Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe
Analysis ID:1502252
MD5:6261ee4279a2f896625ca965ad014fb7
SHA1:0bbd43aed75d13993e364cd7e26393d2b4fefb50
SHA256:5b36923b5ab87c82b33614790f2ab2add6b8675ebd27ba278f1eaf2499848cdd
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Entry point lies outside standard sections
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe (PID: 6724 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe" MD5: 6261EE4279A2F896625CA965AD014FB7)
    • conhost.exe (PID: 6792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5500 cmdline: C:\Windows\system32\cmd.exe /c net start w32time MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • net.exe (PID: 1440 cmdline: net start w32time MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
        • net1.exe (PID: 888 cmdline: C:\Windows\system32\net1 start w32time MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
    • cmd.exe (PID: 5344 cmdline: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • w32tm.exe (PID: 6092 cmdline: w32tm /resync /nowait MD5: 81A82132737224D324A3E8DA993E2FB5)
    • cmd.exe (PID: 1816 cmdline: C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5312 cmdline: taskkill /IM RainbowSix.exe /f MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4092 cmdline: C:\Windows\system32\cmd.exe /c ipconfig /flushdns MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • ipconfig.exe (PID: 3468 cmdline: ipconfig /flushdns MD5: 62F170FB07FDBB79CEB7147101406EB8)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, CommandLine: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, ParentProcessId: 6724, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, ProcessId: 5344, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, CommandLine: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, ParentProcessId: 6724, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c w32tm /resync /nowait, ProcessId: 5344, ProcessName: cmd.exe
Source: Process startedAuthor: E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community: Data: Command: net start w32time, CommandLine: net start w32time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c net start w32time, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5500, ParentProcessName: cmd.exe, ProcessCommandLine: net start w32time, ProcessId: 1440, ProcessName: net.exe
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net start w32time, CommandLine: net start w32time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c net start w32time, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5500, ParentProcessName: cmd.exe, ProcessCommandLine: net start w32time, ProcessId: 1440, ProcessName: net.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: net start w32time, CommandLine: net start w32time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c net start w32time, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5500, ParentProcessName: cmd.exe, ProcessCommandLine: net start w32time, ProcessId: 1440, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeReversingLabs: Detection: 63%
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeVirustotal: Detection: 70%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.klar.ac
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontello.com
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontello.comhttp://fontello.com
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.dearimgui.org/faq/
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.dearimgui.org/faq/Set
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://discord.gg/klargg
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fontawesome.com
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: .vmp0 and .vmp1 section names
Source: classification engineClassification label: mal76.evad.winEXE@20/1@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeFile created: C:\Users\user\Desktop\userJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6792:120:WilError_03
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "RainbowSix.exe")
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeReversingLabs: Detection: 63%
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeVirustotal: Detection: 70%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c net start w32time
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start w32time
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start w32time
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c w32tm /resync /nowait
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /resync /nowait
