Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ROADToken.exe

Overview

General Information

Sample name:ROADToken.exe
Analysis ID:1523555
MD5:ea187fb031f817208b3344cee20ab38b
SHA1:dfc3dc7bc0892634692d8febee175ab594b6a998
SHA256:bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • ROADToken.exe (PID: 3604 cmdline: "C:\Users\user\Desktop\ROADToken.exe" MD5: EA187FB031F817208B3344CEE20AB38B)
    • conhost.exe (PID: 736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BrowserCore.exe (PID: 3652 cmdline: "C:\Program Files\Windows Security\BrowserCore\browsercore.exe" MD5: C1470314551559E0A170221A461D30FE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ROADToken.exeAvira: detected
Source: ROADToken.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\YanalA\Desktop\w\PT\tools\ROADtoken\obj\Debug\ROADToken.pdby/ source: ROADToken.exe
Source: Binary string: C:\Users\YanalA\Desktop\w\PT\tools\ROADtoken\obj\Debug\ROADToken.pdb source: ROADToken.exe
Source: BrowserCore.exe, 00000002.00000002.1647734504.000001A0D1A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comr
Source: ROADToken.exeString found in binary or memory: https://login.microsoftonline.com
Source: ROADToken.exeString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize
Source: ROADToken.exe, 00000000.00000002.1648413134.0000000002581000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?sso_nonce=
Source: ROADToken.exeString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?sso_nonce=_
Source: C:\Users\user\Desktop\ROADToken.exeCode function: 0_2_00A808480_2_00A80848
Source: C:\Users\user\Desktop\ROADToken.exeCode function: 0_2_00A8057D0_2_00A8057D
Source: ROADToken.exe, 00000000.00000002.1648063781.000000000086E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ROADToken.exe
Source: classification engineClassification label: mal48.winEXE@4/2@0/0
Source: C:\Users\user\Desktop\ROADToken.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ROADToken.exe.logJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:736:120:WilError_03
Source: ROADToken.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ROADToken.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\ROADToken.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ROADToken.exe "C:\Users\user\Desktop\ROADToken.exe"
Source: C:\Users\user\Desktop\ROADToken.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ROADToken.exeProcess created: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe "C:\Program Files\Windows Security\BrowserCore\browsercore.exe"
Source: C:\Users\user\Desktop\ROADToken.exeProcess created: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe "C:\Program Files\Windows Security\BrowserCore\browsercore.exe"Jump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exeSection loaded: microsoftaccounttokenprovider.dllJump to behavior
Source: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A9927F85-A304-4390-8B23-A75F1C668600}\InprocServer32Jump to behavior
Source: ROADToken.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: ROADToken.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ROADToken.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\YanalA\Desktop\w\PT\tools\ROADtoken\obj\Debug\ROADToken.pdby/ source: ROADToken.exe
Source: Binary string: C:\Users\YanalA\Desktop\w\PT\tools\ROADtoken\obj\Debug\ROADToken.pdb source: ROADToken.exe
Source: ROADToken.exeStatic PE information: 0xFD6CACEB [Thu Sep 25 03:50:03 2104 UTC]
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeMemory allocated: A40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeMemory allocated: 2380000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ROADToken.exe TID: 5772Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\ROADToken.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeProcess created: C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe "C:\Program Files\Windows Security\BrowserCore\browsercore.exe"Jump to behavior
Source: C:\Users\user\Desktop\ROADToken.exeQueries volume information: C:\Users\user\Desktop\ROADToken.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1523555 Sample: ROADToken.exe Startdate: 01/10/2024 Architecture: WINDOWS Score: 48 15 Antivirus / Scanner detection for submitted sample 2->15 6 ROADToken.exe 2 2->6         started        process3 file4 13 C:\Users\user\AppData\...\ROADToken.exe.log, CSV 6->13 dropped 9 conhost.exe 6->9         started        11 BrowserCore.exe 1 6->11         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ROADToken.exe100%AviraHEUR/AGEN.1358001
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://login.microsoftonline.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://login.microsoftonline.com/common/oauth2/authorize?sso_nonce=_ROADToken.exefalse
    unknown
    https://login.microsoftonline.comROADToken.exefalse
    • URL Reputation: safe
    unknown
    https://login.microsoftonline.com/common/oauth2/authorize?sso_nonce=ROADToken.exe, 00000000.00000002.1648413134.0000000002581000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      https://login.microsoftonline.com/common/oauth2/authorizeROADToken.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1523555
        Start date and time:2024-10-01 18:48:07 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 40s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:3
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:ROADToken.exe
