Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
Analysis ID:1501345
MD5:88783a57777926114b5c5c95af4c943c
SHA1:6f57492bd78ebc3c3900919e08e039fbc032268a
SHA256:94132d9dde2b730f4800ee383ddaa63d2e2f92264f07218295d2c5755a414b6a
Tags:exe
Infos:

Detection

Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to query network adapater information
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 84.9% probability
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeStatic PE information: certificate valid
Source: global trafficHTTP traffic detected: GET /pc_game_ly.php?lm=9377ly&rnd=960.9796 HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: client.9377.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /pc_game_ly.php?lm=9377ly&rnd=960.9796 HTTP/1.1Accept: */*Accept-Language: en-CHAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: client.9377.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: client.9377.com
Source: global trafficDNS traffic detected: DNS query: www.y2126.com
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://app.9377.com/api/ly_client_button.php?
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bbs.9377.com/forum-277-1.html
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2690956172.0000000000191000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2696024851.00000000043D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796$
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796...terfaced=960.979688.com/pay/recharge?
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796Zt
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796d
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796ju
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796kcl
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://client.9377.com/pc_game_ly.php?lm=Rhttp://www.9377.com/pay_index.php?game=lyHhttp://bbs.9377.
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ly.9377.com/
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeString found in binary or memory: http://w.w3.
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.1188.com/guanwang/ly
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.1188.com/pay/recharge?gid=
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.1188.com/pay/recharge?gid=5
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.1188.com/pay/recharge?gid=5&server=
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeString found in binary or memory: http://www.9377.com/kefu.html
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000584000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.9377.com/kefu.html)F
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.9377.com/pay_index.php?game=ly
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.y2126.com/
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.y2126.com/9377ly.asp?short=1&t=
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.y2126.com/9377ly.asp?short=1&t=17.40229&id=004F0049004D004D0082008F0092005B00590043005C00
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.y2126.com/9377ly.asp?short=1&t=17.40229rt
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.y2126.com/ckground_gradient.jpgjqW
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comt
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeStatic PE information: Resource name: IMG type: DOS executable (COM)
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000000.1439677149.0000000000513000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelh15_ly.exe vs SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelh15_ly.exe vs SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeBinary or memory string: OriginalFilenamelh15_ly.exe vs SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal42.winEXE@1/10@3/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\http_400_webOC[1]Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMutant created: NULL
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DFDBEA2E7E2544A31B.TMPJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeReversingLabs: Detection: 23%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: msvbvm60.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: vb6zz.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: vb6chs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: vb6chs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: msiso.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: jscript.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeCode function: 0_2_004015E8 pushad ; retf 0_2_004015E9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeCode function: 0_2_0046525E pushad ; iretd 0_2_00465266
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: 43B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: 52C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: 5440000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: 54C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: 9840000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeCode function: GetAdaptersInfo,GetAdaptersInfo,0_2_004A1840
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeCode function: GetAdaptersInfo,0_2_0046AA0C
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW A
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWE
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeMemory allocated: page read and write | page guardJump to behavior
Source: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive12
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Obfuscated Files or Information
LSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe24%ReversingLabsWin32.Trojan.LTLogger
SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.y2126.com/9377ly.asp?short=1&t=17.40229&id=004F0049004D004D0082008F0092005B00590043005C000%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796...terfaced=960.979688.com/pay/recharge?0%Avira URL Cloudsafe
http://www.1188.com/pay/recharge?gid=5&server=0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796ju0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796d0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796$0%Avira URL Cloudsafe
http://ly.9377.com/0%Avira URL Cloudsafe
http://www.y2126.com/ckground_gradient.jpgjqW0%Avira URL Cloudsafe
http://bbs.9377.com/forum-277-1.html0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796kcl0%Avira URL Cloudsafe
http://www.9377.com/pay_index.php?game=ly0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.0%Avira URL Cloudsafe
http://www.y2126.com/9377ly.asp?short=1&t=0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796Zt0%Avira URL Cloudsafe
http://www.1188.com/guanwang/ly0%Avira URL Cloudsafe
http://app.9377.com/api/ly_client_button.php?0%Avira URL Cloudsafe
http://www.9377.com/kefu.html0%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=Rhttp://www.9377.com/pay_index.php?game=lyHhttp://bbs.9377.0%Avira URL Cloudsafe
