Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524653
MD5:ed7e56bb217c2448ad3b61f5bfd83e16
SHA1:92d994024ff61db1726d0ace38e6b4f22a8ef522
SHA256:36214001aad5a561e3e8e17334adb7e507f937510978302c860df84ec647be2b
Tags:exeuser-Bitsight
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

.NET source code contains very large strings
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • file.exe (PID: 3836 cmdline: "C:\Users\user\Desktop\file.exe" MD5: ED7E56BB217C2448AD3B61F5BFD83E16)
    • conhost.exe (PID: 3576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: file.exe, 00000000.00000000.1497159714.00007FF76BDEC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_40c172d8-c
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\BlackDropperCPP\BlackDropperCPP.pdb source: file.exe
Source: Binary string: /root/Builder/obj/Release/net8.0-windows/win-x64/Builder.pdb source: file.exe, 00000000.00000003.1518576683.000002B9C5B11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518674223.000002B9C5AE6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518705267.000002B9C58CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518453934.000002B9C5BE4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518493109.000002B9C5AE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518693095.000002B9C5943000.00000004.00000020.00020000.00000000.sdmp, Builder.dll.0.dr
Source: file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518453934.000002B9C5BE4000.00000004.00000020.00020000.00000000.sdmp, Builder.dll.0.drString found in binary or memory: http://72.5.42.222:8568/api/newLog
Source: file.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: file.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: file.exeString found in binary or memory: https://curl.se/docs/http-cookies.html

System Summary

barindex
Source: Builder.dll.0.dr, Form1.csLong String: Length: 21012
Source: Builder.dll.0.drStatic PE information: No import functions for PE file found
Source: file.exe, 00000000.00000003.1518576683.000002B9C5B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518674223.000002B9C5AE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518705267.000002B9C58CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518453934.000002B9C5BE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518493109.000002B9C5AE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: file.exe, 00000000.00000003.1518693095.000002B9C5943000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBuilder.dll0 vs file.exe
Source: Builder.dll.0.dr, Form1.csBase64 encoded string: 'KDU2CQgWHwQqLS8bBgQLDy4+OxEWGVQhCx8bOSQtHw0MAQ0SLTU8HRMeC0wlDQwD', 'KDU2CQgWHwQqLS8bBgQLDy4+OxEWGVQhCx8bOSQtHw0MAQ0SLTU8HRMeC0wlDQwD', 'LCQjGwoKBAoqLSEeERwdFiQ2IxoDAFM1Dw0KKy0gDhASAw4eMj0gCwsDBQQM', 'MDAkHQQAFh8CCBI/JS4MCg00PTwYDAJNMREZDC45MwAKBB0HFTIuKgkdBxcWHyU2MwUJDRoACw==', 'Ni4oDg0fHAICEQ00NiYcAQA1KyQYDBpUNRceGTQxMAgKDR8PEi4uLRMSSiIPEBc=', 'JDI6HAIGCR4ZExw4PTQXBgE1MjkLFBhYPAYCCCU3MxIBCRMWBzouNAAVGA5QLhEGDw8cBA0NUSQTFxsLCAQd'
Source: classification engineClassification label: mal56.spyw.evad.winEXE@2/2@0/1
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\Music\vkiwdonilgJump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\MyMutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3576:120:WilError_03
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %u
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: file.exeStatic file information: File size 2427392 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1dae00
Source: file.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\BlackDropperCPP\BlackDropperCPP.pdb source: file.exe
Source: Binary string: /root/Builder/obj/Release/net8.0-windows/win-x64/Builder.pdb source: file.exe, 00000000.00000003.1518576683.000002B9C5B11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518674223.000002B9C5AE6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518705267.000002B9C58CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518453934.000002B9C5BE4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518493109.000002B9C5AE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518693095.000002B9C5943000.00000004.00000020.00020000.00000000.sdmp, Builder.dll.0.dr
Source: Builder.dll.0.drStatic PE information: 0xDB953C61 [Fri Sep 27 18:43:45 2086 UTC]
Source: file.exeStatic PE information: section name: .00cfg
Source: file.exeStatic PE information: section name: .fptable
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\Music\vkiwdonilg\Builder.dllJump to dropped file