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM RainbowSix.exe /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig /flushdns
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /flushdns
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c net start w32timeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c w32tm /resync /nowaitJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /fJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig /flushdnsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start w32timeJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start w32timeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /resync /nowaitJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM RainbowSix.exe /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /flushdnsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: xinput1_4.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic file information: File size 5141504 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x4e6c00
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeStatic PE information: section name: .vmp1

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /flushdns
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71F501DC8 second address: 7FF71F4B6BBB instructions: 0x00000000 rdtsc 0x00000002 bsr edx, edx 0x00000005 inc ecx 0x00000006 xor bh, cl 0x00000008 inc ax 0x0000000b rcr ah, FFFFFFAEh 0x0000000e mov edx, ebp 0x00000010 inc eax 0x00000011 neg bh 0x00000013 inc eax 0x00000014 not bh 0x00000016 inc eax 0x00000017 neg bh 0x00000019 inc eax 0x0000001a rol bh, 1 0x0000001c shld dx, cx, 000000F5h 0x00000021 dec ecx 0x00000022 arpl si, ax 0x00000024 jmp 00007FE7A8B93337h 0x00000029 inc eax 0x0000002a sub bh, FFFFFF92h 0x0000002d inc eax 0x0000002e xor bh, FFFFFFE4h 0x00000031 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71F531A20 second address: 7FF71F531A28 instructions: 0x00000000 rdtsc 0x00000002 inc eax 0x00000003 inc bh 0x00000005 inc ecx 0x00000006 sbb dl, cl 0x00000008 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EFE812B second address: 7FF71EFE8137 instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, ax 0x00000005 inc bp 0x00000007 movzx ebp, ch 0x0000000a inc ecx 0x0000000b pop ebp 0x0000000c rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EF8C8DB second address: 7FF71EF8C8E3 instructions: 0x00000000 rdtsc 0x00000002 inc eax 0x00000003 inc bh 0x00000005 inc ecx 0x00000006 sbb dl, cl 0x00000008 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EFF0208 second address: 7FF71EFCFBE6 instructions: 0x00000000 rdtsc 0x00000002 bsr edx, edx 0x00000005 inc ecx 0x00000006 xor bh, cl 0x00000008 inc ax 0x0000000b rcr ah, FFFFFFAEh 0x0000000e mov edx, ebp 0x00000010 inc eax 0x00000011 neg bh 0x00000013 inc eax 0x00000014 not bh 0x00000016 inc eax 0x00000017 neg bh 0x00000019 inc eax 0x0000001a rol bh, 1 0x0000001c shld dx, cx, 000000F5h 0x00000021 dec ecx 0x00000022 arpl si, ax 0x00000024 jmp 00007FE7A8BBDF22h 0x00000029 inc eax 0x0000002a sub bh, FFFFFF92h 0x0000002d inc eax 0x0000002e xor bh, FFFFFFE4h 0x00000031 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EF5C71D second address: 7FF71EF5C751 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 movzx ebx, cx 0x00000008 shr bx, cl 0x0000000b inc eax 0x0000000c sbb bh, 00000065h 0x0000000f inc ecx 0x00000010 pop ebx 0x00000011 sar si, 002Ch 0x00000015 pop edi 0x00000016 stc 0x00000017 dec ecx 0x00000018 rcl ecx, 49h 0x0000001b inc ecx 0x0000001c pop esi 0x0000001d pop ebx 0x0000001e lahf 0x0000001f dec eax 0x00000020 movsx esi, ax 0x00000023 dec ebp 0x00000024 arpl si, ax 0x00000026 pop ebp 0x00000027 pop esi 0x00000028 dec ah 0x0000002a inc ecx 0x0000002b pop ebp 0x0000002c inc bp 0x0000002e xchg eax, eax 0x00000030 inc ecx 0x00000031 test ah, ah 0x00000033 pop ecx 0x00000034 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71F04E2C6 second address: 7FF71F04E2ED instructions: 0x00000000 rdtsc 0x00000002 dec ecx 0x00000003 movsx edi, di 0x00000006 dec eax 0x00000007 cwde 0x00000008 inc ecx 0x00000009 pop ebx 0x0000000a cbw 0x0000000c inc ax 0x0000000e movsx edx, dh 0x00000011 inc ecx 0x00000012 pop eax 0x00000013 inc ebp 0x00000014 movzx edx, cx 0x00000017 pop esi 0x00000018 inc ecx 0x00000019 movzx ecx, ax 0x0000001c inc ecx 0x0000001d pop edi 0x0000001e cwd 0x00000020 pop ebp 0x00000021 inc cx 0x00000023 cmovnp eax, esi 0x00000026 pop ebx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71F02992D second address: 7FF71F029933 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebp 0x00000004 xchg edi, ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EFDF337 second address: 7FF71EFDF34E instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 inc cx 0x00000005 btc ebp, esp 0x00000008 popfd 0x00000009 inc cx 0x0000000b mov edx, CF8B3D13h 0x00000010 dec eax 0x00000011 cdq 0x00000012 pop ebp 0x00000013 dec esp 0x00000014 movsx ebp, bx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EFDF34E second address: 7FF71EFDF361 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 dec esp 0x00000005 arpl di, cx 0x00000007 inc esp 0x00000008 mov dl, dl 0x0000000a inc ecx 0x0000000b pop edi 0x0000000c inc ecx 0x0000000d pop ebx 0x0000000e inc ecx 0x0000000f xchg cl, cl 0x00000011 inc ecx 0x00000012 pop ebp 0x00000013 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71EFA7347 second address: 7FF71EFA736F instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 movsx ecx, bx 0x00000006 inc ecx 0x00000007 pop edi 0x00000008 inc bp 0x0000000a movzx esp, bh 0x0000000d dec ebp 0x0000000e movsx esp, dx 0x00000011 cwde 0x00000012 pop ebp 0x00000013 cbw 0x00000015 dec eax 0x00000016 movsx eax, cx 0x00000019 cdq 0x0000001a pop ebx 0x0000001b inc cx 0x0000001d movzx eax, dl 0x00000020 cwd 0x00000022 cmovs dx, dx 0x00000026 inc ecx 0x00000027 pop esp 0x00000028 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeRDTSC instruction interceptor: First address: 7FF71F034B74 second address: 7FF71F034B93 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebx 0x00000004 inc bp 0x00000006 movzx edi, ch 0x00000009 inc ecx 0x0000000a shl edx, cl 0x0000000c pop edi 0x0000000d inc cx 0x0000000f sal edx, FFFFFF85h 0x00000012 add al, 18h 0x00000014 dec ecx 0x00000015 movzx ebx, dx 0x00000018 inc ecx 0x00000019 pop edi 0x0000001a pop esi 0x0000001b shl dh, cl 0x0000001d inc ecx 0x0000001e pop esi 0x0000001f rdtsc
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1691201137.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1652945810.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1649068596.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1698772115.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2876172761.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1695411338.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1645499302.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1654829652.000001AB34D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c net start w32timeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c w32tm /resync /nowaitJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /fJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig /flushdnsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start w32timeJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start w32timeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /resync /nowaitJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM RainbowSix.exe /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /flushdnsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM RainbowSix.exe /fJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502252 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 31/08/2024 Architecture: WINDOWS Score: 76 32 api.klar.ac 2->32 34 ac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.com 2->34 38 Multi AV Scanner detection for submitted file 2->38 40 Detected VMProtect packer 2->40 42 Machine Learning detection for sample 2->42 44 3 other signatures 2->44 9 SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe 2 2->9         started        signatures3 process4 dnsIp5 36 ac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.com 172.65.154.135, 25565, 49730 CLOUDFLARENETUS United States 9->36 46 Tries to detect virtualization through RDTSC time measurements 9->46 13 cmd.exe 1 9->13         started        16 cmd.exe 1 9->16         started        18 cmd.exe 1 9->18         started        20 2 other processes 9->20 signatures6 process7 signatures8 48 Uses ipconfig to lookup or modify the Windows network settings 13->48 22 net.exe 1 13->22         started        24 taskkill.exe 1 16->24         started        26 ipconfig.exe 1 18->26         started        28 w32tm.exe 1 20->28         started        process9 process10 30 net1.exe 1 22->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe63%ReversingLabsWin64.Trojan.SpyLoader
SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe71%VirustotalBrowse
SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
api.klar.ac0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://fontawesome.com0%URL Reputationsafe