http://www.1188.com/pay/recharge?gid=0%Avira URL Cloudsafe
http://www.1188.com/pay/recharge?gid=50%Avira URL Cloudsafe
http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.97960%Avira URL Cloudsafe
http://www.9377.com/kefu.html)F0%Avira URL Cloudsafe
http://www.y2126.com/0%Avira URL Cloudsafe
http://www.y2126.com/9377ly.asp?short=1&t=17.40229rt0%Avira URL Cloudsafe
http://w.w3.0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
traefik.sz.ali.pool.9377.com
120.76.203.28
truefalse
    unknown
    www.y2126.com
    unknown
    unknownfalse
      unknown
      client.9377.com
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796false
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.y2126.com/9377ly.asp?short=1&t=17.40229&id=004F0049004D004D0082008F0092005B00590043005C00SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B9E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ly.9377.com/SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796$SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796dSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796juSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.1188.com/pay/recharge?gid=5&server=SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://bbs.9377.com/forum-277-1.htmlSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.phpSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B2D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.y2126.com/ckground_gradient.jpgjqWSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000612000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796...terfaced=960.979688.com/pay/recharge?SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.1188.com/guanwang/lySecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2690956172.0000000000191000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.9377.com/pay_index.php?game=lySecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796ZtSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000058C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=9377ly&rnd=960.9796kclSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003B10000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://app.9377.com/api/ly_client_button.php?SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.y2126.com/9377ly.asp?short=1&t=SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://client.9377.com/pc_game_ly.php?lm=Rhttp://www.9377.com/pay_index.php?game=lyHhttp://bbs.9377.SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.9377.com/kefu.htmlSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.1188.com/pay/recharge?gid=SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://w.w3.SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.y2126.com/SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2694154198.0000000003BB0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.9377.com/kefu.html)FSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.0000000000584000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.y2126.com/9377ly.asp?short=1&t=17.40229rtSecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.1188.com/pay/recharge?gid=5SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe, 00000000.00000002.2691931688.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        120.76.203.28
        traefik.sz.ali.pool.9377.comChina
        37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1501345
        Start date and time:2024-08-29 19:23:22 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 0s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        Detection:MAL
        Classification:mal42.winEXE@1/10@3/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 6
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        TimeTypeDescription
        13:24:44API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe modified
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdSecuriteInfo.com.Linux.Siggen.9999.28377.24731.elfGet hashmaliciousMiraiBrowse
        • 139.246.180.243
        SecuriteInfo.com.Linux.Siggen.9999.6015.2041.elfGet hashmaliciousMiraiBrowse
        • 39.96.157.233
        SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
        • 47.114.199.42
        AyyPZaqgaZ.exeGet hashmaliciousUnknownBrowse
        • 39.97.203.64
        https://oh3y.ulvantiro.su/82xG/Get hashmaliciousHTMLPhisherBrowse
        • 203.119.144.7
        factura-630.900.exeGet hashmaliciousFormBookBrowse
        • 47.104.180.139
        PAGO $630.900.exeGet hashmaliciousFormBookBrowse
        • 47.104.180.139
        g4oUrF5Xr7.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 60.205.2.78
        HZXkZxgQBR.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 60.205.2.78
        TREvPb2cEy.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 60.205.2.78
        No context
        No context
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:data
        Category:dropped
        Size (bytes):49120
        Entropy (8bit):0.0017331682157558962
        Encrypted:false
        SSDEEP:3:Ztt:T
        MD5:0392ADA071EB68355BED625D8F9695F3
        SHA1:777253141235B6C6AC92E17E297A1482E82252CC
        SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
        SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, components 3
        Category:modified
        Size (bytes):453
        Entropy (8bit):5.019973044227213
        Encrypted:false
        SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
        MD5:20F0110ED5E4E0D5384A496E4880139B
        SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
        SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
        SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):12105
        Entropy (8bit):5.451485481468043
        Encrypted:false
        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
        MD5:9234071287E637F85D721463C488704C
        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
        Malicious:false
        Reputation:high, very likely benign file
        Preview:...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):6309
        Entropy (8bit):3.8506703058719767
        Encrypted:false
        SSDEEP:48:upUPinvV4VkBXvLoJyk5N9JXa5TI7kZ3GUsn3GFa7K083GJehBuU1kpd87KxnCQ:ufbpM9N9JcKktZs36a7x05h427Ov
        MD5:05BF9126C766F2136B6FB1CEC93EF98D
        SHA1:FF25A19853A8F675B9A065933DD2503CFA623597
        SHA-256:4F3F545A25EE10E5269615794C9E17B84604A4C6AAE55286189599D4E188A639
        SHA-512:86DC43834FF2382826E1AC17859FA1A62F21AF105D450E9A40C2607A30DFC4DC4291602CB736E915CB47283436FFD4BF9F98C18158B51D1042C29F04A1557600
        Malicious:false
        Reputation:low
        Preview:.<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html>.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css" >.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 400 Bad Request</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Information icon">..
