Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe

Overview

General Information

Sample name: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe
Analysis ID: 1501343
MD5: 90b5da7657536a226fde8da73a417746
SHA1: 80fdc6cabb8e170241df17a5852e52a098782aa4
SHA256: 8b4daf990bbf15c272273df92ed829b3283199f593ffc239133fb1e3605e8ab7
Tags: exe
Errors
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe ReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe
Source: Binary string: !E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://certs.apple.com/wwdrg3.der01
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://crl.apple.com/root.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://ocsp.apple.com/ocsp03-applerootca0.
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://ocsp.apple.com/ocsp03-wwdrg3010
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe String found in binary or memory: https://www.apple.com/certificateauthority/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Code function: 0_2_00007FF7F2631094 ExFreePoolWithTag,ExAllocatePool,ZwQuerySystemInformation,ExFreePoolWithTag, 0_2_00007FF7F2631094
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Static PE information: invalid certificate
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Binary string: \Device\OHGFsL490
Source: classification engine Classification label: mal48.winEXE@1/0@0/0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe ReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe
Source: Binary string: !E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Binary or memory string: \Device\OHGFsL490
Source: SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Binary or memory string: \DosDevices\OHGFsL490
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Code function: 0_2_00007FF7F2631700 cpuid 0_2_00007FF7F2631700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exe Code function: 0_2_00007FF7F263128C RtlGetVersion, 0_2_00007FF7F263128C
No contacted IP infos