Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe
Analysis ID:472792
MD5:af935ea48e33924f8d68a22a96ac811c
SHA1:c0bf9094820c3fa33529ce90933018361c11aa37
SHA256:f4914c162f5064fcfe9012ffa8a93972a1cd268bcaee0a7d2346b8757f553d2a
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Uses 32bit PE files
PE file does not import any functions
One or more processes crash
PE file contains an invalid checksum
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to query CPU information (cpuid)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeVirustotal: Detection: 8%Perma Link
Machine Learning detection for sample
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeString found in binary or memory: http://www.clamav.net
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: No import functions for PE file found
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 212
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0040A0C01_2_0040A0C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_004201831_2_00420183
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0043599F1_2_0043599F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0042DA741_2_0042DA74
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0044220C1_2_0044220C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_00412B401_2_00412B40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0040DCD01_2_0040DCD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0042AC831_2_0042AC83
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0041AD651_2_0041AD65
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_0042BDF61_2_0042BDF6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_004136801_2_00413680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_004387791_2_00438779
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_00437FFD1_2_00437FFD
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeVirustotal: Detection: 8%
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERF798.tmpJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal52.winEXE@2/4@0/0
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe'
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 212
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4728
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000006.00000003.658112200.0000000005301000.00000004.00000001.sdmp
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeStatic PE information: real checksum: 0xd7da6 should be: 0xd8a39
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeProcess queried: DebugPortJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exeCode function: 1_2_00427254 cpuid 1_2_00427254

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection2Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 472792 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 27/08/2021 Architecture: WINDOWS Score: 52 10 Multi AV Scanner detection for submitted file 2->10 12 Machine Learning detection for sample 2->12 6 SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe 2->6         started        process3 process4 8 WerFault.exe 23 9 6->8         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe9%VirustotalBrowse
SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
1.2.SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.1.SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.clamav.netSecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exefalse
    high
    No contacted IP infos

