Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Analysis ID:1501354
MD5:eabff7dae883de9e09b5d6aa09e17c45
SHA1:46de72f4c3fcbefdb8f8d0a21ae56f3f60bf56b3
SHA256:d0205b46514ea3f19b4fea79f9e897c3cf84c8775e9917c04dd41cb39a3ae06c
Tags:exe
Errors
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to call native functions
PE / OLE file has an invalid certificate
Program does not show much activity (idle)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeReversingLabs: Detection: 44%
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: C:\Users\gg\Downloads\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://certs.apple.com/wwdrg3.der01
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://crl.apple.com/root.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-applerootca0.
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-wwdrg3010
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeString found in binary or memory: https://www.apple.com/certificateauthority/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeCode function: 1_2_00007FF71C821388 ExFreePoolWithTag,ExAllocatePool,ZwQuerySystemInformation,ExFreePoolWithTag,1_2_00007FF71C821388
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeBinary string: \Device\onkzaoobrabo
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeReversingLabs: Detection: 44%
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\gg\Downloads\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No Mitre Att&ck techniques found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe45%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501354
Start date and time:2024-08-29 19:28:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 35s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com
  • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe, PID 516 because there are no executed function
  • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (native) x86-64, for MS Windows
Entropy (8bit):6.4458538012317
TrID:
  • Win64 Device Driver (generic) (12004/3) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
File size:17'728 bytes
MD5:eabff7dae883de9e09b5d6aa09e17c45
SHA1:46de72f4c3fcbefdb8f8d0a21ae56f3f60bf56b3
SHA256:d0205b46514ea3f19b4fea79f9e897c3cf84c8775e9917c04dd41cb39a3ae06c
SHA512:f4a1a90f972f59c15c508339882f9672240ed1b0c18991511499a276b0a57699407ea7ff1fbf5adc7cf549617848da8c32af1795e511c69b9455ecae25e89c58
SSDEEP:192:rrXTtpwJnCjYcfUpBJJIvNyTuTiPtuQcXky2sE9jBF3A5K+om+Izru:rrjtOJCj5fyTeNyKTiJ8E9VF3AM+oMS
TLSH:16827CF257212DC1EE8A987862CC986EFD34F3872B5185DB4259C0200F42BD57F7D265
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._...1...1...1...0...1...0...1...2...1...5...1...4...1...3...1.Rich..1.........................PE..d......f.........."....(...
Icon Hash:00928e8e8686b000
Entrypoint:0x140001000
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:native
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Time Stamp:0x66A2D0EE [Thu Jul 25 22:25:50 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:d122cc6d92ff620a7df9854ce31e386c
Signature Valid:false
Signature Issuer:C=US, O=Apple Inc., OU=G3, CN=Apple Worldwide Developer Relations Certification Authority
Signature Validation Error:A certificate chain could not be built to a trusted root authority
Error Number:-2146762486
Not Before, Not After
  • 14/02/2023 12:48:14 13/02/2026 12:48:13
Subject Chain
  • C=CN, O="BEIJING TIANYUAN NEW ENERGY TECHNOLOGY CO.,LTD.", OU=UX47YY36D4, CN="iPhone Distribution: BEIJING TIANYUAN NEW ENERGY TECHNOLOGY CO.,LTD.", OID.0.9.2342.19200300.100.1.1=UX47YY36D4
Version:3
Thumbprint MD5:6BD938E0DDA78E2C7158F638BD0C1D09
Thumbprint SHA-1:4E6C64CBE7830868632BA356DC030027EFB6A729
Thumbprint SHA-256:EBCDD58042E3A06B3FA2A4D7CC90CFA478E44D151D9C460EB9BC4302D54AC7C3
Serial:67AC7496E8E30A5E21DEB73C555849FF
Instruction
dec eax
lea edx, dword ptr [00000549h]
xor ecx, ecx
jmp 00007FBE5CFC061Fh
int3
int3
inc eax
push ebp
push ebx
push esi
push edi
inc ecx
push ebp
inc ecx
push esi
inc ecx
push edi
dec eax
mov ebp, esp
dec eax
sub esp, 40h
dec eax
cmp dword ptr [0000103Eh], 00000000h
dec esp
mov edi, ecx
je 00007FBE5CFBFF02h
dec eax
mov ecx, dword ptr [0000102Eh]
dec esp
lea eax, dword ptr [000010AFh]
inc ecx
mov ecx, 00000010h
inc ecx
lea edx, dword ptr [ecx+10h]
call 00007FBE5CFBFEFDh
dec eax
test eax, eax
je 00007FBE5CFBFEDCh
dec eax
mov eax, dword ptr [eax+10h]
dec eax
and dword ptr [ebp+48h], 00000000h
dec eax
and eax, FFFFF000h
dec eax
mov dword ptr [00001FC1h], eax
call dword ptr [00000FE3h]
dec eax
mov ebx, eax
dec eax
cmp dword ptr [eax], 00000000h
je 00007FBE5CFBFEB3h
dec eax
mov esi, eax
inc ecx
mov ebp, 00000001h
dec eax
mov eax, dword ptr [ebx+08h]
dec eax
test eax, eax
je 00007FBE5CFBFE9Dh
dec eax
mov edi, dword ptr [ebx]
dec eax
cdq
and edx, 00000FFFh
inc ebp
xor esi, esi
dec eax
add eax, edx
dec eax
sar eax, 0Ch
dec eax
test eax, eax
jng 00007FBE5CFBFE6Eh
dec eax
mov eax, dword ptr [00001F73h]
dec esp
mov eax, edi
dec ecx
shr eax, 0Ch
dec ebx
lea ecx, dword ptr [eax+eax*2]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x50000x28INIT
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000xb4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2340
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x24.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x22400x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x21000x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x98.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xcf20xe00e44c60c533941d9358472976012b19bbFalse0.5694754464285714data5.829110028385894IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x53c0x600099183e4c34719de8ea2a13412b5db0eFalse0.400390625data3.370351767525391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
.data0x30000x400x200387d3cec6641bcedbf49389f4d198e83False0.037109375Non-ISO extended-ASCII text, with no line terminators0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000xb40x20064d4f0c246a9fb02bc70c222aa4a24b7False0.279296875PEX Binary Archive1.5605181693091348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
INIT0x50000x2660x40045a8d4e5590d8e7b40e330b55c3f03eaFalse0.37109375data3.229878810838546IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x60000x240x20050ce1dea0b05988793d173c8511a392fFalse0.099609375data0.528762138688122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
ntoskrnl.exeRtlInitUnicodeString, ExAllocatePool, ExFreePoolWithTag, MmUnmapIoSpace, MmMapIoSpaceEx, IofCompleteRequest, IoCreateDevice, IoCreateSymbolicLink, IoDeleteDevice, IoDeleteSymbolicLink, ObfDereferenceObject, MmGetPhysicalMemoryRanges, MmCopyMemory, MmGetVirtualForPhysical, PsLookupProcessByProcessId, IoCreateDriver, PsGetProcessSectionBaseAddress, ZwQuerySystemInformation
No network behavior found