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):4113
        Entropy (8bit):7.9370830126943375
        Encrypted:false
        SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
        MD5:5565250FCC163AA3A79F0B746416CE69
        SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
        SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
        SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:.PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
        Category:dropped
        Size (bytes):748
        Entropy (8bit):7.249606135668305
        Encrypted:false
        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
        MD5:C4F558C4C8B56858F15C09037CD6625A
        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
        Malicious:false
        Preview:.PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):4722
        Entropy (8bit):5.16192639844512
        Encrypted:false
        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g5O8b7A9I5:JsUOG1yNlX6ZzWpHOo/iP16CbM1k
        MD5:387B4FC78ABB97F378C5299D4D2CE305
        SHA1:6F2995FC620AB520C9EE1CA7244DF57367F983A2
        SHA-256:030209A13E2C84118139ABF0C4F08DBD203B4C802C7B73B74851860D79DF9CB7
        SHA-512:592D5E3FB7C78420F648281D87B0B303773749B8E0D3621A493ACAE257E2C1E77B782F3D6DAA0C2B3D37CBB4865B382617AF744E34F66C0F3E522DBCA7D71AAE
        Malicious:false
        Preview:.//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):2168
        Entropy (8bit):5.207912016937144
        Encrypted:false
        SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
        MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
        SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
        SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
        SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
        Malicious:false
        Preview:.body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
        Category:dropped
        Size (bytes):447
        Entropy (8bit):7.304718288205936
        Encrypted:false
        SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
        MD5:26F971D87CA00E23BD2D064524AEF838
        SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
        SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
        SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
        Malicious:false
        Preview:.PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):16384
        Entropy (8bit):0.7822889482332622
        Encrypted:false
        SSDEEP:12:rl3lKFQCb77c4HsUg4YZaS/PZPUE4HsUg4YZaS/PZPUE4HsUg4YZaS/PZPUE4HsU:ru4G4G4G4G4G4
        MD5:24FFAD9ADE1AF846F2CB61BE68E85F36
        SHA1:4FBCC86453BC0FE296A44CA8DD3E1440C97FCF3F
        SHA-256:5D50F2138DCAA6F83F9A7D4880A8DBA514F84AC880EAA2E69D82309206F6AAFD
        SHA-512:B10BFA0D4AEC004CED8714575779AD3411674AB89E570A3965A069797A4850DA365582C3C9CB73357DDBE0CF04E4130C4B87DF9805CAEFBF2FE6517B339F404F
        Malicious:false
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
        Entropy (8bit):7.803666047146493
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.39%
        • UPX compressed Win32 Executable (30571/9) 0.30%
        • Win32 EXE Yoda's Crypter (26571/9) 0.26%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        File name:SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        File size:564'128 bytes
        MD5:88783a57777926114b5c5c95af4c943c
        SHA1:6f57492bd78ebc3c3900919e08e039fbc032268a
        SHA256:94132d9dde2b730f4800ee383ddaa63d2e2f92264f07218295d2c5755a414b6a
        SHA512:167abcc77770101d23fcc5cd1df2b57c4fe66be73ea0d1fde7f7132ab5610c214e0af00e6ff981db46cd78e176401f2626aa04217b4caf54a249811bbf79d9c6
        SSDEEP:12288:7Egn2EkLvTjotXsXsjo3sPnXMRJmV0nzJEdMNZ:7R2EkLvPotX5jo3EQFl
        TLSH:57C4238706751195EF093E33561EC1A20B92B9122D0B7D178CD6DCBB5831EE5EB87F06
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X.J.9...9...9...%...9.......9.......9..Rich.9..................PE..L....T.Q.................`...0.......'.......0....@........
