Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
a.exe

Overview

General Information

Sample name:a.exe
Analysis ID:1502377
MD5:e0edce3fd9e04c946b2f79fa39b5304f
SHA1:02accb65a5defb459a922a756e8571b35fb27138
SHA256:7ec33e949fe60ae7e6c6d086d35fe594f60e6eca8fb90ff8d5e010abee80f0ed
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • a.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\a.exe" MD5: E0EDCE3FD9E04C946B2F79FA39B5304F)
    • cmd.exe (PID: 7340 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 7388 cmdline: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
    • WindowsService.exe (PID: 7408 cmdline: "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" MD5: 4032C434411DDD8F89617E6CA9BBD236)
  • WindowsService.exe (PID: 7524 cmdline: "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" MD5: 4032C434411DDD8F89617E6CA9BBD236)
  • WindowsService.exe (PID: 7720 cmdline: "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" MD5: 4032C434411DDD8F89617E6CA9BBD236)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7388, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sidebar
Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, CommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7340, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, ProcessId: 7388, ProcessName: reg.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, CommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7340, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f, ProcessId: 7388, ProcessName: reg.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: a.exeAvira: detected
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeAvira: detection malicious, Label: TR/Dropper.Gen
Source: a.exeReversingLabs: Detection: 84%
Source: a.exeVirustotal: Detection: 76%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.7% probability
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeJoe Sandbox ML: detected
Source: a.exeJoe Sandbox ML: detected
Source: a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