Click to jump to process

Click to jump to process

Target ID:1
Start time:13:29:07
Start date:29/08/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe"
Imagebase:0x7ff71c820000
File size:17'728 bytes
MD5 hash:EABFF7DAE883DE9E09B5D6AA09E17C45
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2134247175.00007FF71C821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71C820000, based on PE: true
    • Associated: 00000001.00000002.2134231111.00007FF71C820000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134262431.00007FF71C822000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134278418.00007FF71C824000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134293147.00007FF71C825000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ff71c820000_SecuriteInfo.jbxd
    Similarity
    • API ID: FreePoolTag.With$AllocateInformation.Pool.QuerySystem
    • String ID: TnoC
    • API String ID: 270286560-718456449
    • Opcode ID: 37768c6fff15cfda592652c34664e774dbda7351dbf3a10af6bb1eddb0af3a4c
    • Instruction ID: 7fbfce7536ecc9c8efddc920ad3ec4099d24a5ffe7a783de4a890b0abe35da85
    • Opcode Fuzzy Hash: 37768c6fff15cfda592652c34664e774dbda7351dbf3a10af6bb1eddb0af3a4c
    • Instruction Fuzzy Hash: 4921DE69A18E4142EB649BD590C87F9E292FF497A4FB44134DE4F43A44CE3CDCA8C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2134247175.00007FF71C821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71C820000, based on PE: true
    • Associated: 00000001.00000002.2134231111.00007FF71C820000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134262431.00007FF71C822000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134278418.00007FF71C824000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134293147.00007FF71C825000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ff71c820000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateDevice.InitString.Unicode$DeleteLink.Symbolic
    • String ID: \Device\onkzaoobrabo$\DosDevices\onkzaoobrabo
    • API String ID: 1055650502-2788148970
    • Opcode ID: 1f25bd3576e280b586739637786fd44f994684b2816cc4293187d74698f01236
    • Instruction ID: f7f3e45148fd3f9f1309cb43be4785f7c8a8365d49549a4b34f2e874ba42a270
    • Opcode Fuzzy Hash: 1f25bd3576e280b586739637786fd44f994684b2816cc4293187d74698f01236
    • Instruction Fuzzy Hash: 2F211C36A18F8592EB109B95E4883D9B3B4FB84BA4FA04135D68D83724DF7CE92DC710
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2134247175.00007FF71C821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71C820000, based on PE: true
    • Associated: 00000001.00000002.2134231111.00007FF71C820000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134262431.00007FF71C822000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134278418.00007FF71C824000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134293147.00007FF71C825000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ff71c820000_SecuriteInfo.jbxd
    Similarity
    • API ID: CopyMemory.$MemoryPhysicalRanges.
    • String ID:
    • API String ID: 1650696044-0
    • Opcode ID: 59147a293ac8b564f0d050a895ab9735dc459531c123ac02ce31f66fe6f9b60d
    • Instruction ID: 08a1fade1fa857cbe89d8a07987d31d2abc6aab114215019119c0e1fb0081566
    • Opcode Fuzzy Hash: 59147a293ac8b564f0d050a895ab9735dc459531c123ac02ce31f66fe6f9b60d
    • Instruction Fuzzy Hash: BC518866B04E4651EF10DB95D8887B997A1FB14BA8FA04638DE0D47BD8DE3CE45CC310
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2134247175.00007FF71C821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71C820000, based on PE: true
    • Associated: 00000001.00000002.2134231111.00007FF71C820000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134262431.00007FF71C822000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134278418.00007FF71C824000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2134293147.00007FF71C825000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ff71c820000_SecuriteInfo.jbxd
    Similarity
    • API ID: CopyMemory.
    • String ID:
    • API String ID: 1294038310-0
    • Opcode ID: 05fd405c008b06ebbbce26b165ff5395c6f5a4d7bca9072497f2d3c2fd09d506
    • Instruction ID: ea8ed8bd4ca2e3b8aa325ae1bf2087bfcbed0b913512696927f11f2b611fb6db
    • Opcode Fuzzy Hash: 05fd405c008b06ebbbce26b165ff5395c6f5a4d7bca9072497f2d3c2fd09d506
    • Instruction Fuzzy Hash: C741CC67720B958AEB118F91E8843E867A1FB147E8F605631DE1D07B88EF39C51AC310