        Icon Hash:16155d48d0a12d1f
        Entrypoint:0x5127f0
        Entrypoint Section:UPX1
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x518B5488 [Thu May 9 07:47:20 2013 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:5b091649031f38ad86eb9061a77425fb
        Signature Valid:true
        Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 25/02/2013 01:00:00 26/02/2015 00:59:59
        Subject Chain
        • CN=\u5e7f\u5dde\u5fae\u5a31\u7f51\u7edc\u79d1\u6280\u6709\u9650\u516c\u53f8, OU=\u7814\u53d1\u90e8, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=\u5e7f\u5dde\u5fae\u5a31\u7f51\u7edc\u79d1\u6280\u6709\u9650\u516c\u53f8, L=guangzhou, S=guangdong, C=CN
        Version:3
        Thumbprint MD5:91EBBBED78D9B839B41A485341D1FD7E
        Thumbprint SHA-1:C6825C71D84B85A17C886FD4210A7E4F402BCC15
        Thumbprint SHA-256:2EEC19B9AF1E7D6EA23B977BBE42DD807C03B605307BF9AFFA6600F14B427E62
        Serial:59E4E1C94F2114A80E4D13AB5933681A
        Instruction
        pushad
        mov esi, 0048D000h
        lea edi, dword ptr [esi-0008C000h]
        push edi
        or ebp, FFFFFFFFh
        jmp 00007F61DCF8BCB2h
        nop
        nop
        nop
        nop
        nop
        nop
        mov al, byte ptr [esi]
        inc esi
        mov byte ptr [edi], al
        inc edi
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F61DCF8BC8Fh
        mov eax, 00000001h
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc eax, eax
        add ebx, ebx
        jnc 00007F61DCF8BCADh
        jne 00007F61DCF8BCCAh
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F61DCF8BCC1h
        dec eax
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc eax, eax
        jmp 00007F61DCF8BC76h
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc ecx, ecx
        jmp 00007F61DCF8BCF4h
        xor ecx, ecx
        sub eax, 03h
        jc 00007F61DCF8BCB3h
        shl eax, 08h
        mov al, byte ptr [esi]
        inc esi
        xor eax, FFFFFFFFh
        je 00007F61DCF8BD17h
        sar eax, 1
        mov ebp, eax
        jmp 00007F61DCF8BCADh
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F61DCF8BC6Eh
        inc ecx
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F61DCF8BC60h
        add ebx, ebx
        jne 00007F61DCF8BCA9h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc ecx, ecx
        add ebx, ebx
        jnc 00007F61DCF8BC91h
        jne 00007F61DCF8BCABh
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jnc 00007F61DCF8BC86h
        add ecx, 02h
        cmp ebp, FFFFFB00h
        adc ecx, 02h
        lea edx, dword ptr [eax+eax]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1156440x11c.rsrc
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1130000x2644.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x886000x15a0UPX0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1157600xc.rsrc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        UPX00x10000x8c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        UPX10x8d0000x860000x85a00577ef821e2e91af8d522159af63ef26dFalse0.9785412038119738data7.805781198930377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x1130000x30000x2800ec40ca3e777007ce31c4a96751d4d68fFalse0.67939453125data5.972962211613611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        NameRVASizeTypeLanguageCountryZLIB Complexity
        CUSTOM0xae7940x33cdataChineseChina1.0132850241545894
        CUSTOM0xaead00x33cdataChineseChina1.0132850241545894
        IMG0xaee0c0x68edataChineseChina1.0065554231227651
        IMG0xaf49c0x69edataChineseChina1.0064935064935066
        IMG0xafb3c0x649DOS executable (COM)ChineseChina1.006836544437539
        IMG0xb01880x2771OpenPGP Secret KeyChineseChina0.9755372883034564
        IMG0xb28fc0x29fddataChineseChina0.9739510652153689
        IMG0xb52fc0x2569dataChineseChina0.9781768821133967
        IMG0xb78680x24c4dataChineseChina0.9765193370165746
        IMG0xb9d2c0x2719dataChineseChina0.980717354381057
        IMG0xbc4480x2373dataChineseChina0.9791735537190083