Operating System Destruction

barindex
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: 1D 00 00 00 Jump to behavior
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_004085D00_2_004085D0
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_004085D04_2_004085D0
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_004085D05_2_004085D0
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_004085D07_2_004085D0
Source: a.exeStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: WindowsService.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f
Source: classification engineClassification label: mal80.winEXE@11/3@0/0
Source: C:\Users\user\Desktop\a.exeFile created: C:\Users\user\AppData\Roaming\SystemWindows\Jump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7352:120:WilError_03
Source: C:\Users\user\Desktop\a.exeFile created: C:\Users\user\AppData\Local\Temp\HMIIU.txtJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" "
Source: C:\Users\user\Desktop\a.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: a.exeReversingLabs: Detection: 84%
Source: a.exeVirustotal: Detection: 76%
Source: C:\Users\user\Desktop\a.exeFile read: C:\Users\user\Desktop\a.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\a.exe "C:\Users\user\Desktop\a.exe"
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" "Jump to behavior
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /fJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: msvbvm60.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: vb6zz.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: lz32.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: msvbvm60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: vb6zz.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: msvbvm60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: vb6zz.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: msvbvm60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: vb6zz.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401BC4 push 00401100h; ret 0_2_00401BD7
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401A88 push 00401100h; ret 0_2_00401B87
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401B88 push 00401100h; ret 0_2_00401B9B
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401B9C push 00401100h; ret 0_2_00401BAF
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401BB0 push 00401100h; ret 0_2_00401BC3
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_00401BC4 push 00401100h; ret 4_2_00401BD7
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_00401A88 push 00401100h; ret 4_2_00401B87
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_00401B88 push 00401100h; ret 4_2_00401B9B
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_00401B9C push 00401100h; ret 4_2_00401BAF
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 4_2_00401BB0 push 00401100h; ret 4_2_00401BC3
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_00401BC4 push 00401100h; ret 5_2_00401BD7
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_00401A88 push 00401100h; ret 5_2_00401B87
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_00401B88 push 00401100h; ret 5_2_00401B9B
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_00401B9C push 00401100h; ret 5_2_00401BAF
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 5_2_00401BB0 push 00401100h; ret 5_2_00401BC3
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_00401BC4 push 00401100h; ret 7_2_00401BD7
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_00401A88 push 00401100h; ret 7_2_00401B87
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_00401B88 push 00401100h; ret 7_2_00401B9B
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_00401B9C push 00401100h; ret 7_2_00401BAF
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeCode function: 7_2_00401BB0 push 00401100h; ret 7_2_00401BC3
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\a.exeFile created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeJump to dropped file
Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sidebarJump to behavior
Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sidebarJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" "Jump to behavior
Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /fJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1502377 Sample: a.exe Startdate: 01/09/2024 Architecture: WINDOWS Score: 80 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Machine Learning detection for sample 2->29 31 AI detected suspicious sample 2->31 7 a.exe 5 2->7         started        10 WindowsService.exe 2->10         started        12 WindowsService.exe 2->12         started        process3 file4 23 C:\Users\user\AppData\...\WindowsService.exe, PE32 7->23 dropped 14 WindowsService.exe 7->14         started        17 cmd.exe 1 7->17         started        process5 signatures6 33 Antivirus detection for dropped file 14->33 35 Protects its processes via BreakOnTermination flag 14->35 37 Machine Learning detection for dropped file 14->37 19 conhost.exe 17->19         started        21 reg.exe 1 1 17->21         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
a.exe84%ReversingLabsWin32.Network.Stormser
a.exe77%VirustotalBrowse
a.exe100%AviraTR/Dropper.Gen
a.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe100%AviraTR/Dropper.Gen
C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502377
Start date and time:2024-09-01 02:05:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:a.exe
Detection:MAL
Classification:mal80.winEXE@11/3@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
TimeTypeDescription
01:06:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sidebar C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe
01:06:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sidebar C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe
20:06:33API Interceptor8686x Sleep call for process: WindowsService.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\a.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):157
Entropy (8bit):4.991157006528333
Encrypted:false
SSDEEP:3:ctm2KD9so3KRfyM1K7eDoKQHEXF9idJfNt+kiEaKC5SLBKSnlFmKDyn:cCtuH1j0KnidJ1wknaZ5NSL9Dy
MD5:82D0CF49CAE8B235C859B9902A2C06DE
SHA1:918917B95760D92441D9FE2C11DB22FB8D59F0F9
SHA-256:DD77EC2DB9001850233836353A84AE4695216FF46FE51670D049125122FB4060
SHA-512:0635F3EE8AA34022122DF9AB4C69500354F5A4251DF271A8F2C95CEB459BD49B88A74C14AD0A19789A88540DBC3BD6C6C48DA051BD974ECFF1ECC060834E2842
Malicious:false
Reputation:low
