Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Analysis ID:1520348
MD5:6d362753dce141d1177ce73b14fa572d
SHA1:574fc684ce0c09b50ca5e6e603d2dae72d3fa0af
SHA256:dc4bcfa9aaf97ad72e0360b8e7a4b17392482f8b1f9ae597c3670c9cb3215660
Tags:exe

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality for execution timing, often used to detect debuggers
Detected potential crypto function
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeAvira: detected
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.3% probability
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

System Summary

barindex
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046714A0_2_0046714A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046712C0_2_0046712C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046713B0_2_0046713B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467D660_2_00467D66
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467D740_2_00467D74
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467D940_2_00467D94
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe, 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameText_CTreeBT_Demo.EXEN vs SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe, 00000000.00000000.1512319311.0000000000539000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameText_CTreeBT_Demo.EXEN vs SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeBinary or memory string: OriginalFilenameText_CTreeBT_Demo.EXEN vs SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal72.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeReversingLabs: Detection: 42%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: mfc100.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: msvcp100.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeSection loaded: msvcr100.dllJump to behavior
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic file information: File size 1076736 > 1048576
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .sedata
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: section name: .sedata
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: section name: .sedata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00474844 push dword ptr [esp+04h]; retn 0008h0_2_004748C6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00476875 push dword ptr [esp+08h]; retn 000Ch0_2_004768C9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00476870 push dword ptr [esp+08h]; retn 000Ch0_2_004768C9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0045D000 push ecx; mov dword ptr [esp], ebx0_2_0045D01B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0047489C push dword ptr [esp+04h]; retn 0008h0_2_004748C6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0047214F push 0000006Ah; retf 0_2_00472228
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00475158 push dword ptr [esp+08h]; retn 000Ch0_2_0047520C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0047B96E push dword ptr [esp+2Ch]; retn 0030h0_2_0047B945
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0047B91B push dword ptr [esp+2Ch]; retn 0030h0_2_0047B945
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0049C92B pushfd ; mov dword ptr [esp], eax0_2_0049C48B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0047B93D push dword ptr [esp+2Ch]; retn 0030h0_2_0047B945
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004749C5 push dword ptr [esp+20h]; retn 0024h0_2_00474A57
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046B1C8 push ecx; iretd 0_2_00486190
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004679DC push dword ptr [esp+40h]; retn 0044h0_2_00467A69
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004841F2 push word ptr [esp+02h]; mov dword ptr [esp], ebp0_2_004841FE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004721B7 push 0000006Ah; retf 0_2_00472228
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004721B9 push 0000006Ah; retf 0_2_00472228
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00468A5A push ebp; mov dword ptr [esp], ecx0_2_004B2A7E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00468A5A push ebp; mov dword ptr [esp], ecx0_2_004B2A7E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00474A65 push dword ptr [esp+20h]; retn 0024h0_2_00474A57
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00484270 push dword ptr [esp+02h]; mov dword ptr [esp], ebp0_2_0048429F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046B20E push ecx; iretd 0_2_00486190
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467A30 push dword ptr [esp+40h]; retn 0044h0_2_00467A69
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00476A38 push dword ptr [esp+10h]; retn 0014h0_2_00476A6D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0048429A push word ptr [esp+02h]; mov dword ptr [esp], ebp0_2_0048429F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00474B0F push dword ptr [esp+18h]; retn 001Ch0_2_00474B69
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004763EF push dword ptr [esp]; retn 0004h0_2_0047647B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467BFD push edi; mov dword ptr [esp], esi0_2_00467C1C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00467BFD push edi; mov dword ptr [esp], esi0_2_00467C1C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046FC3C pushad ; mov dword ptr [esp], esi0_2_0046FE6D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_0046A4C2 push cs; ret 0_2_0046A4C4
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: section name: .text entropy: 7.998737130003935
Source: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeStatic PE information: section name: .sedata entropy: 7.6820869028084315

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_00536C11 0_2_00536C11
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004CA860 rdtsc 0_2_004CA860
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exeCode function: 0_2_004CA860 rdtsc 0_2_004CA860
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
2
Software Packing
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe42%ReversingLabs
SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe100%AviraHEUR/AGEN.1353483
SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1520348
Start date and time:2024-09-27 08:33:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Detection:MAL
Classification:mal72.evad.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 9
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe, PID 2564 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.74681427100991
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
File size:1'076'736 bytes
MD5:6d362753dce141d1177ce73b14fa572d
SHA1:574fc684ce0c09b50ca5e6e603d2dae72d3fa0af
SHA256:dc4bcfa9aaf97ad72e0360b8e7a4b17392482f8b1f9ae597c3670c9cb3215660
SHA512:8193e76e330e1741b805cfc73dad845f9eba37f43af5486330a90fd7632c4e3654c448ca82ab53237e5b875a470736fd241d5ec791eb0b3e88ec4673f946f3ad
SSDEEP:24576:vwd4XMf2FyhaG9dNygHwrH7ydifo4asHhfstbNnjbgIx3rLCA/9J:vq4DKNyWwDuifyg6bNnjbLrWA/v
TLSH:AF3512C9ED642276E17B1570A81765CCE9B80CE11F38C67B43F117A27A711B9A63E2C3
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._..._..._...0.r.Y.....v.^...0.p.^...V.}.R..._...b...0.D.K...0.E.T...0.t.^...0.s.^...Rich_...........PE..L...,r.f...........
Icon Hash:71b018dccec77331
Entrypoint:0x536bf0
Entrypoint Section:.sedata
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66E7722C [Sun Sep 15 23:47:56 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:0ffacaa5916e809890e37542ad1c481f
Instruction
call 00007F74D88CD661h
push ebx
popad
outsb
imul ebp, dword ptr [bp+65h], 69685320h
insb
outsb
and byte ptr [esi+32h], dh
xor al, 2Eh
xor byte ptr [esi], ch
xor byte ptr [eax], al
jmp 00007F74D88CD5F7h
call 00007F74D88CD645h
jmp 00007F74D88CE6EAh
and al, 57h
mov esi, 414B2889h
inc esp
push esi
inc ecx
push eax
dec ecx
xor esi, dword ptr [edx]
insb
insb
add cl, al
ficomp word ptr [E8D98766h]
add dword ptr [eax], eax
add byte ptr [eax], al
loop 00007F74D88CD6A8h
mov dword ptr [esp+01h], esi
bts di, si
std
mov al, byte ptr [esp+02h]
jmp 00007F74D88CD66Dh
adc bl, byte ptr [ebp+46A7540Dh]
insb
jnle 00007F74D88CD68Bh
push eax
dec eax
dec esp
push eax
inc ecx
push eax
dec ecx
inc esp
dec esp
dec esp
add byte ptr [eax+0Fh], bl
mov esp, 6646B0CFh
shl edx, 08h
rdtsc
call 00007F74D88CD66Eh
inc esi
int1
jmp far 1C8Dh : 9C5BA20Fh
adc al, 8Ah
clc
mov ch, byte ptr [esp]
jmp 00007F74D88CD61Eh
bswap ebp
mov word ptr [esp], bx
neg dl
mov ch, 0Bh
add esp, 00000000h
or dh, FFFFFFC7h
jmp 00007F74D88CD661h
add eax, 88CEA7B4h
adc al, 24h
jmp 00007F74D88CD627h
setle dh
rdtsc
ror ecx, cl
push dword ptr [esp+05h]
xchg esi, ebp
jmp 00007F74D88CD65Dh
dec ecx
Programming Language:
  • [IMP] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729
  • [ C ] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [RES] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x13908e0x104.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x13a0000xc00.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5c0000x28c000ee8dc40012d34aaccd69215edd8979eFalse1.000341497315951data7.998737130003935IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.sedata0x5d0000xdc0000xdbe001e3b95ad33628a19815c224179980c8cFalse0.8214306335275725data7.6820869028084315IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1390000x10000x4003d404bb847c6557ac22050fb62595f96False0.3974609375data3.6675811869566814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x13a0000x10000xc0074dcff3844bcf2e0c90820d790a7507cFalse0.3623046875data4.090537608817185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.sedata0x13b0000x10000x1000643e5a3ea85f917fe7cdc89f54c64eadFalse0.78173828125data7.982685760275232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x13a1600x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.33064516129032256
RT_ICON0x13a4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4391891891891892
RT_GROUP_ICON0x13a5700x22dataChineseChina1.0
RT_VERSION0x13a5940x330dataChineseChina0.4632352941176471
RT_MANIFEST0x13a8c40x25fASCII text, with very long lines (607), with no line terminatorsEnglishUnited States0.43492586490939045
DLLImport
MSIMG32.dllTransparentBlt
MSVCR100.dll_controlfp_s
mfc100.dll
KERNEL32.dllFreeLibrary
USER32.dllGetFocus
GDI32.dllGetTextExtentPoint32A
SHELL32.dllSHGetSpecialFolderPathA
MSVCP100.dll?_Xout_of_range@std@@YAXPBD@Z
MSVCRT.dllstrncpy
IPHLPAPI.DLLGetInterfaceInfo
PSAPI.DLLGetMappedFileNameW
ADVAPI32.dllRegDeleteKeyA
Language of compilation systemCountry where language is spokenMap
ChineseChina
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:02:34:19
Start date:27/09/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15464.19850.exe"
Imagebase:0x400000
File size:1'076'736 bytes
MD5 hash:6D362753DCE141D1177CE73B14FA572D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 47c4453e01dc046bfcceaa0656a5068aeaea57ef08022d7ea3b1c1835b3d857f
    • Instruction ID: 9a972a28613d3762c1e185ebe420523aaf44b438c367b058c90a5f8d69fff675
    • Opcode Fuzzy Hash: 47c4453e01dc046bfcceaa0656a5068aeaea57ef08022d7ea3b1c1835b3d857f
    • Instruction Fuzzy Hash: 3C321AB7F507299BCB14CED5DCC05CDB3B2BF98214B1E9165C914F7306E6B8AA068B90
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f933a730031b89d025ea583653a8a3e0c86aae27f30676c2f9e3e185c12f5a78
    • Instruction ID: b57cf159a1b401274b214af74dd10fd94d6112e4d5fe0ca821cb3f95529a84ac
    • Opcode Fuzzy Hash: f933a730031b89d025ea583653a8a3e0c86aae27f30676c2f9e3e185c12f5a78
    • Instruction Fuzzy Hash: A3321AB7F507299BCB14CED5DCC05CDB3B2BF98214B1E9165C914F7306E6B8AA068B90
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 58410b746b93751fcc3cf7f8e30105b1e4ae87830f80aaa5f3f5e24011c70c8f
    • Instruction ID: 92a182c6e6eb3771b82020bcf47ba87234528cf2d9b36f15b41c27232eca5fcf
    • Opcode Fuzzy Hash: 58410b746b93751fcc3cf7f8e30105b1e4ae87830f80aaa5f3f5e24011c70c8f
    • Instruction Fuzzy Hash: 07323AB7F507299BCB14CED5DCC05CDB3B2BF98214B1E9165C914F7306E6B8AA068B90
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 49cd371982010bdb7b0ddc26a8c3da839a59c2c98051a4016d2dc57fd7bea087
    • Instruction ID: f078d21c5f17d94e842f70678dc58f46d875d24c1638c7090f05805dca9e1edd
    • Opcode Fuzzy Hash: 49cd371982010bdb7b0ddc26a8c3da839a59c2c98051a4016d2dc57fd7bea087
    • Instruction Fuzzy Hash: A5F1A537D106A18FC711CF6DDD80149B7A3AF89201B5FC2A4CA886B356D630BA96CBD4
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: daf12016a5bfe9199243c3b2cc475600aab08c94b78582c0643877a3e022a767
    • Instruction ID: b1ddbbc0869ff5f656853ff9cc89849c75444f529965282bbbf10fd30dda967d
    • Opcode Fuzzy Hash: daf12016a5bfe9199243c3b2cc475600aab08c94b78582c0643877a3e022a767
    • Instruction Fuzzy Hash: 8CF1A537D106B18FC711CF6DDD80149B7A3AB89201B5FC2A4CA887B356D670BA96CBD4
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e6802b04cea7efa3ba05ec64cdc7953619e896bf07f6274bbe57553ad7edcb43
    • Instruction ID: 8803b8250ab53277bce2db185c8e94158942f4d68e535f063af6e52c68cf15f7
    • Opcode Fuzzy Hash: e6802b04cea7efa3ba05ec64cdc7953619e896bf07f6274bbe57553ad7edcb43
    • Instruction Fuzzy Hash: 14F1A437D106B18FD711CF6DDD8014DB7A3AB89201B5FC2A4CA886B356D630BA86CBD4
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0b340245e2e606d6d6dafb5eedb27693cec34abf7399a1ebbb3a544d1530240b
    • Instruction ID: 913e579d1735734849b37f8df69567bcb5da5ef28228a5d9128b36606cc31bc6
    • Opcode Fuzzy Hash: 0b340245e2e606d6d6dafb5eedb27693cec34abf7399a1ebbb3a544d1530240b
    • Instruction Fuzzy Hash: CC51B37D90820DDFC7A4DF04C541FA9B7B1AB84308F25491FD59687201E378A936EB9B
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a98f4b84411f3aba5081beca86a6dfb62e66ba3ccd5c1e756c4b84cd1b4a3084
    • Instruction ID: 86e6b59020544a0604cd06e3cf98467e60a43f6271a2d3147e53b3d5056a1941
    • Opcode Fuzzy Hash: a98f4b84411f3aba5081beca86a6dfb62e66ba3ccd5c1e756c4b84cd1b4a3084
    • Instruction Fuzzy Hash: B731ED3650C356EACB06AF54D4912EABFB1BF95300F64DD1CE4EA0B212E2758908D793
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2781747478.000000000045D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2781704895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781719443.0000000000401000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781747478.0000000000534000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781827963.0000000000539000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781843631.000000000053A000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2781860168.000000000053B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: <$C$G$G$H$H$I$J$J$N$O$V$W$W$Y$[$[$i$o
    • API String ID: 0-2640510608
    • Opcode ID: 2a376f5b626aaed9cd45dda005aa91a40c96324d05de4e86b76d2e0d12c4d799
    • Instruction ID: be3c72eaf39225f9b26b786c8124ae09caeb2506b790e4046f02a7082c8359a0
    • Opcode Fuzzy Hash: 2a376f5b626aaed9cd45dda005aa91a40c96324d05de4e86b76d2e0d12c4d799
    • Instruction Fuzzy Hash: F931E858C0C2C5D9DB01D66994053AEBFF05F1230AF1484AAC9DA6B241E37D471ED76B