Windows Analysis Report SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link |
Machine Learning detection for sample |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process created: |
Source: | Code function: | 1_2_0040A0C0 | |
Source: | Code function: | 1_2_00420183 | |
Source: | Code function: | 1_2_0043599F | |
Source: | Code function: | 1_2_0042DA74 | |
Source: | Code function: | 1_2_0044220C | |
Source: | Code function: | 1_2_00412B40 | |
Source: | Code function: | 1_2_0040DCD0 | |
Source: | Code function: | 1_2_0042AC83 | |
Source: | Code function: | 1_2_0041AD65 | |
Source: | Code function: | 1_2_0042BDF6 | |
Source: | Code function: | 1_2_00413680 | |
Source: | Code function: | 1_2_00438779 | |
Source: | Code function: | 1_2_00437FFD |
Source: | Virustotal: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 1_2_00427254 |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection2 | Virtualization/Sandbox Evasion1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection2 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Information Discovery11 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
9% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 472792 |
Start date: | 27.08.2021 |
Start time: | 13:10:15 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.winEXE@2/4@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8404 |
Entropy (8bit): | 3.763144392956556 |
Encrypted: | false |
SSDEEP: | 96:jYj8g+9llKhMyoI7Jf0pXIQcQvc6QcEDMcw3DL+HbHg0c/NZAXGng5FMTPSkvPkb:EfM/HBUZMXojh/u7seS274ItUL |
MD5: | 21D1B72BC227A436759C3FDAD65C30A2 |
SHA1: | 36A715DDCD14B38F2130FB60F83199E3E4D24323 |
SHA-256: | B4695E037228AC8714AC1DC743F45E77D7B138C35CCC8A78EFA2C3AC1F93B8B7 |
SHA-512: | 62BAF73B04D24208F250518959ED7E09D9E69CBC1884FAAC6E838C510835599E5744F67EEE492F2C47550A9A03E726D2ECF594BF22D6E81E323E64886EAC3E3B |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18062 |
Entropy (8bit): | 2.216233575143679 |
Encrypted: | false |
SSDEEP: | 192:l8uQKexQMLv62ojuMrg3tFOO0iqNRmh6rut4EAI:WuQ1yMLStjuP9FV0lrruZl |
MD5: | D8C497D156E7E80B77E779D0A90D367C |
SHA1: | EE638B11CCD228AB587A02F3CB836630D3596073 |
SHA-256: | B9C15B0B3565E4DCBA40600300F09A3EF9DE739B3050DD9B793006DC96421B3B |
SHA-512: | D08659D60560DBBA0433CB5215151B3A024DA200AF9AC801B933AB2DF91503FD0D32CA6E7B0FED2FA355C9F3C0E8B50D58233A3D9862DF4AF1575786F3D613C8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8476 |
Entropy (8bit): | 3.710582107876963 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiv+6YC6YrrSUD3Lgmf11ST+prj89bvnsfvFm:RrlsNiG6YC6YXSUD3LgmfnSTvsfA |
MD5: | 617EFBB19D63CA339B4C2CC6733365C2 |
SHA1: | 02C5650018A35ED42C848BDB9417F8093C60E1FC |
SHA-256: | 95D9259D1BBCE9AE1D8CA591011AFA7BA85F23A1C79E4554CAD0808632801363 |
SHA-512: | DA057F5FE5C3AAFEAD38939F3566D2785142AA4937DA4B64A579AE247ED46CE4A11830E11E632C9A4F27A60BEC035AB04F1EC952264E66A030FCCC8CDA54FF4A |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4802 |
Entropy (8bit): | 4.5885317853324175 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsfJgtWI9aUWSC8Bx8fm8M4JkjZFQ+q8+zAknbtw3+aad:uITfBdNSN4JKcFAknby3+aad |
MD5: | 15A03407014BA1DB2557AE6BDA08D838 |
SHA1: | 8BFCAD77EC44FE1C4DC48F6732A67D77F2D42D83 |
SHA-256: | 28B4ED6C6F6DC3462E71034651E0A06704EF951FE8ECCEF08E6B8AA84B713F5D |
SHA-512: | 8AF25B854718F74C6CDD8601B7789DDD6C8D97291056AA3BB2E086E2AFB2646AEAA2BDD0A3C4496BCF823887DE8B40768FF72A9F96B7444BAFB4C2435BBA0769 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.043034552951079 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe |
File size: | 880640 |
MD5: | af935ea48e33924f8d68a22a96ac811c |
SHA1: | c0bf9094820c3fa33529ce90933018361c11aa37 |
SHA256: | f4914c162f5064fcfe9012ffa8a93972a1cd268bcaee0a7d2346b8757f553d2a |
SHA512: | 4e6c91d344b7acaa72dafc235acecec4ce94955c1485f55b90cb153e0986332238175aa2a970364296f0ab2cdd807b40460ab7c7967fffc2b5b46e77bdbd4d22 |
SSDEEP: | 12288:P1auaKKCWWWqG/iOG/IukoySsOkCZYYHSO69ciGIt7fWd:P1auaKT/eZSTYzzKipc |
File Content Preview: | MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM.........."..........N.......k..... |
File Icon |
---|
Icon Hash: | 00828e8e8686b000 |
General | |
---|---|
Entrypoint: | 0x426bf7 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | TERMINAL_SERVER_AWARE, DYNAMIC_BASE |
Time Stamp: | 0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: |
Instruction |
---|
call 00007EFE4437A7A6h |
jmp 00007EFF3166A6A6h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push edi |
push esi |
mov esi, dword ptr [esp+10h] |
mov ecx, dword ptr [esp+14h] |
mov edi, dword ptr [esp+0Ch] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007EFEB50CA49Ah |
cmp edi, eax |
jc 00007EFEB50CA7FEh |
bt dword ptr [58F10B00h], 01h |
jnc 00007EFEB50CA499h |
rep movsb |
jmp 00007EFF096BA6A6h |
cmp ecx, 00000080h |
jc 00007EFEB50CA664h |
mov eax, edi |
xor eax, esi |
test eax, 0000000Fh |
jne 00007EFEB50CA4A0h |
bt dword ptr [70930B00h], 01h |
jc 00007EFEB50CA970h |
bt dword ptr [58F10B00h], 00000000h |
jnc 00007EFEB50CA63Dh |
test edi, 00000003h |
jne 00007EFEB50CA64Eh |
test esi, 00000003h |
jne 00007EFEB50CA62Dh |
bt edi, 02h |
jnc 00007EFEB50CA49Fh |
mov eax, dword ptr [esi] |
sub ecx, 04h |
