Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Analysis ID:1501352
MD5:7e8300ae1d46833d23f201aaa338f241
SHA1:9bb11fa67eeafc0216a7ee73cea126f90899ce7b
SHA256:3af91463cd8e8354480757fec8213cabcb77deddbf36a707f3a1f69d83dc1883
Tags:exe
Errors
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Source: Binary string: %E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://certs.apple.com/wwdrg3.der01
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://crl.apple.com/root.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-applerootca0.
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-wwdrg3010
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeString found in binary or memory: https://www.apple.com/certificateauthority/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeCode function: 0_2_00007FF675D61094 ExFreePoolWithTag,ExAllocatePool,ZwQuerySystemInformation,ExFreePoolWithTag,0_2_00007FF675D61094
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeBinary string: \Device\driverrundeveloperbronkzdriverhoocked
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Source: Binary string: %E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Driver Valorant\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeCode function: 0_2_00007FF675D61700 cpuid 0_2_00007FF675D61700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exeCode function: 0_2_00007FF675D6128C RtlGetVersion,0_2_00007FF675D6128C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe39%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501352
Start date and time:2024-08-29 19:26:01 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 5
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe, PID 3668 because there are no executed function
  • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (native) x86-64, for MS Windows
Entropy (8bit):6.483134175064168
TrID:
  • Win64 Device Driver (generic) (12004/3) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
File size:17'712 bytes
MD5:7e8300ae1d46833d23f201aaa338f241
SHA1:9bb11fa67eeafc0216a7ee73cea126f90899ce7b
SHA256:3af91463cd8e8354480757fec8213cabcb77deddbf36a707f3a1f69d83dc1883
SHA512:d2cfe875dac01645d7c73fde1412c25e9bc8d3df942c60ee170fb895484931bb881274020da383bbebddf9608fd8072f1d4952ed48ff65a1bda62a84860f2290
SSDEEP:384:fYOHJ6DIX5nb6eNysj9r8E9VF3AM+ocBQ:DpTYENAMxce
TLSH:B3827CF656516C99FF1B447822C9583ABDB5F2832752C5EB4169C2300F82BC23D7D3A5
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..W...W...W...W...V....`..T...W...F....`..Q....`..R...8...V...8...V...RichW...........PE..d...^..f.........."....&...........
Icon Hash:00928e8e8686b000
Entrypoint:0x140001000
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:native
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Time Stamp:0x66C51D5E [Tue Aug 20 22:49:02 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:48aab8b485505e39221c6ac40909a9cb
Signature Valid:false
Signature Issuer:C=US, O=Apple Inc., OU=G3, CN=Apple Worldwide Developer Relations Certification Authority
Signature Validation Error:A certificate chain could not be built to a trusted root authority
Error Number:-2146762486
Not Before, Not After
  • 20/01/2023 12:34:01 19/01/2026 12:34:00
Subject Chain
  • C=US, O="BANK NEGARA INDONESIA (PERSERO), PT TBK", OU=LYN9JKT395, CN="iPhone Distribution: BANK NEGARA INDONESIA (PERSERO), PT TBK", OID.0.9.2342.19200300.100.1.1=LYN9JKT395
Version:3
Thumbprint MD5:EC6FFEFF7671D45D31ADEED3EEE83F3A
Thumbprint SHA-1:78831B210B1DF4D388C6887CA55ED441A4A9625D
Thumbprint SHA-256:9ACFA73E2FCD6FF2561F2526F9C93B980D4B861B56CBBC15A77B46B2642F2A89
Serial:3F309D3E892A3F07797743277A9B64C1
Instruction
dec eax
lea edx, dword ptr [000002E9h]
xor ecx, ecx
jmp 00007F8120CDCDAFh
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, edx
xor edx, edx
dec eax
mov ecx, ebx
call dword ptr [0000100Ch]
mov eax, dword ptr [ebx+30h]
dec eax
add esp, 20h
pop ebx
ret
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
cmp dword ptr [ecx], 00017767h
dec eax
mov ebx, ecx
jne 00007F8120CDC718h
dec eax
arpl word ptr [ecx+04h], ax
test eax, eax
je 00007F8120CDC710h
dec eax
and dword ptr [esp+30h], 00000000h
dec eax
lea edx, dword ptr [esp+30h]
dec eax
mov ecx, eax
call dword ptr [0000100Bh]
dec eax
