Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
AV Detection: |
|
---|
Found malware configuration |
Source: |
Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file |
Source: |
ReversingLabs: |
Compliance: |
|
---|
Uses 32bit PE files |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Binary string: |
Software Vulnerabilities: |
|
---|
Found inlined nop instructions (likely shell or obfuscated code) |
Source: |
Code function: |
1_2_00000239A18DFA20 | |
Source: |
Code function: |
1_2_00000239A18D4060 | |
Source: |
Code function: |
1_2_00000239A18D9460 | |
Source: |
Code function: |
1_2_00000239A18C4470 | |
Source: |
Code function: |
1_2_00000239A18C4470 | |
Source: |
Code function: |
1_2_00000239A18DFBA0 | |
Source: |
Code function: |
1_2_00000239A18DFBA0 | |
Source: |
Code function: |
1_2_00000239A18CA3B0 | |
Source: |
Code function: |
1_2_00000239A18C2BC0 | |
Source: |
Code function: |
1_2_00000239A18C5BE0 | |
Source: |
Code function: |
1_2_00000239A18DE3F0 | |
Source: |
Code function: |
1_2_00000239A18CE320 | |
Source: |
Code function: |
1_2_00000239A18E5F60 | |
Source: |
Code function: |
1_2_00000239A18E5EC0 | |
Source: |
Code function: |
1_2_00000239A18C6EF0 | |
Source: |
Code function: |
1_2_00000239A18D0A00 | |
Source: |
Code function: |
1_2_00000239A18DB520 | |
Source: |
Code function: |
1_2_00000239A18D4D50 | |
Source: |
Code function: |
1_2_00000239A18E3990 |
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
|
---|
Creates a DirectInput object (often for capturing keystrokes) |
Source: |
Binary or memory string: |
System Summary: |
|
---|
Uses 32bit PE files |
Source: |
Static PE information: |
Sample file is different than original file name gathered from version info |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
PE file contains strange resources |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Detected potential crypto function |
Source: |
Code function: |
0_2_001A911C | |
Source: |
Code function: |
0_2_0019C201 | |
Source: |
Code function: |
0_2_001A82BD | |
Source: |
Code function: |
0_2_001A941B | |
Source: |
Code function: |
0_2_0019C5D3 | |
Source: |
Code function: |
0_2_001A16DE | |
Source: |
Code function: |
0_2_001A880E | |
Source: |
Code function: |
0_2_0018C950 | |
Source: |
Code function: |
0_2_0019C9BB | |
Source: |
Code function: |
0_2_0019B9CE | |
Source: |
Code function: |
0_2_001ABBF1 | |
Source: |
Code function: |
0_2_00195C19 | |
Source: |
Code function: |
0_2_001A4D22 | |
Source: |
Code function: |
0_2_001A7D6E | |
Source: |
Code function: |
0_2_001A9E7F | |
Source: |
Code function: |
0_2_0019BE63 | |
Source: |
Code function: |
0_2_001A8EA1 | |
Source: |
Code function: |
0_2_00B33168 | |
Source: |
Code function: |
1_2_00000239A18C2F30 | |
Source: |
Code function: |
1_2_00000239A18CC750 | |
Source: |
Code function: |
1_2_00000239A18D4260 | |
Source: |
Code function: |
1_2_00000239A18E4CF0 | |
Source: |
Code function: |
1_2_00000239A18C1030 | |
Source: |
Code function: |
1_2_00000239A18DE47D | |
Source: |
Code function: |
1_2_00000239A18D73A0 | |
Source: |
Code function: |
1_2_00000239A18C3BB0 | |
Source: |
Code function: |
1_2_00000239A18E33D0 | |
Source: |
Code function: |
1_2_00000239A18DE3F0 | |
Source: |
Code function: |
1_2_00000239A18D17F0 | |
Source: |
Code function: |
1_2_00000239A18D740C | |
Source: |
Code function: |
1_2_00000239A18C4730 | |
Source: |
Code function: |
1_2_00000239A18C7340 | |
Source: |
Code function: |
1_2_00000239A18E5F60 | |
Source: |
Code function: |
1_2_00000239A18D7760 | |
Source: |
Code function: |
1_2_00000239A18D1EA0 | |
Source: |
Code function: |
1_2_00000239A18E52C0 | |
Source: |
Code function: |
1_2_00000239A18D5AC0 | |
Source: |
Code function: |
1_2_00000239A18D7EE0 | |
Source: |
Code function: |
1_2_00000239A18CF700 | |
Source: |
Code function: |
1_2_00000239A18E4B10 | |
Source: |
Code function: |
1_2_00000239A18D9A80 | |
Source: |
Code function: |
1_2_00000239A18CFE8E | |
Source: |
Code function: |
1_2_00000239A18D51A0 | |
Source: |
Code function: |
1_2_00000239A18E45D0 | |
Source: |
Code function: |
1_2_00000239A18D35D0 | |
Source: |
Code function: |
1_2_00000239A18C79D0 | |
Source: |
Code function: |
1_2_00000239A18D0A00 | |
Source: |
Code function: |
1_2_00000239A18DB920 | |
Source: |
Code function: |
1_2_00000239A18DED70 |
Found potential string decryption / allocating functions |