        IMG0xbe7bc0x4eddataChineseChina1.0087232355273592
        IMG0xbecac0x554floppy image data (IBM SaveDskF, old)ChineseChina1.0080645161290323
        IMG0xbf2000x48cdataChineseChina1.0094501718213058
        IMG0xbf68c0x26e0dataChineseChina0.9769895498392283
        IMG0xc1d6c0x2931dataChineseChina0.9806543385490754
        IMG0xc46a00x24c4compacted dataChineseChina0.9797067573310667
        IMG0xc6b640x25dbdataChineseChina0.9803941801671654
        IMG0xc91400x281fdataChineseChina0.9778015772563529
        IMG0xcb9600x23f8dataChineseChina0.9794743701129452
        IMG0xcdd580x400e4dataChineseChina0.9832642202674066
        RT_ICON0x1137980x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296ChineseChina0.7966194111232279
        RT_ICON0x10fae40x130data1.0361842105263157
        RT_ICON0x10fc140x2e8data1.0147849462365592
        RT_ICON0x10fefc0x128data1.037162162162162
        RT_GROUP_ICON0x1154440x14dataChineseChina1.15
        RT_GROUP_ICON0x1100380x30data1.2291666666666667
        RT_VERSION0x11545c0x1e8dataChineseChina0.5327868852459017
        DLLImport
        KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, ExitProcess
        MSVBVM60.DLL
        OLE32.DLLIsEqualGUID
        SHLWAPI.DLLPathFileExistsW
        Language of compilation systemCountry where language is spokenMap
        ChineseChina
        TimestampSource PortDest PortSource IPDest IP
        Aug 29, 2024 19:24:42.417064905 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:24:42.421996117 CEST8049707120.76.203.28192.168.2.7
        Aug 29, 2024 19:24:42.422260046 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:24:42.422331095 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:24:42.427370071 CEST8049707120.76.203.28192.168.2.7
        Aug 29, 2024 19:24:43.589519024 CEST8049707120.76.203.28192.168.2.7
        Aug 29, 2024 19:24:43.589595079 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:25:57.046881914 CEST8049707120.76.203.28192.168.2.7
        Aug 29, 2024 19:25:57.046968937 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:26:31.261105061 CEST4970780192.168.2.7120.76.203.28
        Aug 29, 2024 19:26:31.266185999 CEST8049707120.76.203.28192.168.2.7
        TimestampSource PortDest PortSource IPDest IP
        Aug 29, 2024 19:24:41.338567019 CEST5061153192.168.2.71.1.1.1
        Aug 29, 2024 19:24:42.336724997 CEST5061153192.168.2.71.1.1.1
        Aug 29, 2024 19:24:42.410022974 CEST53506111.1.1.1192.168.2.7
        Aug 29, 2024 19:24:42.410065889 CEST53506111.1.1.1192.168.2.7
        Aug 29, 2024 19:24:44.921996117 CEST5410453192.168.2.71.1.1.1
        Aug 29, 2024 19:24:44.932130098 CEST53541041.1.1.1192.168.2.7
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Aug 29, 2024 19:24:41.338567019 CEST192.168.2.71.1.1.10x9c08Standard query (0)client.9377.comA (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:42.336724997 CEST192.168.2.71.1.1.10x9c08Standard query (0)client.9377.comA (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:44.921996117 CEST192.168.2.71.1.1.10x72f3Standard query (0)www.y2126.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Aug 29, 2024 19:24:42.410022974 CEST1.1.1.1192.168.2.70x9c08No error (0)client.9377.comwwww-traefik.9377.comCNAME (Canonical name)IN (0x0001)false
        Aug 29, 2024 19:24:42.410022974 CEST1.1.1.1192.168.2.70x9c08No error (0)wwww-traefik.9377.comtraefik.sz.ali.pool.9377.comCNAME (Canonical name)IN (0x0001)false
        Aug 29, 2024 19:24:42.410022974 CEST1.1.1.1192.168.2.70x9c08No error (0)traefik.sz.ali.pool.9377.com120.76.203.28A (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:42.410022974 CEST1.1.1.1192.168.2.70x9c08No error (0)traefik.sz.ali.pool.9377.com120.79.30.240A (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:42.410065889 CEST1.1.1.1192.168.2.70x9c08No error (0)client.9377.comwwww-traefik.9377.comCNAME (Canonical name)IN (0x0001)false
        Aug 29, 2024 19:24:42.410065889 CEST1.1.1.1192.168.2.70x9c08No error (0)wwww-traefik.9377.comtraefik.sz.ali.pool.9377.comCNAME (Canonical name)IN (0x0001)false