    General Information

    Joe Sandbox Version:33.0.0 White Diamond
    Analysis ID:472792
    Start date:27.08.2021
    Start time:13:10:15
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 15s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:21
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal52.winEXE@2/4@0/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    Warnings:
    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 23.54.113.53, 52.182.143.212, 20.50.102.62, 20.54.7.98, 20.54.104.15, 40.112.88.60, 23.0.174.200, 23.0.174.185, 20.82.209.183, 23.10.249.26, 23.10.249.43
    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, onedsblobprdcus15.centralus.cloudapp.azure.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
    No simulations
    No context
    No context
    No context
    No context
    No context
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_SecuriteInfo.com_168bd1e83f1cee92ce9f93e589bb9d763a0bc6a_fc729859_1b2a0a26\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8404
    Entropy (8bit):3.763144392956556
    Encrypted:false
    SSDEEP:96:jYj8g+9llKhMyoI7Jf0pXIQcQvc6QcEDMcw3DL+HbHg0c/NZAXGng5FMTPSkvPkb:EfM/HBUZMXojh/u7seS274ItUL
    MD5:21D1B72BC227A436759C3FDAD65C30A2
    SHA1:36A715DDCD14B38F2130FB60F83199E3E4D24323
    SHA-256:B4695E037228AC8714AC1DC743F45E77D7B138C35CCC8A78EFA2C3AC1F93B8B7
    SHA-512:62BAF73B04D24208F250518959ED7E09D9E69CBC1884FAAC6E838C510835599E5744F67EEE492F2C47550A9A03E726D2ECF594BF22D6E81E323E64886EAC3E3B
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.4.5.3.6.2.6.9.2.1.2.3.7.6.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.4.5.3.6.2.7.2.3.6.8.6.2.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.b.b.7.5.f.e.-.3.6.c.6.-.4.1.2.b.-.8.7.6.2.-.d.d.a.e.c.f.f.2.3.d.7.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.0.b.b.4.0.5.-.4.c.4.f.-.4.e.0.5.-.a.2.2.f.-.1.4.8.3.7.8.4.3.9.d.9.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...W.i.n.3.2...S.a.b.s.i.k...F.L...B.m.l...1.5.6.0.3...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.7.8.-.0.0.0.1.-.0.0.1.b.-.f.9.8.f.-.6.e.3.a.3.4.9.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.e.d.b.c.2.d.0.6.0.2.2.6.6.c.8.e.5.2.5.5.b.6.0.0.f.d.a.6.1.e.5.0.0.0.0.f.f.f.f.!.0.0.0.0.c.0.b.f.9.0.9.4.8.2.0.c.3.f.a.3.3.5.2.9.c.e.9.0.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERF798.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Aug 27 11:11:09 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):18062
    Entropy (8bit):2.216233575143679
    Encrypted:false
    SSDEEP:192:l8uQKexQMLv62ojuMrg3tFOO0iqNRmh6rut4EAI:WuQ1yMLStjuP9FV0lrruZl
    MD5:D8C497D156E7E80B77E779D0A90D367C
    SHA1:EE638B11CCD228AB587A02F3CB836630D3596073
    SHA-256:B9C15B0B3565E4DCBA40600300F09A3EF9DE739B3050DD9B793006DC96421B3B
    SHA-512:D08659D60560DBBA0433CB5215151B3A024DA200AF9AC801B933AB2DF91503FD0D32CA6E7B0FED2FA355C9F3C0E8B50D58233A3D9862DF4AF1575786F3D613C8
    Malicious:false
    Reputation:low
    Preview: MDMP....... .......M.(a...................U...........B..............GenuineIntelW...........T.......x...I.(a.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERF92F.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8476
    Entropy (8bit):3.710582107876963
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiv+6YC6YrrSUD3Lgmf11ST+prj89bvnsfvFm:RrlsNiG6YC6YXSUD3LgmfnSTvsfA
    MD5:617EFBB19D63CA339B4C2CC6733365C2
    SHA1:02C5650018A35ED42C848BDB9417F8093C60E1FC
    SHA-256:95D9259D1BBCE9AE1D8CA591011AFA7BA85F23A1C79E4554CAD0808632801363
    SHA-512:DA057F5FE5C3AAFEAD38939F3566D2785142AA4937DA4B64A579AE247ED46CE4A11830E11E632C9A4F27A60BEC035AB04F1EC952264E66A030FCCC8CDA54FF4A
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.2.8.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC1E.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4802
    Entropy (8bit):4.5885317853324175
    Encrypted:false
    SSDEEP:48:cvIwSD8zsfJgtWI9aUWSC8Bx8fm8M4JkjZFQ+q8+zAknbtw3+aad:uITfBdNSN4JKcFAknby3+aad
    MD5:15A03407014BA1DB2557AE6BDA08D838
    SHA1:8BFCAD77EC44FE1C4DC48F6732A67D77F2D42D83
    SHA-256:28B4ED6C6F6DC3462E71034651E0A06704EF951FE8ECCEF08E6B8AA84B713F5D
    SHA-512:8AF25B854718F74C6CDD8601B7789DDD6C8D97291056AA3BB2E086E2AFB2646AEAA2BDD0A3C4496BCF823887DE8B40768FF72A9F96B7444BAFB4C2435BBA0769
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1140261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.043034552951079
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe
    File size:880640
    MD5:af935ea48e33924f8d68a22a96ac811c
    SHA1:c0bf9094820c3fa33529ce90933018361c11aa37
    SHA256:f4914c162f5064fcfe9012ffa8a93972a1cd268bcaee0a7d2346b8757f553d2a
    SHA512:4e6c91d344b7acaa72dafc235acecec4ce94955c1485f55b90cb153e0986332238175aa2a970364296f0ab2cdd807b40460ab7c7967fffc2b5b46e77bdbd4d22
    SSDEEP:12288:P1auaKKCWWWqG/iOG/IukoySsOkCZYYHSO69ciGIt7fWd:P1auaKT/eZSTYzzKipc
    File Content Preview:MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM.........."..........N.......k.....

