);
							asm("rol eax, 0x10");
							 *_t107 = ( *_t107 >> 8) - _t107 + _t113;
							__eflags =  &(_t107[1]);
							asm("loop 0xffffffdb");
							_t20 =  &(_t113[0xc00]); // 0x404000
							_t109 = _t20;
							while(1) {
								L39:
								_t52 =  *_t109;
								__eflags = _t52;
								if(_t52 == 0) {
									break;
								}
								_t21 =  &(_t109[4]); // 0x1000
								_t91 = _t113 +  *_t21;
								_t111 =  &(_t109[8]);
								__eflags = _t111;
								_t115 = LoadLibraryA( &(_t113[0x1400]) + _t52);
								while(1) {
									_t109 =  &(_t111[1]);
									_t80 =  *_t111;
									__eflags = _t80;
									if(_t80 == 0) {
										goto L39;
									}
									asm("repne scasb");
									_t52 = GetProcAddress(_t115, _t109);
									__eflags = _t52;
									if(_t52 == 0) {
										ExitProcess();
									}
									 *_t91 = _t52;
									_t91 =  &(_t91[4]);
								}
							}
							_t116 = _t113[0x1411];
							_t29 = _t113 - 0x1000; // 0x400000
							_t110 = _t29;
							VirtualProtect(_t110, 0x1000, 4, _t118);
							_t30 = _t110 + 0x1ef; // 0x4001ef
							_t54 = _t30;
							 *_t54 =  *_t54 & 0x0000007f;
							_t31 =  &(_t54[0x28]);
							 *_t31 = _t54[0x28] & 0x0000007f;
							__eflags =  *_t31;
							_t55 = _t52;
							_push(_t55);
							VirtualProtect(_t110, 0x1000, _t55, _t118); // executed
							asm("popad");
							_t58 =  &_v132;
							do {
								_push(0);
								__eflags = _t118 - _t58;
							} while (_t118 != _t58);
							_t119 = _t118 - 0xffffff80;
							 *[fs:0x0] = _t119;
							_a92 = _t119 - 0x20;
							_a112 = _a112 & 0x00000000;
							 *0x402050(1, _t110, _t113, 0x1000,  *[fs:0x0], 0x4012b0, 0x402178, 0xffffffff, _t116);
							 *0x403030 =  *0x403030 | 0xffffffff;
							 *0x403034 =  *0x403034 | 0xffffffff;
							 *((intOrPtr*)( *0x40204c())) =  *0x40302c;
							 *((intOrPtr*)( *0x402048())) =  *0x403028;
							_t63 =  *0x402044; // 0x75976be4
							 *0x403038 =  *_t63;
							_t65 = E004012A1( *_t63);
							__eflags =  *0x403010;
							if( *0x403010 == 0) {
								_t65 =  *0x402040(E0040129E);
							}
							E0040128C(_t65);
							L00401286();
							_v44 =  *0x403024;
							 *0x402038( &_v32,  &_v48,  &_v36,  *0x403020,  &_v44, 0x403008, 0x40300c);
							L00401286();
							 *((intOrPtr*)( *0x402034(0x403000, 0x403004))) = _v36;
							_push(_v36);
							_t74 = E00401023(_v32, _v48); // executed
							_v40 = _t74;
							exit(_t74); // executed
							_t75 = _v24;
							_t100 =  *((intOrPtr*)( *_t75));
							_v52 = _t100;
							_push(_t75);
							_push(_t100);
							L00401280();
							return _t75;
						}
						_t115 = _t41;
						goto L18;
						L5:
						_t83 = _t83 + _t83;
						_t122 = _t83;
					} while (_t122 != 0);
				}
			}



















