        Aug 29, 2024 19:24:42.410065889 CEST1.1.1.1192.168.2.70x9c08No error (0)traefik.sz.ali.pool.9377.com120.76.203.28A (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:42.410065889 CEST1.1.1.1192.168.2.70x9c08No error (0)traefik.sz.ali.pool.9377.com120.79.30.240A (IP address)IN (0x0001)false
        Aug 29, 2024 19:24:44.932130098 CEST1.1.1.1192.168.2.70x72f3Name error (3)www.y2126.comnonenoneA (IP address)IN (0x0001)false
        • client.9377.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.749707120.76.203.28805916C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        TimestampBytes transferredDirectionData
        Aug 29, 2024 19:24:42.422331095 CEST335OUTGET /pc_game_ly.php?lm=9377ly&rnd=960.9796 HTTP/1.1
        Accept: */*
        Accept-Language: en-CH
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
        Host: client.9377.com
        Connection: Keep-Alive
        Aug 29, 2024 19:24:43.589519024 CEST319INHTTP/1.1 400 Bad Request
        B-Via: proxy_02.pt.e.9377
        Content-Length: 166
        Content-Type: text/html
        Date: Thu, 29 Aug 2024 17:24:43 GMT
        Server: nginx
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body bgcolor="white"><center><h1>400 Bad Request</h1></center><hr><center>nginx</center></body></html>


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:13:24:39
        Start date:29/08/2024
        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.SuspectCRC.5391.13115.exe"
        Imagebase:0x400000
        File size:564'128 bytes
        MD5 hash:88783A57777926114B5C5C95AF4C943C
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:10.2%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:0%
          Total number of Nodes:28
          Total number of Limit Nodes:2
          execution_graph 10004 48d8c0 10005 48d8e3 10004->10005 10011 4961d0 10005->10011 10007 48e6ec 10007->10007 10008 48e0e5 10008->10007 10021 495d50 10008->10021 10012 496216 10011->10012 10013 496336 10012->10013 10015 496334 SendMessageA 10012->10015 10014 496347 SendMessageA 10013->10014 10016 496350 10014->10016 10015->10013 10017 496434 10016->10017 10018 496432 SendMessageA 10016->10018 10019 496445 SendMessageA 10017->10019 10018->10017 10020 496461 10019->10020 10020->10008 10023 495d87 10021->10023 10022 48e5d4 10023->10022 10025 495820 10023->10025 10026 495863 10025->10026 10027 4958fa SetPropA 10026->10027 10028 495910 10026->10028 10027->10028 10028->10022 10029 48ee30 10030 48ee53 10029->10030 10031 48f04c 10030->10031 10033 48bc90 10030->10033 10035 48bcc7 10033->10035 10034 48be78 10034->10031 10035->10034 10036 495d50 SetPropA 10035->10036 10036->10034

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 935 4a1840-4a1904 call 46aa0c 939 4a191e-4a1922 935->939 940 4a1906-4a1919 935->940 941 4a1db8-4a1e17 939->941 942 4a1928-4a195a 939->942 944 4a1d69-4a1da0 940->944 950 4a1e19-4a1e1a 941->950 951 4a1e25-4a1e35 941->951 952 4a197e-4a1984 942->952 953 4a195c-4a1960 942->953 950->951 960 4a1e46-4a1e5d 951->960 961 4a1e37-4a1e3f 951->961 962 4a198a-4a19b1 call 46aa0c 952->962 953->952 954 4a1962-4a196c 953->954 956 4a197a-4a197c 954->956 957 4a196e-4a1974 954->957 956->962 957->956 965 4a1e60-4a1e63 960->965 961->960 980 4a19b7-4a19d0 962->980 981 4a1d14-4a1d19 962->981 967 4a1e69-4a1e6c 965->967 968 4a1f1d 965->968 972 4a1e7a-4a1e9b 967->972 973 4a1e6e-4a1e6f 967->973 971 4a1f24-4a1f48 968->971 977 4a1eac-4a1efb 972->977 978 4a1e9d-4a1ea5 972->978 973->972 1002 4a1efd-4a1f0a 977->1002 1003 4a1f14-4a1f1b 977->1003 978->977 984 4a19d2-4a19d6 980->984 985 4a19f4-4a19fa 980->985 981->944 984->985 987 4a19d8-4a19e2 984->987 992 4a1a00-4a1a19 985->992 988 4a19f0-4a19f2 987->988 989 4a19e4-4a19ea 987->989 988->992 989->988 992->981 998 4a1a1f-4a1a3f call 46aa40 992->998 1007 4a1a44-4a1ac7 998->1007 1005 4a1f0c-4a1f0f 1002->1005 1006 4a1f72-4a209f call 403240 * 2 1002->1006 1003->971 1005->965 1045 4a20c1 1006->1045 1046 4a20a1-4a20bf 1006->1046 1015 4a1acc-4a1ace 1007->1015 1016 4a1cfc-4a1d0f 1015->1016 