Preview:REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f..
Process:C:\Users\user\Desktop\a.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):157
Entropy (8bit):4.991157006528333
Encrypted:false
SSDEEP:3:ctm2KD9so3KRfyM1K7eDoKQHEXF9idJfNt+kiEaKC5SLBKSnlFmKDyn:cCtuH1j0KnidJ1wknaZ5NSL9Dy
MD5:82D0CF49CAE8B235C859B9902A2C06DE
SHA1:918917B95760D92441D9FE2C11DB22FB8D59F0F9
SHA-256:DD77EC2DB9001850233836353A84AE4695216FF46FE51670D049125122FB4060
SHA-512:0635F3EE8AA34022122DF9AB4C69500354F5A4251DF271A8F2C95CEB459BD49B88A74C14AD0A19789A88540DBC3BD6C6C48DA051BD974ECFF1ECC060834E2842
Malicious:false
Reputation:low
Preview:REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f..
Process:C:\Users\user\Desktop\a.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Category:dropped
Size (bytes):12288
Entropy (8bit):6.693797637001647
Encrypted:false
SSDEEP:192:cjUWFh4fvYGIQnsA6psQupFaNJhLkwcud2DH9VwGfctm85Ep:4KE7pAaNJawcudoD7UT5Ep
MD5:4032C434411DDD8F89617E6CA9BBD236
SHA1:E48F3E0DD0958DB386420775F352161F0CB1574A
SHA-256:375ED9FFDCB6CBFE9CC110C83016F193AE46644533A4E174135AFC8B74189771
SHA-512:10F12AF5C4BF9DFFA983237D45A3675A1CFB623BB255D3944F56AE7DAD47165629E8305DB5AEE16DEA400318ABD5C13EA561EE767D58FECA9A29EF68F3D4E512
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............i...i...i...d...i.Rich..i.................PE..L.....O.................0.......`......p........@.................................................................................................................................................................................................UPX0.....`..............................UPX1.....0...p..."..................@....rsrc................&..............@..............................................................................................................................................................................................................................................................................................................................................................................................................................................................3.08.UPX!....
File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):6.6933168676475026
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.39%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:a.exe
File size:12'288 bytes
MD5:e0edce3fd9e04c946b2f79fa39b5304f
SHA1:02accb65a5defb459a922a756e8571b35fb27138
SHA256:7ec33e949fe60ae7e6c6d086d35fe594f60e6eca8fb90ff8d5e010abee80f0ed
SHA512:07e490454514da87251723d3159fc561052fa41978e242645ec6bada3521363902ac9f753ecafccfd5bd895904bb770099324111c94d5066e7330b4931d1d790
SSDEEP:192:cjUWFh4fvYGIQnsA6psQupFaNJhLkwcud2DH9VwGfctm85Ep:4KE7pAaNJawcudoD7UT5Ep
TLSH:58423A02F69AD958D05A00360C7FBB6B0930FD1A9D51C29779C8773FACB0B547428AD3
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i...d...i.Rich..i.................PE..L......O.................0.......`.......p........@........................
Icon Hash:00869eb0b230201f
Entrypoint:0x4085d0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x4FB6CFF4 [Fri May 18 22:40:52 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:0147fa67fef26cfd754ec08cec0f1c9b
Instruction
pushad
mov esi, 00407000h
lea edi, dword ptr [esi-00006000h]
push edi
mov ebp, esp
lea ebx, dword ptr [esp-00003E80h]
xor eax, eax
push eax
cmp esp, ebx
jne 00007FEEC8C745DDh
inc esi
inc esi
push ebx
push 0000624Bh
push edi
add ebx, 04h
push ebx
push 000015BFh
push esi
add ebx, 04h
push ebx
push eax
mov dword ptr [ebx], 00020003h
nop
nop
nop
nop
nop
push ebp
push edi
push esi
push ebx
sub esp, 7Ch
mov edx, dword ptr [esp+00000090h]
mov dword ptr [esp+74h], 00000000h
mov byte ptr [esp+73h], 00000000h
mov ebp, dword ptr [esp+0000009Ch]
lea eax, dword ptr [edx+04h]
mov dword ptr [esp+78h], eax
mov eax, 00000001h
movzx ecx, byte ptr [edx+02h]
mov ebx, eax
shl ebx, cl
mov ecx, ebx
dec ecx
mov dword ptr [esp+6Ch], ecx
movzx ecx, byte ptr [edx+01h]
shl eax, cl
dec eax
mov dword ptr [esp+68h], eax
mov eax, dword ptr [esp+000000A8h]
movzx esi, byte ptr [edx]
mov dword ptr [ebp+00h], 00000000h
mov dword ptr [esp+60h], 00000000h
mov dword ptr [eax], 00000000h
mov eax, 00000300h
mov dword ptr [esp+64h], esi
mov dword ptr [esp+5Ch], 00000001h
mov dword ptr [esp+58h], 00000001h
mov dword ptr [esp+54h], 00000001h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xa91c0xd4.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x91c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x60000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x70000x30000x22001326fc72234318859998744648719a81False0.8654641544117647ARC archive data, packed7.612433281156182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xa0000x10000xa00f98418cc68cfb1ba4e9b82291bc87f71False0.334765625data3.2925594508971887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xa19c0x130Device independent bitmap graphic, 32 x 64 x 1, image size 2560.3223684210526316
RT_ICON0xa2d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.19623655913978494
RT_ICON0xa5bc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.4155405405405405
RT_GROUP_ICON0xa6e80x30data1.0
RT_VERSION0xa71c0x1c0ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970EnglishUnited States0.515625
RT_DLGINCLUDE0xa8e00x3aASCII text, with no line terminatorsIcelandicIceland1.0344827586206897
DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
MSVBVM60.DLL
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
IcelandicIceland
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:20:05:56
Start date:31/08/2024
Path:C:\Users\user\Desktop\a.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\a.exe"
Imagebase:0x400000
File size:12'288 bytes
MD5 hash:E0EDCE3FD9E04C946B2F79FA39B5304F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:20:05:58
Start date:31/08/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HMIIU.bat" "
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:20:05:58
Start date:31/08/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:20:05:59
Start date:31/08/2024
Path:C:\Windows\SysWOW64\reg.exe
Wow64 process (32bit):true
Commandline:REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe" /f
Imagebase:0xc20000
File size:59'392 bytes
MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:20:05:59
Start date:31/08/2024
Path:C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Imagebase:0x400000
File size:12'288 bytes
MD5 hash:4032C434411DDD8F89617E6CA9BBD236
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 100%, Avira
  • Detection: 100%, Joe Sandbox ML
Reputation:low
Has exited:false