https://fontawesome.com0%URL Reputationsafe
http://fontello.com0%URL Reputationsafe
https://discord.gg/klargg0%Avira URL Cloudsafe
https://fontawesome.comhttps://fontawesome.comFont0%Avira URL Cloudsafe
http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
http://fontello.comhttp://fontello.com0%Avira URL Cloudsafe
http://www.dearimgui.org/faq/0%Avira URL Cloudsafe
http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
http://www.dearimgui.org/faq/0%VirustotalBrowse
http://www.dearimgui.org/faq/Set0%VirustotalBrowse
http://www.dearimgui.org/faq/Set0%Avira URL Cloudsafe
https://discord.gg/klargg0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
ac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.com
172.65.154.135
truefalse
    unknown
    api.klar.ac
    unknown
    unknownfalseunknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://fontawesome.comSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.dearimgui.org/faq/SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://discord.gg/klarggSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://fontawesome.comhttps://fontawesome.comFontSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1790778681.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1696250635.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1700904553.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000003.1702750336.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875229910.000001AB2FBBC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://fontello.comhttp://fontello.comSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.dearimgui.org/faq/SetSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2880591079.00007FF71EC6E000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://fontello.comSecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, 00000000.00000002.2875777584.000001AB34810000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    172.65.154.135
    ac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.comUnited States
    13335CLOUDFLARENETUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1502252
    Start date and time:2024-08-31 20:22:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 39s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:16
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe
    Detection:MAL
    Classification:mal76.evad.winEXE@20/1@1/1
    EGA Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe, PID 6724 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    file.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    file.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    OmnqazpM3P.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
    • 162.159.134.233
    file.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    file.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    play.exeGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    BankPaymAdviceVend.Report.docxGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    file.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe
    File Type:PNG image data, 7500 x 7500, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):1482070
    Entropy (8bit):5.950769889559477
    Encrypted:false
    SSDEEP:12288:7iHPj/jx/b1Zgj9yLJ4/eFhmU45tcm5Ftj:Ipb1Zfd4gk5tr5Fh
    MD5:8BEB4B0676D3C064750BE6EDAD0764BA
    SHA1:020D2082F15556B277D2DF90098F619570E5E053
    SHA-256:C63799634E85F95F9B6160F64557AE171F79F67305CBFBAF8B6F4218CF1201EC
    SHA-512:DC28C8F1AE8C9A4FC2FA9E61E533A7367D0E4485ED1C0BBE9C9D64B7A14502F3D2E727906D2EFD6F30C067F273217C45C63256DED91BE9A56180DC3BC874733F
    Malicious:false
    Reputation:low
    Preview:.PNG........IHDR...L...L.......%... .IDATx^..1.. ..A.@../..4l9/....;.>w8.... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @........S05P4A....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....L..... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @......d.....!.... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @......S....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @......`jFi....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....T?@....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @.......
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):7.873454706600173
    TrID:
    • Win64 Executable Console (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe
    File size:5'141'504 bytes
    MD5:6261ee4279a2f896625ca965ad014fb7
    SHA1:0bbd43aed75d13993e364cd7e26393d2b4fefb50
    SHA256:5b36923b5ab87c82b33614790f2ab2add6b8675ebd27ba278f1eaf2499848cdd