Contains functionality to call native functions |
Source: |
Code function: |
1_2_00000239A18CC750 | |
Source: |
Code function: |
1_2_00000239A18DC550 |
Abnormal high CPU Usage |
Source: |
Process Stats: |
Source: |
ReversingLabs: |
Source: |
Static PE information: |
Source: |
Key opened: |
Jump to behavior |
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior |
Source: |
Joe Sandbox Cloud Basic: |
Perma Link |
Source: |
Code function: |
1_2_00000239A18CF3C0 |
Source: |
Mutant created: |
Source: |
Code function: |
0_2_00181E80 |
Source: |
System information queried: |
Jump to behavior |
Source: |
Classification label: |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Binary string: |
Data Obfuscation: |
|
---|
Uses code obfuscation techniques (call, push, ret) |
Source: |
Code function: |
0_2_00190094 | |
Source: |
Code function: |
0_2_0018D0F2 | |
Source: |
Code function: |
0_2_00194438 | |
Source: |
Code function: |
0_2_0019CEEF | |
Source: |
Code function: |
0_2_00B5049D | |
Source: |
Code function: |
1_2_00000239A18DDF25 |
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_0019DD3C |
Malware Analysis System Evasion: |
|
---|
Tries to detect virtualization through RDTSC time measurements |
Source: |
RDTSC instruction interceptor: |
Found evasive API chain (trying to detect sleep duration tampering with parallel thread) |
Source: |
Function Chain: |
May sleep (evasive loops) to hinder dynamic analysis |
Source: |
Thread sleep count: |
Jump to behavior |
Sample execution stops while process was sleeping (likely an evasion) |
Source: |
Last function: |
Program does not show much activity (idle) |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Contains functionality to query network adapater information |
Source: |
Code function: |
1_2_00000239A18DFA20 |
Contains functionality for execution timing, often used to detect debuggers |
Source: |
Code function: |
1_2_00000239A18DADA0 |
Source: |
Binary or memory string: |
Anti Debugging: |
|
---|
Found potential dummy code loops (likely to delay analysis) |
Source: |
Process Stats: |
Contains functionality to check if a debugger is running (IsDebuggerPresent) |
Source: |
Code function: |
0_2_0019293C |
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_0019DD3C |
Program does not show much activity (idle) |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Contains functionality for execution timing, often used to detect debuggers |
Source: |
Code function: |
1_2_00000239A18DADA0 |
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress) |
Source: |
Code function: |
1_2_00000239A18DA280 |
Source: |
Code function: |
0_2_0019676A | |
Source: |
Code function: |
0_2_0019293C | |
Source: |
Code function: |
0_2_0018CFF8 |
HIPS / PFW / Operating System Protection Evasion: |
|
---|
Writes to foreign memory regions |
Source: |
Memory written: |
Jump to behavior | ||
Source: |
Memory written: |
Jump to behavior |
Creates a process in suspended mode (likely to inject code) |
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Language, Device and Operating System Detection: |
|
---|
Queries the volume information (name, serial number etc) of a device |
Source: |
Queries volume information: |
Jump to behavior |
Contains functionality to query locales information (e.g. system language) |
Source: |
Code function: |
0_2_0019A134 | |
Source: |
Code function: |
0_2_0019A1F6 | |
Source: |
Code function: |
0_2_0019A220 | |
Source: |
Code function: |
0_2_0019A287 | |
Source: |
Code function: |
0_2_0019A2C3 | |
Source: |
Code function: |
0_2_001995B5 | |
Source: |
Code function: |
0_2_001A7650 | |
Source: |
Code function: |
0_2_001986AD | |
Source: |
Code function: |
0_2_001A772A | |
Source: |
Code function: |
0_2_00191742 | |
Source: |
Code function: |
0_2_001998D3 | |
Source: |
Code function: |
0_2_001A7918 | |
Source: |
Code function: |
0_2_00198929 | |
Source: |
Code function: |
0_2_0018FAA9 | |
Source: |
Code function: |
0_2_00199D6C | |
Source: |
Code function: |
0_2_00199E61 | |
Source: |
Code function: |
0_2_00199F08 | |
Source: |
Code function: |
0_2_00199F63 |
Source: |
Code function: |
0_2_00197022 |
Stealing of Sensitive Information: |
|
---|
Yara detected Trickbot |
Source: |
File source: |
Remote Access Functionality: |
|
---|
Yara detected Trickbot |
Source: |
File source: |
No contacted IP infos |
---|