    File Icon

    Icon Hash:00828e8e8686b000

    General

    Entrypoint:0x426bf7
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
    Time Stamp:0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:
    Instruction
    call 00007EFE4437A7A6h
    jmp 00007EFF3166A6A6h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    push edi
    push esi
    mov esi, dword ptr [esp+10h]
    mov ecx, dword ptr [esp+14h]
    mov edi, dword ptr [esp+0Ch]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007EFEB50CA49Ah
    cmp edi, eax
    jc 00007EFEB50CA7FEh
    bt dword ptr [58F10B00h], 01h
    jnc 00007EFEB50CA499h
    rep movsb
    jmp 00007EFF096BA6A6h
    cmp ecx, 00000080h
    jc 00007EFEB50CA664h
    mov eax, edi
    xor eax, esi
    test eax, 0000000Fh
    jne 00007EFEB50CA4A0h
    bt dword ptr [70930B00h], 01h
    jc 00007EFEB50CA970h
    bt dword ptr [58F10B00h], 00000000h
    jnc 00007EFEB50CA63Dh
    test edi, 00000003h
    jne 00007EFEB50CA64Eh
    test esi, 00000003h
    jne 00007EFEB50CA62Dh
    bt edi, 02h
    jnc 00007EFEB50CA49Fh
    mov eax, dword ptr [esi]
    sub ecx, 04h
    lea esi, dword ptr [esi+04h]
    mov dword ptr [edi], eax
    lea edi, dword ptr [edi+04h]
    bt edi, 03h
    jnc 00007EFEB50CA4A3h
    movq xmm1, qword ptr [esi]
    sub ecx, 08h
    lea esi, dword ptr [esi+08h]
    movq qword ptr [edi], xmm1
    lea edi, dword ptr [edi+08h]
    test esi, 00000007h
    je 00007EFEB50CA4F5h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xb6b6c0x17c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x7ccc.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xcc0000x6c20.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27700x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x858.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x8c0000x8c000False0.522706821987data6.69461529259IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x8d0000x2d0000x2d000False0.289930555556data5.35000817466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xba0000xa0000xa000False0.105078125data1.30461627365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0xc40000x80000x8000False0.0670471191406data1.20884935027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xcc0000xb0000xb000False0.00148703835227data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

    Network Behavior

    Download Network PCAP: filteredfull

    TimestampSource PortDest PortSource IPDest IP
    Aug 27, 2021 13:11:01.262397051 CEST6529853192.168.2.48.8.8.8
    Aug 27, 2021 13:11:01.295847893 CEST53652988.8.8.8192.168.2.4
    Aug 27, 2021 13:11:13.803761959 CEST5912353192.168.2.48.8.8.8
    Aug 27, 2021 13:11:13.825015068 CEST53591238.8.8.8192.168.2.4
    Aug 27, 2021 13:11:32.095745087 CEST5453153192.168.2.48.8.8.8
    Aug 27, 2021 13:11:32.138418913 CEST53545318.8.8.8192.168.2.4
    Aug 27, 2021 13:11:47.963325024 CEST4971453192.168.2.48.8.8.8
    Aug 27, 2021 13:11:48.170144081 CEST53497148.8.8.8192.168.2.4
    Aug 27, 2021 13:11:48.631480932 CEST5802853192.168.2.48.8.8.8
    Aug 27, 2021 13:11:48.734786034 CEST53580288.8.8.8192.168.2.4
    Aug 27, 2021 13:11:48.893383026 CEST5309753192.168.2.48.8.8.8
    Aug 27, 2021 13:11:48.934973955 CEST53530978.8.8.8192.168.2.4
    Aug 27, 2021 13:11:49.180206060 CEST4925753192.168.2.48.8.8.8
    Aug 27, 2021 13:11:49.335315943 CEST53492578.8.8.8192.168.2.4
    Aug 27, 2021 13:11:49.693980932 CEST6238953192.168.2.48.8.8.8
    Aug 27, 2021 13:11:49.715853930 CEST53623898.8.8.8192.168.2.4
    Aug 27, 2021 13:11:50.166816950 CEST4991053192.168.2.48.8.8.8
    Aug 27, 2021 13:11:50.187283993 CEST53499108.8.8.8192.168.2.4
    Aug 27, 2021 13:11:50.567831993 CEST5585453192.168.2.48.8.8.8
    Aug 27, 2021 13:11:50.588860989 CEST53558548.8.8.8192.168.2.4
    Aug 27, 2021 13:11:51.346745968 CEST6454953192.168.2.48.8.8.8
    Aug 27, 2021 13:11:51.368148088 CEST53645498.8.8.8192.168.2.4
    Aug 27, 2021 13:11:52.418809891 CEST6315353192.168.2.48.8.8.8
    Aug 27, 2021 13:11:52.440622091 CEST53631538.8.8.8192.168.2.4
    Aug 27, 2021 13:11:53.058739901 CEST5299153192.168.2.48.8.8.8
    Aug 27, 2021 13:11:53.199769020 CEST53529918.8.8.8192.168.2.4
    Aug 27, 2021 13:11:53.566437960 CEST5370053192.168.2.48.8.8.8
    Aug 27, 2021 13:11:53.587783098 CEST53537008.8.8.8192.168.2.4
    Aug 27, 2021 13:11:54.325922012 CEST5172653192.168.2.48.8.8.8
    Aug 27, 2021 13:11:54.347434044 CEST53517268.8.8.8192.168.2.4
    Aug 27, 2021 13:12:06.759242058 CEST5679453192.168.2.48.8.8.8
    Aug 27, 2021 13:12:06.781745911 CEST5653453192.168.2.48.8.8.8
    Aug 27, 2021 13:12:06.794132948 CEST53567948.8.8.8192.168.2.4
    Aug 27, 2021 13:12:06.816361904 CEST53565348.8.8.8192.168.2.4
    Aug 27, 2021 13:12:10.175153971 CEST5662753192.168.2.48.8.8.8
    Aug 27, 2021 13:12:10.209116936 CEST53566278.8.8.8192.168.2.4
    Aug 27, 2021 13:12:40.543097019 CEST5662153192.168.2.48.8.8.8
    Aug 27, 2021 13:12:40.565319061 CEST53566218.8.8.8192.168.2.4
    Aug 27, 2021 13:12:42.203593016 CEST6311653192.168.2.48.8.8.8
    Aug 27, 2021 13:12:42.237476110 CEST53631168.8.8.8192.168.2.4