    SHA512:40d39aa83b603ec5b9b2260d9976663decdf49799e6387b7f4a557e6e5662e5246b75ec97507af4c117cd6aafbd9ebb332f705961e50fd68830df19dd9bbd3f8
    SSDEEP:98304:LpYNjKbwFkPieT0hzXDIIOsA6hwINfiNBrOlxhFzF+FVhylLDX3P2YO:LpZbwFkPieWDPHhJNfuMlxP4FVhyxL3
    TLSH:903612BE5284335CC01EC4749436BC45F1FA152E4AE9D6AEB6DBB7C037AE424E502B4B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...s[{f.........."....'.....&!.....|.g........@..........................................`................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x14067d97c
    Entrypoint Section:.vmp1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x667B5B73 [Wed Jun 26 00:06:11 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:f8ad335fffe558ce43b830b90a0acee2
    Instruction
    push 513EDA4Fh
    call 00007FE7A8EAEB01h
    ficom dword ptr [ebx+ecx+0Bh]
    arpl word ptr [eax-7202C523h], di
    test byte ptr [esi], 00000076h
    cld
    xchg eax, ebp
    test dword ptr [eax+05h], esi
    add esi, dword ptr [ebp+03C3D5ADh]
    fxch4 st(5)
    jnle 00007FE7A8C30E6Eh
    cld
    popad
    sub bh, byte ptr [ebx+57h]
    add al, 4Fh
    jnle 00007FE7A8C30E74h
    pop ds
    cld
    stc
    fiadd dword ptr [esi-76h]
    cld
    int1
    mov ecx, 37FC1FB5h
    out dx, eax
    aas
    sbb edi, esp
    xchg eax, esp
    sub al, 35h
    scasb
    sti
    push esi
    xchg byte ptr [edi+eax*8], bh
    add al, byte ptr [eax]
    adc bh, ah
    mov eax, dword ptr [ebx]
    and edx, dword ptr [ecx-4C9F0308h]
    xor al, 3Eh
    cld
    rcr byte ptr [ebx-62h], 1
    mov eax, dword ptr [9A24C403h]
    stosb
    sti
    sal dword ptr [ecx], FFFFFF83h
    loop 00007FE7A8C30E15h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x672ce00x244.vmp1
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x9eb0000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9dffc00x9b34.vmp1
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x9ea0000xc0.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x5150280x58.vmp1
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9dfe800x140.vmp1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x6c50000xcb0.vmp1
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xec56f0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xee0000x1fc0760x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x2eb0000xc4800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x2f80000x96c00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .vmp00x3020000x2008ca0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .vmp10x5030000x4e6af40x4e6c0043efe1d7e0ec3d510bd9e5365d382232unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0x9ea0000xc00x2005af05468740c02f7086efd47fd5c1d4eFalse0.330078125GLS_BINARY_LSB_FIRST1.9573758939436507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x9eb0000x1e00x20064973e4011b315df1bd3e01f63e5a7beFalse0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x9eb0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
    DLLImport
    ntdll.dllRtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind, NtGetContextThread, NtResumeThread, NtTerminateProcess, NtUnmapViewOfSection, NtWriteVirtualMemory, NtSetContextThread, NtClose, NtReadVirtualMemory, VerSetConditionMask
    KERNEL32.dllGetUserDefaultUILanguage, GetTempPathW, K32GetProcessImageFileNameW, OpenProcess, ProcessIdToSessionId, GetLastError, CreateFileA, GetCurrentThread, LoadLibraryW, K32EnumProcesses, VirtualAllocEx, WTSGetActiveConsoleSessionId, CreateProcessW, AcquireSRWLockExclusive, AreFileApisANSI, SetFileTime, SetFileInformationByHandle, SetFileAttributesW, GetFullPathNameW, GetFinalPathNameByHandleW, GetFileInformationByHandle, GetFileAttributesExW, GetFileAttributesW, GetDiskFreeSpaceExW, FindNextFileW, FindFirstFileExW, FindFirstFileW, FindClose, CreateFileW, CreateDirectoryW, GetCurrentDirectoryW, SetCurrentDirectoryW, GetLocaleInfoEx, FormatMessageA, LocalFree, WakeAllConditionVariable, SleepConditionVariableSRW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeSListHead, VirtualAlloc, GetCurrentProcess, GetModuleFileNameW, VirtualFree, GetConsoleWindow, Sleep, QueryPerformanceCounter, FreeLibrary, GetProcAddress, QueryPerformanceFrequency, LoadLibraryA, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GlobalAlloc, MultiByteToWideChar, CreateProcessA, CloseHandle, GetModuleHandleA, GetCurrentThreadId, GetModuleFileNameA, DeviceIoControl, GetModuleHandleW, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, ReleaseSRWLockExclusive