Malware Analysis System Evasion

barindex
Source: file.exeBinary or memory string: : C:\WINDOWS\SYSTEM32\VBOXSERVICE.EXEC:\WINDOWS\SYSTEM32\VBOXTRAY.EXEC:\PROGRAM FILES\ORACLE\VIRTUALBOX GUEST ADDITIONS\VBOXSF.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VBOXMOUSE.SYSC:\WINDOWS\SYSTEM32\VMTOOLSD.EXEC:\WINDOWS\SYSTEM32\DRIVERS\VMCI.SYSC:\WINDOWS\SYSTEM32\DRIVERS\VMXNET.SYSC:\PROGRAM FILES\SANDBOXIE\SBIECTRL.EXEC:\SANDBOX\C:\PROGRAM FILES\QEMU\QEMU-GA.EXEC:\VTROOT\C:\USERS\WDAGUTILITYACCOUNT\VBOXSERVICE.EXEVBOXTRAY.EXEVMTOOLSD.EXESBIECTRL.EXEQEMU-GA.EXE
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Program Files\Oracle\VirtualBox Guest Additions\VBoxSF.sysJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Windows\system32\drivers\vmci.sysJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Windows\system32\vboxservice.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Windows\system32\vboxtray.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Windows\System32\drivers\VBoxMouse.sysJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened / queried: C:\Windows\system32\vmtoolsd.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\Music\vkiwdonilg\Builder.dllJump to dropped file
Source: file.exeBinary or memory string: : C:\Windows\system32\vboxservice.exeC:\Windows\system32\vboxtray.exeC:\Program Files\Oracle\VirtualBox Guest Additions\VBoxSF.sysC:\Windows\System32\drivers\VBoxMouse.sysC:\Windows\system32\vmtoolsd.exeC:\Windows\system32\drivers\vmci.sysC:\Windows\system32\drivers\vmxnet.sysC:\Program Files\Sandboxie\SbieCtrl.exeC:\Sandbox\C:\Program Files\qemu\qemu-ga.exeC:\VTRoot\C:\Users\WDAGUtilityAccount\vboxservice.exevboxtray.exevmtoolsd.exeSbieCtrl.exeqemu-ga.exe
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Stealing of Sensitive Information