mov ecx, dword ptr [esp+30h]
dec eax
test ecx, ecx
je 00007F8120CDC6F2h
call 00007F8120CDCD57h
dec eax
test eax, eax
je 00007F8120CDC6E8h
dec eax
mov ecx, dword ptr [ebx+08h]
dec eax
mov dword ptr [ecx], eax
dec eax
mov ecx, dword ptr [esp+30h]
call dword ptr [00000FD5h]
xor eax, eax
jmp 00007F8120CDC6D7h
mov eax, C0000001h
dec eax
add esp, 20h
pop ebx
ret
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], esi
push edi
dec eax
sub esp, 20h
cmp dword ptr [ecx], 00017767h
dec eax
mov esi, ecx
je 00007F8120CDC6DCh
mov eax, C0000001h
jmp 00007F8120CDC78Ah
xor ebx, ebx
dec esp
lea ecx, dword ptr [esp+30h]
inc ebp
xor eax, eax
mov dword ptr [esp+30h], ebx
dec eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x50000x28INIT
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000xe4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2330
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x24.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x22300x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20f00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x90.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xd940xe00fdcf7ec55c9fc2f1347c0da7eab05808False0.5940290178571429data5.989511988957946IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x55c0x6000631f0022a5594ccb1a2320c533dbe88False0.41796875COM executable for DOS3.4575724230578064IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
.data0x30000x400x200cbb748dee567c4d5bf81dbe930f4b320False0.044921875Matlab v4 mat-file (little endian) \231+, sparse, rows 0, columns 00.14263576814887827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000xe40x20060b5a33475c6e368a968172c7922a3f4False0.3125PEX Binary Archive1.8589259487159813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
INIT0x50000x2380x4005ae7b6b5e0712cb96ca9db29ab0a3a7aFalse0.3466796875data2.9939354875697997IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x60000x240x2001f4efc9ecfe0db769e417c46c3d0da6eFalse0.095703125data0.5034383167085339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
ntoskrnl.exeRtlInitUnicodeString, RtlGetVersion, ExAllocatePool, ExFreePoolWithTag, MmUnmapIoSpace, MmMapIoSpaceEx, IofCompleteRequest, IoCreateDevice, IoCreateSymbolicLink, IoDeleteDevice, IoDeleteSymbolicLink, ObfDereferenceObject, MmCopyMemory, PsLookupProcessByProcessId, IoCreateDriver, PsGetProcessSectionBaseAddress, ZwQuerySystemInformation
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:13:26:55
Start date:29/08/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10574.25118.exe"
Imagebase:0x7ff675d60000
File size:17'712 bytes
MD5 hash:7E8300AE1D46833D23F201AAA338F241
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2063094266.00007FF675D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF675D60000, based on PE: true
    • Associated: 00000000.00000002.2063078726.00007FF675D60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063108641.00007FF675D62000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063169562.00007FF675D64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063184980.00007FF675D65000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff675d60000_SecuriteInfo.jbxd
    Similarity
    • API ID: FreePoolTag.With$AllocateInformation.Pool.QuerySystem
    • String ID: TnoC
    • API String ID: 270286560-718456449
    • Opcode ID: e9672c180eb6d84d738d6da6d3ae0551f49ee966097ea86e9e18e9c425f566cb
    • Instruction ID: 3aebba93aa8e547edc8de56cdbc9bc0fae63d640d18f949cfea2486252bb670f
    • Opcode Fuzzy Hash: e9672c180eb6d84d738d6da6d3ae0551f49ee966097ea86e9e18e9c425f566cb
    • Instruction Fuzzy Hash: 5B21B673A3D74142EB548B96918467973A1EB44FC0F148275EA4E83B44EE3DDCC28788
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2063094266.00007FF675D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF675D60000, based on PE: true
    • Associated: 00000000.00000002.2063078726.00007FF675D60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063108641.00007FF675D62000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063169562.00007FF675D64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063184980.00007FF675D65000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff675d60000_SecuriteInfo.jbxd
    Similarity
    • API ID: Version.