    USER32.dllTranslateMessage, MessageBoxA, GetDesktopWindow, RegisterClassExW, MessageBoxW, DefWindowProcW, GetWindowRect, CreateWindowExW, UpdateWindow, SetLayeredWindowAttributes, ShowWindow, GetDC, PeekMessageW, GetClipboardData, MonitorFromWindow, ScreenToClient, GetActiveWindow, GetCapture, ClientToScreen, IsChild, TrackMouseEvent, LoadCursorW, SetCapture, DispatchMessageW, SetCursor, GetClientRect, SetProcessDPIAware, ReleaseCapture, SetCursorPos, ReleaseDC, GetCursorPos, OpenClipboard, CloseClipboard, EmptyClipboard, UnregisterClassW, SetClipboardData
    GDI32.dllGetDeviceCaps, CreateRectRgn, DeleteObject
    ADVAPI32.dllLsaOpenPolicy, RegOpenKeyExA, LookupPrivilegeValueW, AdjustTokenPrivileges, RevertToSelf, PrivilegeCheck, LookupPrivilegeValueA, ImpersonateSelf, IsValidSid, OpenProcessToken, CreateProcessAsUserW, RegSetValueExA, GetUserNameW, LsaAddAccountRights, DuplicateTokenEx, LsaClose, OpenThreadToken, LookupAccountNameW, GetUserNameA, RegCloseKey, RegQueryValueExA
    MSVCP140.dll?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Xout_of_range@std@@YAXPEBD@Z, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??Bios_base@std@@QEBA_NXZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, _Mbrtowc, ?_Throw_Cpp_error@std@@YAXH@Z, ?_Xbad_alloc@std@@YAXXZ, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, _Cnd_do_broadcast_at_thread_exit, _Thrd_detach, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?good@ios_base@std@@QEBA_NXZ, ?_W_Getmonths@_Locinfo@std@@QEBAPEBGXZ, ?_W_Getdays@_Locinfo@std@@QEBAPEBGXZ, ?_Getmonths@_Locinfo@std@@QEBAPEBDXZ, ?_Getdays@_Locinfo@std@@QEBAPEBDXZ, ?_Getcvt@_Locinfo@std@@QEBA?AU_Cvtvec@@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?pbase@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ??0?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAA@XZ, ??0?$basic_ios@_WU?$char_traits@_W@std@@@std@@IEAA@XZ, ??0?$basic_iostream@_WU?$char_traits@_W@std@@@std@@QEAA@PEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ?setp@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAXPEA_W0@Z, ?eback@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ?gptr@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ?pptr@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ?egptr@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ?gbump@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAXH@Z, ?setg@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAXPEA_W00@Z, ?epptr@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEBAPEA_WXZ, ?setp@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAXPEA_W00@Z, ?_Pninc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAPEA_WXZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAGXZ, ?xsgetn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEA_W_J@Z, ?xsputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEB_W_J@Z, ?setbuf@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAPEAV12@PEA_W_J@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?imbue@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??1?$basic_iostream@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ??7ios_base@std@@QEBA_NXZ, ?sync@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAHXZ
    USERENV.dllDestroyEnvironmentBlock, CreateEnvironmentBlock
    SHLWAPI.dllStrRChrW, PathRemoveFileSpecA
    IMM32.dllImmGetContext, ImmSetCompositionWindow, ImmReleaseContext
    D3DCOMPILER_47.dllD3DCompile
    dwmapi.dllDwmGetColorizationColor, DwmExtendFrameIntoClientArea, DwmIsCompositionEnabled, DwmEnableBlurBehindWindow
    d3d11.dllD3D11CreateDeviceAndSwapChain
    WS2_32.dllWSAStartup, connect
    VCRUNTIME140_1.dll__CxxFrameHandler4
    VCRUNTIME140.dllmemcmp, memchr, memcpy, __std_exception_destroy, __std_exception_copy, __std_terminate, strstr, strchr, __current_exception, __current_exception_context, __C_specific_handler, _CxxThrowException, memset, __std_type_info_destroy_list, memmove
    api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_exe, _set_app_type, _crt_at_quick_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, system, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _execute_onexit_table, _beginthreadex, terminate, exit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _seh_filter_dll, abort, _cexit, _invalid_parameter_noinfo_noreturn
    api-ms-win-crt-stdio-l1-1-0.dllfflush, fopen_s, ferror, fputc, __stdio_common_vfprintf, __p__commode, fclose, __stdio_common_vsscanf, __stdio_common_vsprintf, _wfopen, fgetc, fseek, __acrt_iob_func, _set_fmode, ftell, _get_stream_buffer_pointers, __stdio_common_vswprintf, _fseeki64, fread, fsetpos, ungetc, _popen, setvbuf, fgetpos, fwrite, fgets, feof