Target ID:5
Start time:20:06:11
Start date:31/08/2024
Path:C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Imagebase:0x400000
File size:12'288 bytes
MD5 hash:4032C434411DDD8F89617E6CA9BBD236
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:7
Start time:20:06:19
Start date:31/08/2024
Path:C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Roaming\SystemWindows\WindowsService.exe"
Imagebase:0x400000
File size:12'288 bytes
MD5 hash:4032C434411DDD8F89617E6CA9BBD236
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:10.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:100%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 243 4085d0 246 4085e8 VirtualProtect 243->246 245 409163 246->245

    Callgraph

    APIs
    • VirtualProtect.KERNELBASE(-00001000,00001000,00000004,?,?), ref: 0040914C
    Memory Dump Source
    • Source File: 00000000.00000002.2886376251.0000000000408000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2886295489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2886322814.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2886322814.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2886405716.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_a.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction ID: 7fa7114706af32a9d15a2751710b5d49929102afd5688ca3cfc588c82bd24a88
    • Opcode Fuzzy Hash: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction Fuzzy Hash: 9772AA316083558FD324CF28C9802AABBE1FF86344F154A3EE9E59B391E735D949CB46

    Execution Graph

    Execution Coverage:10.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 247 4085d0 250 4085e8 VirtualProtect 247->250 249 409163 250->249

    Callgraph

    APIs
    • VirtualProtect.KERNELBASE(-00001000,00001000,00000004,?,?), ref: 0040914C
    Memory Dump Source
    • Source File: 00000004.00000002.2886377364.0000000000408000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.2886293550.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000004.00000002.2886321531.0000000000401000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000004.00000002.2886321531.0000000000407000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000004.00000002.2886406705.000000000040A000.00000004.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_WindowsService.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction ID: 7fa7114706af32a9d15a2751710b5d49929102afd5688ca3cfc588c82bd24a88
    • Opcode Fuzzy Hash: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction Fuzzy Hash: 9772AA316083558FD324CF28C9802AABBE1FF86344F154A3EE9E59B391E735D949CB46

    Execution Graph

    Execution Coverage:10.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 246 4085d0 249 4085e8 VirtualProtect VirtualProtect 246->249 248 409169 248->248 249->248

    Callgraph

    APIs
    • VirtualProtect.KERNELBASE(-00001000,00001000,00000004,?,?), ref: 0040914C
    • VirtualProtect.KERNELBASE(-00001000,00001000), ref: 00409161
    Memory Dump Source
    • Source File: 00000005.00000002.2886378509.0000000000408000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000005.00000002.2886299852.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000005.00000002.2886322126.0000000000401000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000005.00000002.2886322126.0000000000407000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000005.00000002.2886410786.000000000040A000.00000004.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_400000_WindowsService.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction ID: 7fa7114706af32a9d15a2751710b5d49929102afd5688ca3cfc588c82bd24a88
    • Opcode Fuzzy Hash: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction Fuzzy Hash: 9772AA316083558FD324CF28C9802AABBE1FF86344F154A3EE9E59B391E735D949CB46

    Execution Graph

    Execution Coverage:10.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 246 4085d0 249 4085e8 VirtualProtect VirtualProtect 246->249 248 409169 248->248 249->248

    Callgraph

    APIs
    • VirtualProtect.KERNELBASE(-00001000,00001000,00000004,?,?), ref: 0040914C
    • VirtualProtect.KERNELBASE(-00001000,00001000), ref: 00409161
    Memory Dump Source
    • Source File: 00000007.00000002.2886397735.0000000000408000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000007.00000002.2886303825.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000007.00000002.2886323436.0000000000401000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000007.00000002.2886323436.0000000000407000.00000040.00000001.01000000.00000007.sdmpDownload File
    • Associated: 00000007.00000002.2886427399.000000000040A000.00000004.00000001.01000000.00000007.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_7_2_400000_WindowsService.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction ID: 7fa7114706af32a9d15a2751710b5d49929102afd5688ca3cfc588c82bd24a88
    • Opcode Fuzzy Hash: 7ac0b3df68bfdc693617899d0a66d8c8eb529f87ba3287e5bc0c11c027909f58
    • Instruction Fuzzy Hash: 9772AA316083558FD324CF28C9802AABBE1FF86344F154A3EE9E59B391E735D949CB46