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    • File
    • Registry

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    Start time:13:11:05
    Start date:27/08/2021
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe'
    Imagebase:0x400000
    File size:880640 bytes
    MD5 hash:AF935EA48E33924F8D68A22A96AC811C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Start time:13:11:07
    Start date:27/08/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 212
    Imagebase:0xf0000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Executed Functions

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d277f464281483cb34b4ca5155393bfeb7278802e87baf027fcc9bdb688a7fad
    • Instruction ID: 5a57cba05b51c654d38b10b9c50a0994952362a8cf3038f4ebe5b00ac5fe2424
    • Opcode Fuzzy Hash: d277f464281483cb34b4ca5155393bfeb7278802e87baf027fcc9bdb688a7fad
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID: Genu$ineI$ntel
    • API String ID: 0-3389352399
    • Opcode ID: 8b53f3ef479ff40b7b4f2de41b4721dd80f41eabb592085be757621365dd36b3
    • Instruction ID: 6e06580a42f9c61f8ffff3ee3ae3fb547687a6c1693221fad2876be589472da8
    • Opcode Fuzzy Hash: 8b53f3ef479ff40b7b4f2de41b4721dd80f41eabb592085be757621365dd36b3
    • Instruction Fuzzy Hash: 89317AB2A18326CBDB24CF5AE45125AFBB0FB44314F50C63EE858E3654C379A820DF48
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID: ($|
    • API String ID: 0-1631851259
    • Opcode ID: 4bf1ab81a49301019918a04f7ce4daa4e0bbf267643994d10e1304974756a141
    • Instruction ID: 35f67614353ef814a40309a3c6e2d5e11c363a627b62562fd79a9c07c2a6212b
    • Opcode Fuzzy Hash: 4bf1ab81a49301019918a04f7ce4daa4e0bbf267643994d10e1304974756a141
    • Instruction Fuzzy Hash: 58323575A007059FD728CF29C580A6AB7F0FF48320B55C5AEE49ADB3A1E7B4E941CB44
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID: @
    • API String ID: 0-2766056989
    • Opcode ID: 9756dd079527505533afce0362e29bfe9ccbd536ebe8ceae1d77e8bae9c0e146
    • Instruction ID: 6e671c56d7224ad93da321adc3f0cc5bcadd544dd6d77b62c16a50cf4260f2f6
    • Opcode Fuzzy Hash: 9756dd079527505533afce0362e29bfe9ccbd536ebe8ceae1d77e8bae9c0e146
    • Instruction Fuzzy Hash: 80B29F75A04205DFDB24CF58C884AEEB7B1FF49320F14825AD825AB391DB39ED81CB95
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8790d7110e1a3ca3a892b07454d744b36da319baeea9b017842545e63e1fc36d
    • Instruction ID: 41091c0b8e495a78269d9830abc9b54fdb158c0a82ef0004f96afc25e30c8714
    • Opcode Fuzzy Hash: 8790d7110e1a3ca3a892b07454d744b36da319baeea9b017842545e63e1fc36d
    • Instruction Fuzzy Hash: C9926970608341DFD724CF18C484BAAB7E1BF88314F148A5EE9A98B3A1D775EC85CB56
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 973b3fdc1b6fb956cd429cf9be4bc2e26f8a3d2347323843cd55b615bdbb16a1
    • Instruction ID: 28d542494d47263338b34d5b9cfedcc1c97ff99c766d060f35081ec26cd65350