    api-ms-win-crt-time-l1-1-0.dll_difftime64, _time64
    api-ms-win-crt-filesystem-l1-1-0.dllremove, _lock_file, _unlock_file
    api-ms-win-crt-convert-l1-1-0.dllatof, strtol
    api-ms-win-crt-environment-l1-1-0.dllgetenv
    api-ms-win-crt-heap-l1-1-0.dll_callnewh, malloc, realloc, _set_new_mode, calloc, free
    api-ms-win-crt-string-l1-1-0.dll_wcsicmp, wcscpy_s, strncmp, strcmp, strncpy, toupper
    api-ms-win-crt-utility-l1-1-0.dllsrand, qsort, rand
    api-ms-win-crt-math-l1-1-0.dllatan2f, acosf, ceilf, ldexp, sqrtf, sinf, powf, pow, logf, log, cosf, floorf, fmodf, __setusermatherr
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
    USER32.dllGetProcessWindowStation, GetUserObjectInformationW
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 20:22:57.297297955 CEST4973025565192.168.2.4172.65.154.135
    Aug 31, 2024 20:22:57.302365065 CEST2556549730172.65.154.135192.168.2.4
    Aug 31, 2024 20:22:57.302736044 CEST4973025565192.168.2.4172.65.154.135
    Aug 31, 2024 20:22:57.464103937 CEST4973025565192.168.2.4172.65.154.135
    Aug 31, 2024 20:22:57.771570921 CEST4973025565192.168.2.4172.65.154.135
    Aug 31, 2024 20:22:57.834453106 CEST2556549730172.65.154.135192.168.2.4
    Aug 31, 2024 20:22:57.834469080 CEST2556549730172.65.154.135192.168.2.4
    Aug 31, 2024 20:22:58.047326088 CEST2556549730172.65.154.135192.168.2.4
    Aug 31, 2024 20:22:58.103789091 CEST4973025565192.168.2.4172.65.154.135
    Aug 31, 2024 20:22:58.138348103 CEST2556549730172.65.154.135192.168.2.4
    Aug 31, 2024 20:22:58.193453074 CEST4973025565192.168.2.4172.65.154.135
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 20:22:57.153652906 CEST5028953192.168.2.41.1.1.1
    Aug 31, 2024 20:22:57.286689997 CEST53502891.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 31, 2024 20:22:57.153652906 CEST192.168.2.41.1.1.10xca9Standard query (0)api.klar.acA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 31, 2024 20:22:57.286689997 CEST1.1.1.1192.168.2.40xca9No error (0)api.klar.acac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.comCNAME (Canonical name)IN (0x0001)false
    Aug 31, 2024 20:22:57.286689997 CEST1.1.1.1192.168.2.40xca9No error (0)ac86eaa6fe0c4cb58393b3297e524ca9.pacloudflare.com172.65.154.135A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:14:22:55
    Start date:31/08/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.30136.14956.exe"
    Imagebase:0x7ff71eb80000
    File size:5'141'504 bytes
    MD5 hash:6261EE4279A2F896625CA965AD014FB7
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:14:22:55
    Start date:31/08/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:14:22:55
    Start date:31/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\cmd.exe /c net start w32time
    Imagebase:0x7ff7fecf0000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:14:22:55
    Start date:31/08/2024
    Path:C:\Windows\System32\net.exe
    Wow64 process (32bit):false
    Commandline:net start w32time
    Imagebase:0x7ff6b70f0000
    File size:59'904 bytes
    MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:14:22:55
    Start date:31/08/2024
    Path:C:\Windows\System32\net1.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\net1 start w32time
    Imagebase:0x7ff66e000000
    File size:183'808 bytes
    MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:5
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\cmd.exe /c w32tm /resync /nowait
    Imagebase:0x7ff7fecf0000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\w32tm.exe
    Wow64 process (32bit):false
    Commandline:w32tm /resync /nowait
    Imagebase:0x7ff685e80000
    File size:108'032 bytes
    MD5 hash:81A82132737224D324A3E8DA993E2FB5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:7
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f
    Imagebase:0x7ff7fecf0000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\taskkill.exe
    Wow64 process (32bit):false
    Commandline:taskkill /IM RainbowSix.exe /f
    Imagebase:0x7ff6325b0000
    File size:101'376 bytes
    MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:9
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\cmd.exe /c ipconfig /flushdns
    Imagebase:0x7ff7fecf0000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:14:22:56
    Start date:31/08/2024
    Path:C:\Windows\System32\ipconfig.exe
    Wow64 process (32bit):false
    Commandline:ipconfig /flushdns
    Imagebase:0x7ff622820000
    File size:35'840 bytes
    MD5 hash:62F170FB07FDBB79CEB7147101406EB8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    No disassembly