lea esi, dword ptr [esi+04h] |
mov dword ptr [edi], eax |
lea edi, dword ptr [edi+04h] |
bt edi, 03h |
jnc 00007EFEB50CA4A3h |
movq xmm1, qword ptr [esi] |
sub ecx, 08h |
lea esi, dword ptr [esi+08h] |
movq qword ptr [edi], xmm1 |
lea edi, dword ptr [edi+08h] |
test esi, 00000007h |
je 00007EFEB50CA4F5h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb6b6c | 0x17c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc4000 | 0x7ccc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xcc000 | 0x6c20 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x8d8d0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xb2770 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8d000 | 0x858 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8c000 | 0x8c000 | False | 0.522706821987 | data | 6.69461529259 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x8d000 | 0x2d000 | 0x2d000 | False | 0.289930555556 | data | 5.35000817466 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xba000 | 0xa000 | 0xa000 | False | 0.105078125 | data | 1.30461627365 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc4000 | 0x8000 | 0x8000 | False | 0.0670471191406 | data | 1.20884935027 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xcc000 | 0xb000 | 0xb000 | False | 0.00148703835227 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Network Behavior |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 27, 2021 13:11:01.262397051 CEST | 65298 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:01.295847893 CEST | 53 | 65298 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:13.803761959 CEST | 59123 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:13.825015068 CEST | 53 | 59123 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:32.095745087 CEST | 54531 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:32.138418913 CEST | 53 | 54531 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:47.963325024 CEST | 49714 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:48.170144081 CEST | 53 | 49714 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:48.631480932 CEST | 58028 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:48.734786034 CEST | 53 | 58028 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:48.893383026 CEST | 53097 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:48.934973955 CEST | 53 | 53097 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:49.180206060 CEST | 49257 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:49.335315943 CEST | 53 | 49257 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:49.693980932 CEST | 62389 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:49.715853930 CEST | 53 | 62389 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:50.166816950 CEST | 49910 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:50.187283993 CEST | 53 | 49910 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:50.567831993 CEST | 55854 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:50.588860989 CEST | 53 | 55854 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:51.346745968 CEST | 64549 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:51.368148088 CEST | 53 | 64549 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:52.418809891 CEST | 63153 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:52.440622091 CEST | 53 | 63153 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:53.058739901 CEST | 52991 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:53.199769020 CEST | 53 | 52991 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:53.566437960 CEST | 53700 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:53.587783098 CEST | 53 | 53700 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:11:54.325922012 CEST | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:11:54.347434044 CEST | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:12:06.759242058 CEST | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:12:06.781745911 CEST | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:12:06.794132948 CEST | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:12:06.816361904 CEST | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:12:10.175153971 CEST | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:12:10.209116936 CEST | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:12:40.543097019 CEST | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:12:40.565319061 CEST | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Aug 27, 2021 13:12:42.203593016 CEST | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Aug 27, 2021 13:12:42.237476110 CEST | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 13:11:05 |
Start date: | 27/08/2021 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Sabsik.FL.Bml.15603.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 880640 bytes |
MD5 hash: | AF935EA48E33924F8D68A22A96AC811C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Start time: | 13:11:07 |
Start date: | 27/08/2021 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf0000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Process Token Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |