Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
Analysis ID:1521519
MD5:8ae20294b12f8eaa5551a24b0667a235
SHA1:bfebb9baf9713511c55c5ef2d992aaee161d6c4e
SHA256:708a473bbcd229fac5dcd38b59415fd39a8a2daf7884be0e3e5967edecbbecb1
Tags:exe
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1521169565.0000000002EDA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1521194354.0000000002EDA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776928746.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drString found in binary or memory: http://fontawesome.io
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776928746.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drString found in binary or memory: http://fontawesome.io/license/
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drString found in binary or memory: http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000002.2775405487.00000000021DC000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1512822147.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2775903496.000000000254B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2775903496.000000000252E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1522887745.0000000003F40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000002.2775405487.00000000021B1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/p
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1519323279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1519323279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000000.1512524263.000000000042F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean3.winEXE@3/2@0/0
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeFile created: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmpJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeProcess created: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp "C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp" /SL5="$2043C,4689659,161280,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeProcess created: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp "C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp" /SL5="$2043C,4689659,161280,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpWindow found: window name: TMainFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeStatic file information: File size 5841251 > 1048576
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drStatic PE information: section name: .didata
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpFile created: C:\Users\user\AppData\Local\Temp\is-VAP6D.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeFile created: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-VAP6D.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmpProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Owner/User Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe11%ReversingLabsWin32.Hacktool.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp5%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-VAP6D.tmp\_isetup\_setup64.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://fontawesome.io0%URL Reputationsafe
https://www.remobjects.com/ps0%URL Reputationsafe
https://www.innosetup.com/0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.dk-soft.org/pSecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000002.2775405487.00000000021B1000.00000004.00001000.00020000.00000000.sdmpfalse
    unknown
    https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exefalse
      unknown
      http://fontawesome.ioSecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1521169565.0000000002EDA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1521194354.0000000002EDA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776928746.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drfalse
      • URL Reputation: safe
      unknown
      http://fontawesome.io/license/SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776928746.00000000030D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drfalse
        unknown
        http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licensSecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1520540335.00000000007D6000.00000002.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2776845903.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drfalse
          unknown
          https://www.remobjects.com/psSecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1519323279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drfalse
          • URL Reputation: safe
          unknown
          https://www.innosetup.com/SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1517175819.000000007FA50000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1515449436.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000000.1519323279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp.0.drfalse
          • URL Reputation: safe
          unknown
          http://www.dk-soft.org/SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000002.2775405487.00000000021DC000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe, 00000000.00000003.1512822147.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2775903496.000000000254B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000002.2775903496.000000000252E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp, 00000002.00000003.1522887745.0000000003F40000.00000004.00001000.00020000.00000000.sdmpfalse
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1521519
            Start date and time:2024-09-28 20:35:16 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 4s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
            Detection:CLEAN
            Classification:clean3.winEXE@3/2@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 1
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\is-VAP6D.tmp\_isetup\_setup64.tmpfile.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
              SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeGet hashmaliciousSocks5SystemzBrowse
                SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                  SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                    SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                      file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                        file.exeGet hashmaliciousSocks5SystemzBrowse
                          boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                            file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4136960
                                Entropy (8bit):6.49785370651437
                                Encrypted:false
                                SSDEEP:49152:jExEtoHxDpvX19KcSgDqDI/hnLyyaphTO9bHj1adbBSRv38/wF4ZTWK:jExVHxD9l2OAhTO9nAdlS93WwW
                                MD5:39C8AF9DA7F0B440DE3D15F33DF2751A
                                SHA1:43A9805B86D36271CB0C6AF121806F9E639464D7
                                SHA-256:0913593D31A4597794A2ECA88A30185905B5876BAEC840D964CA1A6435F9A1FE
                                SHA-512:B79627FC706FBC791AC76B05CC1E7784D99BED8A7B221B94B39F11DBB221E5DE96D425F0BB8465C72335D56575D61889FAB8EDCB0E6AADBA9E7D4303061AA167
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 5%
                                Reputation:low
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...X.jd.................F:..........\:......`:...@..........................0A...........@......@...................0=.......<..>...`=.<....................................................P=.......................<...... =.R....................text.....9.......9................. ..`.itext...N....:..P....9............. ..`.data...\....`:......J:.............@....bss........ ;..........................idata...>....<..@....:.............@....didata.R.... =......>;.............@....edata.......0=......N;.............@..@.tls....P....@=..........................rdata.......P=......P;.............@..@.rsrc...<....`=......R;.............@..@............. A.......?.............@..@........................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp
                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):6144
                                Entropy (8bit):4.720366600008286
                                Encrypted:false
                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: boSodF2WmT.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.99017247852578
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 98.86%
                                • Inno Setup installer (109748/4) 1.08%
                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                File name:SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
                                File size:5'841'251 bytes
                                MD5:8ae20294b12f8eaa5551a24b0667a235
                                SHA1:bfebb9baf9713511c55c5ef2d992aaee161d6c4e
                                SHA256:708a473bbcd229fac5dcd38b59415fd39a8a2daf7884be0e3e5967edecbbecb1
                                SHA512:7c359e495064e88ec8bb412bded4a1d9a0f3ff0183a8a344e607ba80542d068b329acf6d7797a02763f7a678424d7c55e1a992b284d81e6c61d91d6d95253fb5
                                SSDEEP:98304:1Q+wf8md+58pH2pCqJgpiJJ7lMqlbQzRRkFMuhFJqVVxr8BUkXgB82JqFXPdCO9P:1ZY87Ryi37LYYM4JqV3o7XgXJYCZ0
                                TLSH:45463302B6C34432E529467C98968290FD537A706EF56B2D3DFFC84E1AFA3D50536BA0
                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                Icon Hash:c6ccdbd9dcf2711b
                                Entrypoint:0x419974
                                Entrypoint Section:.itext
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x6404B34B [Sun Mar 5 15:20:43 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:1
                                File Version Major:5
                                File Version Minor:1
                                Subsystem Version Major:5
                                Subsystem Version Minor:1
                                Import Hash:ea498fe198e91fc6fa5f09d6bb3dad3a
                                Instruction
                                push ebp
                                mov ebp, esp
                                add esp, FFFFFFA4h
                                push ebx
                                push esi
                                push edi
                                xor eax, eax
                                mov dword ptr [ebp-3Ch], eax
                                mov dword ptr [ebp-40h], eax
                                mov dword ptr [ebp-5Ch], eax
                                mov dword ptr [ebp-30h], eax
                                mov dword ptr [ebp-38h], eax
                                mov dword ptr [ebp-34h], eax
                                mov dword ptr [ebp-2Ch], eax
                                mov dword ptr [ebp-28h], eax
                                mov dword ptr [ebp-14h], eax
                                mov eax, 004182F4h
                                call 00007F6A48D8545Dh
                                xor eax, eax
                                push ebp
                                push 0041A066h
                                push dword ptr fs:[eax]
                                mov dword ptr fs:[eax], esp
                                xor edx, edx
                                push ebp
                                push 0041A022h
                                push dword ptr fs:[edx]
                                mov dword ptr fs:[edx], esp
                                mov eax, dword ptr [0041EB48h]
                                call 00007F6A48D9557Bh
                                call 00007F6A48D950CAh
                                lea edx, dword ptr [ebp-14h]
                                xor eax, eax
                                call 00007F6A48D8DD34h
                                mov edx, dword ptr [ebp-14h]
                                mov eax, 0042179Ch
                                call 00007F6A48D839F3h
                                push 00000002h
                                push 00000000h
                                push 00000001h
                                mov ecx, dword ptr [0042179Ch]
                                mov dl, 01h
                                mov eax, dword ptr [0040FA38h]
                                call 00007F6A48D8E64Bh
                                mov dword ptr [004217A0h], eax
                                xor edx, edx
                                push ebp
                                push 00419FCEh
                                push dword ptr fs:[edx]
                                mov dword ptr fs:[edx], esp
                                call 00007F6A48D95603h
                                mov dword ptr [004217A8h], eax
                                mov eax, dword ptr [004217A8h]
                                cmp dword ptr [eax+0Ch], 01h
                                jne 00007F6A48D9846Ah
                                mov eax, dword ptr [004217A8h]
                                mov edx, 00000028h
                                call 00007F6A48D8EB14h
                                mov edx, dword ptr [004217A8h]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x220000x100a.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000xc7dc.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x250000x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x223600x25c.idata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x174240x176007c4e217d33ecf31b50013ce86c37686eFalse0.5273228609625669data6.393203745444182IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .itext0x190000x110c0x120017bdae2799284ddb20a8dc6312d14376False0.5492621527777778data5.844779959207506IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x1b0000xdcc0xe00121489ef40758669c0238bcb232022c0False0.30106026785714285data2.7636938232745165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .bss0x1c0000x58000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata0x220000x100a0x1200b3b7e9cf1fc78ba601a09769949e02bbFalse0.3216145833333333data4.66659990144446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0x240000xc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x250000x180x200c4774d302874c5736a093958bc7d322bFalse0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x260000xc7dc0xc800e46630b391d773fc20545f544e0b2ff5False0.24361328125data4.5109415070521806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x263bc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5453319502074688
                                RT_STRING0x289640x5cdata0.5869565217391305
                                RT_STRING0x289c00x17cdata0.48947368421052634
                                RT_STRING0x28b3c0xccdata0.6225490196078431
                                RT_STRING0x28c080x1dcdata0.5273109243697479
                                RT_STRING0x28de40x39cdata0.34523809523809523
                                RT_STRING0x291800x34cdata0.4218009478672986
                                RT_STRING0x294cc0x294data0.4106060606060606
                                RT_RCDATA0x297600x82e8dataEnglishUnited States0.11261637622344235
                                RT_RCDATA0x31a480x10data1.5
                                RT_RCDATA0x31a580x194data0.7896039603960396
                                RT_RCDATA0x31bec0x2cdata1.1818181818181819
                                RT_GROUP_ICON0x31c180x14dataEnglishUnited States1.25
                                RT_VERSION0x31c2c0x584dataEnglishUnited States0.26912181303116145
                                RT_MANIFEST0x321b00x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                DLLImport
                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                comctl32.dllInitCommonControls
                                kernel32.dllSleep
                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                advapi32.dllAdjustTokenPrivileges
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:14:36:25
                                Start date:28/09/2024
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe"
                                Imagebase:0x400000
                                File size:5'841'251 bytes
                                MD5 hash:8AE20294B12F8EAA5551A24B0667A235
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Reputation:low
                                Has exited:false

                                Target ID:2
                                Start time:14:36:26
                                Start date:28/09/2024
                                Path:C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\is-M9OFA.tmp\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.tmp" /SL5="$2043C,4689659,161280,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Application.Agent.XLWBSF.10950.31692.exe"
                                Imagebase:0x400000
                                File size:4'136'960 bytes
                                MD5 hash:39C8AF9DA7F0B440DE3D15F33DF2751A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Antivirus matches:
                                • Detection: 5%, ReversingLabs
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:3
                                  Total number of Limit Nodes:0
                                  execution_graph 485 5b1129 486 5b113a EnumResourceNamesW 485->486 487 5b10b7 486->487

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_005B1F5B 1 Function_005B17DA 2 Function_005B135F 3 Function_005B17DC 4 Function_005B14D2 5 Function_005B14D4 6 Function_005B104A 7 Function_005B164A 8 Function_005B14C9 9 Function_005B1DC9 10 Function_005B16C8 56 Function_005B11B0 10->56 11 Function_005B1648 12 Function_005B104C 13 Function_005B1D4C 13->5 15 Function_005B12CC 13->15 14 Function_005B19CC 40 Function_005B1390 15->40 16 Function_005B12C2 17 Function_005B14C7 18 Function_005B19C6 19 Function_005B1EC6 20 Function_005B12C4 21 Function_005B19C4 22 Function_005B1DFB 23 Function_005B1DF9 24 Function_005B1EF9 25 Function_005B117E 26 Function_005B167C 27 Function_005B117C 28 Function_005B1CFC 29 Function_005B1672 30 Function_005B1670 31 Function_005B1F70 32 Function_005B1BF5 34 Function_005B17E4 32->34 37 Function_005B1698 32->37 33 Function_005B17E2 34->37 35 Function_005B1699 61 Function_005B1928 35->61 36 Function_005B1F99 37->61 38 Function_005B1B1E 39 Function_005B1B9E 41 Function_005B1B96 42 Function_005B1F96 43 Function_005B1915 44 Function_005B1E14 44->15 45 Function_005B1B94 46 Function_005B1888 47 Function_005B148F 48 Function_005B1382 49 Function_005B1000 50 Function_005B1800 50->34 51 Function_005B1384 52 Function_005B103E 53 Function_005B1D3C 54 Function_005B103C 55 Function_005B17B1 57 Function_005B15B6 58 Function_005B1EB6 59 Function_005B15B4 60 Function_005B1129 62 Function_005B17AF 63 Function_005B1AA3 64 Function_005B12A2 65 Function_005B1AA1 66 Function_005B1B20 67 Function_005B12A0 68 Function_005B1127 69 Function_005B11A6 70 Function_005B1824 70->26 71 Function_005B11A4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 5b1129-5b113f EnumResourceNamesW 2 5b1144-5b1153 0->2 3 5b1159-5b116a 2->3 4 5b10b7-5b1121 2->4 7 5b116c-5b1171 3->7 8 5b1176 3->8 4->2 7->8
                                  APIs
                                  • EnumResourceNamesW.KERNELBASE(?,00000000), ref: 005B113F
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2775193946.00000000005B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 005B1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_5b1000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: EnumNamesResource
                                  • String ID:
                                  • API String ID: 3334572018-0
                                  • Opcode ID: 47a68edc61f86151c20f0f100490b23013ced82948967dde0c0969ee693d6c72
                                  • Instruction ID: 256512c76694c0d3ee875351c96cee4f9334eaf9536e62b57875eb0cd58cf718
                                  • Opcode Fuzzy Hash: 47a68edc61f86151c20f0f100490b23013ced82948967dde0c0969ee693d6c72
                                  • Instruction Fuzzy Hash: 4EF0D471600244AFDB04DF98DA959DDBBB4FB48314B5485A5F804AB295C735BC80CB24