    • Opcode Fuzzy Hash: 973b3fdc1b6fb956cd429cf9be4bc2e26f8a3d2347323843cd55b615bdbb16a1
    • Instruction Fuzzy Hash: CD326D75B022288FCB248F18DC806EEB7B5FB46314F4442DAE41AE7A94D7349E80CF56
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 57bb342014c5512763d0c0d3c1e5279cdf7ece8741caf631e78873689890cef6
    • Instruction ID: 362957ba5406fe573b2f49074b3cce6cbd6b4f4db4c568829c95ff206fac6002
    • Opcode Fuzzy Hash: 57bb342014c5512763d0c0d3c1e5279cdf7ece8741caf631e78873689890cef6
    • Instruction Fuzzy Hash: ED12B170A00205DBDF04CF68D980AAEB7B5EF44320F14C6AAE819EB3D4EB35DA55CB55
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: db18bbadcbc0492c9a3a2b7f7b21180bc7ee229f8996a10ad538ce4cf2a79d87
    • Instruction ID: 555d6dde24e68b07c45513668ec08d1bedb3f5cb844672512a5a73b1d5f7b7ff
    • Opcode Fuzzy Hash: db18bbadcbc0492c9a3a2b7f7b21180bc7ee229f8996a10ad538ce4cf2a79d87
    • Instruction Fuzzy Hash: 6712C271D00206CFDB24DF58C880AAEB7B0FF54320F14867AD869AB3D1D779A985CB95
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 56ea40880c0f9c17cceddb6b6684c124a674fa7e019aecc788fd601a00965200
    • Instruction ID: 7458eb67da910476ebc2fef48e6823a975276efe0093d8c0544853125a47a48d
    • Opcode Fuzzy Hash: 56ea40880c0f9c17cceddb6b6684c124a674fa7e019aecc788fd601a00965200
    • Instruction Fuzzy Hash: 1EF15A75E003598BCB14CFA9C8802EEF7B1BF58310F24522EE855AB394EB399D45CB58
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 23d19c31f79fc53239547975c71d474b9faa9f01d83b4b7fce97bec842927c86
    • Instruction ID: 05e3efc8eb0fe88d8c96ee721b252eec3540a36ba285d7cc2eb0dfeb72dbf746
    • Opcode Fuzzy Hash: 23d19c31f79fc53239547975c71d474b9faa9f01d83b4b7fce97bec842927c86
    • Instruction Fuzzy Hash: A0A14470115205BADB289F2D4C88DFF3A6DEB42374F11872BF425D62D0DA2D8D9282B6
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.668618090.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.668608845.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668702653.000000000048D000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668742508.00000000004AE000.00000002.00020000.sdmp Download File
    • Associated: 00000001.00000002.668753037.00000000004BA000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668758455.00000000004BF000.00000008.00020000.sdmp Download File
    • Associated: 00000001.00000002.668764206.00000000004C8000.00000002.00020000.sdmp Download File
    Similarity
    • API ID:
    • String ID: $($)$,$0$9$=$A$Z$]$_$a$z
    • API String ID: 0-3065214604
    • Opcode ID: cf552dd578b10f6663e8d9e9e2c5d02421c8ee6964577bee63547cb60e2fc686
    • Instruction ID: edb4139f387efbcba155587e1d961a8e878c9de590c2382777b4154fe9bd2220
    • Opcode Fuzzy Hash: cf552dd578b10f6663e8d9e9e2c5d02421c8ee6964577bee63547cb60e2fc686
    • Instruction Fuzzy Hash: 68A11574B002069BDB15DF65D9806AEB7B1FF44320F50476AE926D72E0EB34A8B0C746
    Uniqueness

    Uniqueness Score: -1.00%