0x004053f0
0x004053f0
0x004053f1
0x004053f6
0x004053f6
0x004053fc
0x004053fd
0x00405412
0x00405412
0x00405413
0x00405414
0x00405417
0x00405419
0x00405419
0x00405408
0x0040540a
0x0040540b
0x0040540d
0x0040540d
0x00000000
0x0040540d
0x0040541b
0x00405420
0x00405420
0x00405420
0x00405420
0x00405422
0x00405424
0x00405426
0x00405429
0x00405429
0x0040542b
0x0040542d
0x0040542d
0x0040542d
0x00405431
0x00000000
0x00000000
0x00405433
0x00405435
0x00405438
0x00405438
0x0040543c
0x00405441
0x00405450
0x00405450
0x00405452
0x00405454
0x00405456
0x00405459
0x00405459
0x0040545b
0x0040545d
0x0040545d
0x0040545f
0x00405461
0x00405463
0x00405466
0x00405466
0x00405468
0x0040546a
0x0040548c
0x00405492
0x00405495
0x0040549b
0x004054ac
0x004054ac
0x004054ae
0x004054b1
0x004054b3
0x004054b6
0x004054b6
0x004054b6
0x004054bb
0x00000000
0x00000000
0x00000000
0x00000000
0x0040549d
0x0040549d
0x0040549d
0x0040549f
0x004054a0
0x004054a2
0x004054a3
0x004054a3
0x00000000
0x004054a6
0x0040546c
0x0040546c
0x0040546d
0x0040546d
0x0040546d
0x0040546d
0x0040546f
0x00405471
0x00405473
0x00405476
0x00405476
0x00405478
0x0040547a
0x0040547a
0x0040547a
0x0040547e
0x00000000
0x00000000
0x00405480
0x00405482
0x00405485
0x00405485
0x00405489
0x00000000
0x00405489
0x00405446
0x00405448
0x00405449
0x0040544c
0x004054c2
0x004054c3
0x004054c5
0x004054ca
0x004054ca
0x004054ca
0x004054ca
0x004054cc
0x004054cf
0x004054cf
0x004054d3
0x004054d3
0x004054e1
0x004054ed
0x004054ef
0x004054f4
0x004054f6
0x004054f6
0x004054fc
0x004054fc
0x004054fe
0x004054fe
0x00405500
0x00000000
0x00000000
0x00405502
0x0040550c
0x0040550f
0x0040550f
0x00405518
0x00405519
0x0040551b
0x0040551c
0x0040551c
0x0040551e
0x00000000
0x00000000
0x00405524
0x0040552d
0x0040552d
0x0040552f
0x00405538
0x00405538
0x00405531
0x00405533
0x00405533
0x00405519
0x0040553e
0x00405544
0x00405544
0x00405555
0x00405557
0x00405557
0x0040555d
0x00405560
0x00405560
0x00405560
0x00405564
0x00405565
0x0040556a
0x0040556d
0x0040556e
0x00405572
0x00405572
0x00405574
0x00405574
0x00405578
0x00401185
0x00401192
0x00401195
0x0040119b
0x004011a2
0x004011a9
0x004011bc
0x004011ca
0x004011cc
0x004011d3
0x004011d8
0x004011dd
0x004011e4
0x004011eb
0x004011f1
0x004011f2
0x00401201
0x0040120b
0x00401224
0x00401234
0x00401242
0x00401244
0x0040124d
0x00401255
0x00401259
0x0040125f
0x00401264
0x00401266
0x00401269
0x0040126a
0x0040126b
0x00401272
0x00401272
0x0040544e
0x00000000
0x0040540e
0x0040540e
0x0040540e
0x0040540e
0x00405419

Memory Dump Source
  • Source File: 00000000.00000002.203275067.0000000000405000.00000080.00020000.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.203261753.0000000000400000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.203265298.0000000000401000.00000040.00020000.sdmp Download File
  • Associated: 00000000.00000002.203270567.0000000000404000.00000040.00020000.sdmp Download File
  • Associated: 00000000.00000002.203278886.0000000000406000.00000004.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_pdfmain.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: e383cdebf30ecb6652499756ccfd89d113cdc206a92ca57ba1706d5f2863a446
  • Instruction ID: 06a05164c097536a8539a29ee581f8ff35965b20446a8b76aab67a3fd0ff822c
  • Opcode Fuzzy Hash: e383cdebf30ecb6652499756ccfd89d113cdc206a92ca57ba1706d5f2863a446
  • Instruction Fuzzy Hash: B2513671610A124BD72059789C807E77B94EB42336B58073AC5E5E73C6E7BC58468F68
Uniqueness

Uniqueness Score: -1.00%

Non-executed Functions