        Detection:MAL
        Classification:mal48.winEXE@4/2@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 1
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Execution Graph export aborted for target ROADToken.exe, PID 3604 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: ROADToken.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\ROADToken.exe
        File Type:CSV text
        Category:modified
        Size (bytes):226
        Entropy (8bit):5.360398796477698
        Encrypted:false
        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
        MD5:3A8957C6382192B71471BD14359D0B12
        SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
        SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
        SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
        Malicious:true
        Reputation:high, very likely benign file
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
        Process:C:\Users\user\Desktop\ROADToken.exe
        File Type:data
        Category:dropped
        Size (bytes):180
        Entropy (8bit):4.847732959178672
        Encrypted:false
        SSDEEP:3:AQGgWQ5VeIjAF/Juv/AplAW4b1BHDB13aXJHAUNVSXKXFVaHcRfH4R/MHNTcXsvs:TVWQ50Ijg+CmNb1xdMXJb/ScFV8cRfYn
        MD5:487908C49652F131AB941938651A771E
        SHA1:FC56C179F04E77924B08B3E0E96D883B29DE32C1
        SHA-256:5CAD3BAE2972CD86530F02402287D01E1CA3FF70F9435BC8561ADB36F69D211C
        SHA-512:7A3A6AF77C8F0CACC40527860EA689962417E15B8E52DE47D7686AFBF92CC6E5280DB1C2ABE8FFAD53B12B90C6E2D6D18D69AAF67D53EA5E5C1C18EE5A5232C5
        Malicious:false
        Reputation:low
        Preview:No nonce supplied, refresh cookie will likely not work!..r...{"status": "Fail", "code": "OSError", "description": "Error processing request.", "ext": { "error": -2147186935 }}..0..
        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):4.447164822299407
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:ROADToken.exe
        File size:6'656 bytes
        MD5:ea187fb031f817208b3344cee20ab38b
        SHA1:dfc3dc7bc0892634692d8febee175ab594b6a998
        SHA256:bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c
        SHA512:7438ddd40c9b6d76dc5f5641bd85dbe4281ce18a8e2e1e50d3ac9e681e1b1457650a3dad7ea0a5d43f730e621b0dec7c55393473ab269ea036bc29e8852df0ec
        SSDEEP:96:DZ+QjoUYy81SdID3IbdIhIHPdJNZ/XuwzNt:DoUW+HVPZ/+S
        TLSH:28D19645A3FC4739F7B71B395DB302105A38BE42CD36CB6C29825A4E1D62A504B72B73
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....l..........."...0............../... ...@....@.. ....................................`................................
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x402fa6
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xFD6CACEB [Thu Sep 25 03:50:03 2104 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x2f510x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x5ac.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x2ebc0x38.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000xfac0x1000bc6f89c5ab0ba99dd40a621c17d0ca85False0.4931640625data4.995063912217563IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x40000x5ac0x600b69711736688f781e98b2a0544947e37False0.4166666666666667data4.092865949735008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x60000xc0x200b9c9c47fb56f1f70b785ecb9f7a685a3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x40900x31cdata0.4296482412060301
        RT_MANIFEST0x43bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:12:48:55
        Start date:01/10/2024
        Path:C:\Users\user\Desktop\ROADToken.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\ROADToken.exe"
        Imagebase:0x1e0000
        File size:6'656 bytes
        MD5 hash:EA187FB031F817208B3344CEE20AB38B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:12:48:55
        Start date:01/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:12:48:55
        Start date:01/10/2024
        Path:C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Windows Security\BrowserCore\browsercore.exe"
        Imagebase:0x7ff762a40000
        File size:91'968 bytes
        MD5 hash:C1470314551559E0A170221A461D30FE
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Reset < >
          Memory Dump Source
          • Source File: 00000000.00000002.1648269421.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_a80000_ROADToken.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 05e3ca31e3df093df0c1d728d028c649191aab85e4c92898fbe942fdd869829b
          • Instruction ID: f96fd5c181ab83753a263ed84fec8a6c58a39cfaa56c8bdbd50cb7bb4092407e
          • Opcode Fuzzy Hash: 05e3ca31e3df093df0c1d728d028c649191aab85e4c92898fbe942fdd869829b
          • Instruction Fuzzy Hash: ECC1D274E01318CFDB58EFA5C994A9DBBB2BF89304F2090A9D409AB365DB359D85CF04
          Memory Dump Source
          • Source File: 00000000.00000002.1648269421.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_a80000_ROADToken.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 616a3b4ffa9d906281cfaa0f014091677b459cfe7a1c5eb12e2e95510cd23b41
          • Instruction ID: 451060b2a6385139240ef3bf1c26cda0e045eea3fe748e581d0db820f2be3f3d
          • Opcode Fuzzy Hash: 616a3b4ffa9d906281cfaa0f014091677b459cfe7a1c5eb12e2e95510cd23b41
          • Instruction Fuzzy Hash: D9310775E052488FEB18DFAAD9546DEFFF2AFC9300F14C16AD444AB269DB74094ACB10