    • String ID:
    • API String ID: 4117761997-0
    • Opcode ID: a504fe3e7332e3f595242ad3ee69ec368ad003783d483382a79f66b4f4c13d97
    • Instruction ID: e02ffc22d68255b3d6b60c6c42f550fd8d69a0cd8a2e360a5584e2ff42263f6f
    • Opcode Fuzzy Hash: a504fe3e7332e3f595242ad3ee69ec368ad003783d483382a79f66b4f4c13d97
    • Instruction Fuzzy Hash: 41F0F82BE2C34242F7B096A9D04A3782150FB99B81F9443B1E14DC15E4ED1CEE0A8B8D
    Memory Dump Source
    • Source File: 00000000.00000002.2063094266.00007FF675D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF675D60000, based on PE: true
    • Associated: 00000000.00000002.2063078726.00007FF675D60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063108641.00007FF675D62000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063169562.00007FF675D64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063184980.00007FF675D65000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff675d60000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5871cc722dc03c176e77e1eee76a988c3731cc8a4ffdaaf5c98dfd6c20a69ed6
    • Instruction ID: d3e973665e7bdd71d0a24aa7a16cfda58868895e59981c3c3141f41115d5d90a
    • Opcode Fuzzy Hash: 5871cc722dc03c176e77e1eee76a988c3731cc8a4ffdaaf5c98dfd6c20a69ed6
    • Instruction Fuzzy Hash: 1801B172B1C3828AF7598E69A081B267AC1E364390F40D1BDD58EC3685ED3D94925F08
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2063094266.00007FF675D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF675D60000, based on PE: true
    • Associated: 00000000.00000002.2063078726.00007FF675D60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063108641.00007FF675D62000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063169562.00007FF675D64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063184980.00007FF675D65000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff675d60000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateDevice.InitString.Unicode$DeleteLink.Symbolic
    • String ID: \Device\driverrundeveloperbronkzdriverhoocked$\DosDevices\driverrundeveloperbronkzdriverhoocked
    • API String ID: 1055650502-2340277344
    • Opcode ID: 73eb8af8238b80000d2260c1066911ad577f8d714f6207485585f764593e7c72
    • Instruction ID: 2387a3c34c63947b20e29586b954d389f2cc935702da2d6bfdad0c4e5b993255
    • Opcode Fuzzy Hash: 73eb8af8238b80000d2260c1066911ad577f8d714f6207485585f764593e7c72
    • Instruction Fuzzy Hash: 7621FC32A2CB8692EB508B55F44439977A4FB84BC4F404275D68EC3724EF7CD94AC744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2063094266.00007FF675D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF675D60000, based on PE: true
    • Associated: 00000000.00000002.2063078726.00007FF675D60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063108641.00007FF675D62000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063169562.00007FF675D64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2063184980.00007FF675D65000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff675d60000_SecuriteInfo.jbxd
    Similarity
    • API ID: CopyMemory.
    • String ID:
    • API String ID: 1294038310-0
    • Opcode ID: 9b30d3826514b3acac7b14ce90094d97fa10d693872eb120fa5c5a0264eefb49
    • Instruction ID: dbebbef4fcc97a0628e590844aa53216d9acfb5c35e7cd97d2cd8886838f1e02
    • Opcode Fuzzy Hash: 9b30d3826514b3acac7b14ce90094d97fa10d693872eb120fa5c5a0264eefb49
    • Instruction Fuzzy Hash: 2C41A967728B4696EB118F51E8413E927A1FB15BE8F005731DE1E8BB98EF39C50AC344