1017 4a1ad4-4a1afc 1015->1017 1016->981 1023 4a1bde-4a1bec 1017->1023 1024 4a1b02-4a1b10 1017->1024 1031 4a1bee 1023->1031 1032 4a1bf4-4a1cda 1023->1032 1028 4a1b18-4a1bd9 1024->1028 1029 4a1b12 1024->1029 1057 4a1cdd-4a1cf7 1028->1057 1029->1028 1031->1032 1032->1057 1047 4a20cb-4a20ef 1045->1047 1046->1047 1058 4a2111-4a2117 1047->1058 1059 4a20f1-4a210f 1047->1059 1057->1015 1061 4a211d-4a21c6 1058->1061 1059->1061 1068 4a21eb 1061->1068 1069 4a21c8-4a21e9 1061->1069 1070 4a21f5-4a225f 1068->1070 1069->1070 1078 4a2281 1070->1078 1079 4a2261-4a227f 1070->1079 1080 4a228b-4a2322 1078->1080 1079->1080 1091 4a2344-4a234a 1080->1091 1092 4a2324-4a2342 1080->1092 1093 4a2350-4a23ef 1091->1093 1092->1093 1099 4a23f1-4a2412 1093->1099 1100 4a2414 1093->1100 1101 4a241e-4a24af 1099->1101 1100->1101 1111 4a24d1 1101->1111 1112 4a24b1-4a24cf 1101->1112 1113 4a24db-4a257e call 403240 1111->1113 1112->1113 1121 4a25a3 1113->1121 1122 4a2580-4a25a1 1113->1122 1123 4a25ad-4a2623 1121->1123 1122->1123
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.2691069732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.00000000004AC000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.000000000050F000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691803135.0000000000512000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID: @$0,@$Index$Refresh2$Silent$key$object
          • API String ID: 0-528044599
          • Opcode ID: a52cd6b653e7b89bb05e3509709c6c4bba5637a6b607d8372c9a9ecb7fd7335a
          • Instruction ID: 75b67a71b11e7b55d79c481be80bc58c9a1d07e27cb75acbe4d56e6921d32b29
          • Opcode Fuzzy Hash: a52cd6b653e7b89bb05e3509709c6c4bba5637a6b607d8372c9a9ecb7fd7335a
          • Instruction Fuzzy Hash: 01824BB59002189FDB14DF94CD88BDEBBB9FF48305F1081AAE50AB7260DB745A85CF64
          Memory Dump Source
          • Source File: 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.2691069732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.00000000004AC000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.000000000050F000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691803135.0000000000512000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9bb51332f2c5eb9c7a8e4356eb20d59769ff504bc3ca2cb20678b6f158729938
          • Instruction ID: 61091fbe9d0274de224f56c43ffcf95127211ee1c6fedb410a671d71f2f10d41
          • Opcode Fuzzy Hash: 9bb51332f2c5eb9c7a8e4356eb20d59769ff504bc3ca2cb20678b6f158729938
          • Instruction Fuzzy Hash: 05B01260394441BB761086A89D064342580A2423407304C73E041F11E0EB5CDD60CF3F

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1129 4961d0-49621a 1131 49621c-496225 1129->1131 1132 496245 1129->1132 1133 496228-49622a 1131->1133 1134 49624b-496273 call 469d48 * 2 1132->1134 1133->1134 1135 49622c-49623e call 469e28 1133->1135 1146 496285-496299 1134->1146 1147 496275-49627a 1134->1147 1135->1134 1144 496240-496243 1135->1144 1144->1133 1149 49629b-4962a3 1146->1149 1150 4962aa-4962c0 1146->1150 1147->1146 1149->1150 1152 4962c2-4962cd 1150->1152 1153 4962d4-496321 call 469d8c 1150->1153 1152->1153 1161 496323-49632f call 469470 1153->1161 1162 496336-496371 call 469470 SendMessageA call 469d48 * 2 1153->1162 1166 496334 SendMessageA 1161->1166 1173 496383-496397 1162->1173 1174 496373-496378 1162->1174 1166->1162 1176 496399-4963a1 1173->1176 1177 4963a8-4963be 1173->1177 1174->1173 1176->1177 1179 4963c0-4963cb 1177->1179 1180 4963d2-49641f call 469d8c 1177->1180 1179->1180 1188 496421-49642d call 469470 1180->1188 1189 496434-49646a call 469470 SendMessageA 1180->1189 1192 496432 SendMessageA 1188->1192 1192->1189
          APIs
          • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00496334
          • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00496347
          • SendMessageA.USER32(?,00000080,00000000,00000000), ref: 00496432
          • SendMessageA.USER32(?,00000080,00000000,00000000), ref: 00496445
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.2691069732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.00000000004AC000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.000000000050F000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691803135.0000000000512000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: F2@
          • API String ID: 3850602802-284835201
          • Opcode ID: 95adf5c32d1919881bd6a170a2009bba05b655b42a89715e21568125e9ec4a85
          • Instruction ID: 3a03212bac6aa6cd72ab3bf9abd0cae5cdec34751c2d697b6f49718d0a0bd471
          • Opcode Fuzzy Hash: 95adf5c32d1919881bd6a170a2009bba05b655b42a89715e21568125e9ec4a85
          • Instruction Fuzzy Hash: 82711D70A40208ABDF10EFA5DD89EDE7BB9FF48B04F10452AF541B7290DBB49845CB69

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1196 495820-495871 call 46a2a4 1200 495a02-495a2a 1196->1200 1201 495877-49589c call 46baf0 1196->1201 1208 49595f-49596c 1201->1208 1209 4958a2-4958f5 call 46bb34 1201->1209 1210 495a41-495a47 1208->1210 1211 495972-4959d4 call 46bb34 1208->1211 1228 4958fa-49595d SetPropA call 4692e8 call 46bb34 call 469330 1209->1228 1237 4959dd-4959ff call 46bb34 1211->1237 1228->1237 1237->1200
          APIs
          • SetPropA.USER32(F2@,00000000), ref: 004958FA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.2691069732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.00000000004AC000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.000000000050F000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691803135.0000000000512000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
          Similarity
          • API ID: Prop
          • String ID: F2@$ISubclassEx$PrevWndProc$nISubclassExs
          • API String ID: 257714900-3149081379
          • Opcode ID: f72edf707b5299f31a7e7c88f5a2c8ac25e09bc968dcb1cb5905a22b4dca1560
          • Instruction ID: 9c7bc86d8f6065fcd95c4fad90366c04000015dc91e38ebbc8494777216d274b
          • Opcode Fuzzy Hash: f72edf707b5299f31a7e7c88f5a2c8ac25e09bc968dcb1cb5905a22b4dca1560
          • Instruction Fuzzy Hash: 4D5116B1900209AFDB00AFE4ED89DEE7B7CFF48305B14416AF502F2160EA785A45CB69
          Memory Dump Source
          • Source File: 00000000.00000002.2698360615.0000000005480000.00000010.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_5480000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
          • Instruction ID: 3f86476654f6a4c03e528a1c6503a1bcd068545598f7b5c4b43d5f07afaca009
          • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
          • Instruction Fuzzy Hash:
          Memory Dump Source
          • Source File: 00000000.00000002.2698360615.0000000005480000.00000010.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_5480000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
          • Instruction ID: 3f86476654f6a4c03e528a1c6503a1bcd068545598f7b5c4b43d5f07afaca009
          • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
          • Instruction Fuzzy Hash:
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2691138467.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.2691069732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.00000000004AC000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.000000000050F000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691138467.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691803135.0000000000512000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.2691849808.0000000000513000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
          Similarity
          • API ID: D79253
          • String ID: &H00$&H04$&H11d1$&H18$&H2C$&H36$&H3F72$&H4A52$&H4f$&H7B$&H89$&H98$&HA6$&HBB$&HCB$&HD2BC4C84$&HF3$&Hb950$&Hc0$&Hc2$&Hc8$&Hf38bc242
          • API String ID: 2166859834-2898014800
          • Opcode ID: 6b24086b0239b6e192cb56aaebc61cabd92a84baa51c198244de689ce75abac5
          • Instruction ID: 710df2ab8c6952c363da4d9daff4dc60b5a990d85f00be6ee45f9197cf806b5c
          • Opcode Fuzzy Hash: 6b24086b0239b6e192cb56aaebc61cabd92a84baa51c198244de689ce75abac5
          • Instruction Fuzzy Hash: 25413C345457C5ABC710BBB6DE4EA8E7FE0EF45700B1005AFE492E6671DA78A804CB1E