barindex
Source: file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum - Electrum
Source: file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Cash (Electron Cash) - ElectronCash
Source: file.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty - com.liberty.jaxx
Source: file.exe, 00000000.00000003.1518576683.000002B9C5B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus Web3 Wallet ||| aholpfdialjgjfhomihkjbmgjidlcdno
Source: file.exe, 00000000.00000003.1518576683.000002B9C5B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Talisman - Ethereum and Polkadot Wallet ||| fijngjgcjhjmmpcmkeiomlglpeiijkld
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping111
Security Software Discovery
Remote Services1
Archive Collected Data
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Data from Local System
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe6%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Music\vkiwdonilg\Builder.dll4%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.se/docs/hsts.html0%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
http://72.5.42.222:8568/api/newLog0%VirustotalBrowse
https://curl.se/docs/http-cookies.html0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://curl.se/docs/hsts.htmlfile.exefalseunknown
https://curl.se/docs/alt-svc.htmlfile.exefalseunknown
https://curl.se/docs/http-cookies.htmlfile.exefalseunknown
http://72.5.42.222:8568/api/newLogfile.exe, 00000000.00000003.1518493109.000002B9C5A11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1518453934.000002B9C5BE4000.00000004.00000020.00020000.00000000.sdmp, Builder.dll.0.drfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
72.5.42.222
unknownUnited States
16769UNASSIGNEDfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524653
Start date and time:2024-10-03 03:25:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal56.spyw.evad.winEXE@2/2@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Skipping network analysis since amount of network traffic is too extensive
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
72.5.42.222file.exeGet hashmaliciousUnknownBrowse
  • 72.5.42.222:8568/api/fileZip
file.exeGet hashmaliciousUnknownBrowse
  • 72.5.42.222:8568/api/fileZip
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
UNASSIGNEDgmpsl.elfGet hashmaliciousMiraiBrowse
  • 156.134.164.58
novo.arm64.elfGet hashmaliciousMirai, MoobotBrowse
  • 144.74.191.219
novo.m68k.elfGet hashmaliciousMirai, MoobotBrowse
  • 206.113.198.243
novo.spc.elfGet hashmaliciousMirai, MoobotBrowse
  • 69.87.114.129
WW8kzvnphl.vbsGet hashmaliciousUnknownBrowse
  • 72.5.43.53
PO554830092024.xlsGet hashmaliciousUnknownBrowse
  • 72.5.43.53
PO554830092024.xlsGet hashmaliciousUnknownBrowse
  • 72.5.43.53
PO554830092024.xlsGet hashmaliciousUnknownBrowse
  • 72.5.43.53
SecuriteInfo.com.Linux.Siggen.9999.28522.3483.elfGet hashmaliciousMiraiBrowse
  • 205.231.188.78
Callus+1(814)-310-9943.pdfGet hashmaliciousPayPal PhisherBrowse
  • 199.67.80.79
No context
No context
Process:C:\Users\user\Desktop\file.exe
File Type:ISO-8859 text, with no line terminators
Category:dropped
Size (bytes):12
Entropy (8bit):3.251629167387823
Encrypted:false
SSDEEP:3:uV7:uV7
MD5:5BA3109591C14902B71103BD5C0250B7
SHA1:349484696FECDB27731E44B60010FE8489BCC610
SHA-256:8943D6990D95AA6E028EFB24648884F9C29125785F07BDE47134979D21B445CF
SHA-512:B28919F85AD9C80C2DDF614B2B1AF6B6E3119FCF1778E15FF3F89FBCAB13A4DC87B80020D56FAA2A2CEE11B197E556E72098473C6156E46C565C8FAA3EA6AEAA
Malicious:false
Reputation:low
Preview:......, ...!
Process:C:\Users\user\Desktop\file.exe
File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):352256
Entropy (8bit):4.8740045721641545
Encrypted:false
SSDEEP:3072:YMPzUfhHQzO0rYJwudIDZ08lxJ/qEz/zWPbi4h3P5NdrRH44sYnWjoNcdhCPsw7S:WHQaXdIDZ0O5z/zMKug
MD5:FEB9621DD938083A9474C9BEC4BF3BD4
SHA1:2AE0DB9361EFBC9F673AADA57C87537C6CE25039
SHA-256:134B1F9F0F0C344EAA58092DEF1D104711732D5246C5EEA2E30B96785444FC72
SHA-512:4D3196855725199920F821F8ED6EDECCCB7501589828E367DA46EA8C6C2ED8C48BDCA98F4BDFB12AA09EE5C06A60121D7488293E33DA434E82D08D9C12BCB907
Malicious:false
Antivirus:
  • Antivirus: Virustotal, Detection: 4%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...a<............" .........P...............................................`............`...@......@............... ..................................8...@:...............P..........T...........................................................8...H............text............................... ..`.data....0.......@..................@....reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.833180945394466
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:2'427'392 bytes
MD5:ed7e56bb217c2448ad3b61f5bfd83e16
SHA1:92d994024ff61db1726d0ace38e6b4f22a8ef522
SHA256:36214001aad5a561e3e8e17334adb7e507f937510978302c860df84ec647be2b
SHA512:4a7aa240a034023e4453cbd4b408b977431912132a4dd058f60d39a8d13547f7cfb2cb7e0666ac4401c6a490e1cb214af7c6d9d4c95037f638c817b302f59b33
SSDEEP:49152:n1EofVNQzBWKHqP6qhw6rb1eNhuQk/FJjnDViNgi:n1EofCqhw6rb1eNhuln0gi
TLSH:1FB58D6A77A811C5D1BBD13DC587471BEAB274550330A7CF05A486AA2F23BEA5E3F310
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........[.............4..Q....4.......4.......1.......1.......1.......1.......4...............0.......0.......0......Rich...........
Icon Hash:00928e8e8686b000
Entrypoint:0x140005ecf
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66FD572D [Wed Oct 2 14:22:37 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:6488053962cbd82251db464b97b3cf51
Instruction
jmp 00007EFC54EF233Dh
jmp 00007EFC54EDCA18h
jmp 00007EFC54F56B43h
jmp 00007EFC54F803AAh
jmp 00007EFC54EE6FE1h
jmp 00007EFC54F6A894h
jmp 00007EFC54F2664Bh
jmp 00007EFC54E41D2Eh
jmp 00007EFC54E1F469h
jmp 00007EFC54E07E44h
jmp 00007EFC54EA015Fh
jmp 00007EFC54F8BEFAh
jmp 00007EFC54EF8A8Dh
jmp 00007EFC54DF0970h
jmp 00007EFC54F12C0Bh
jmp 00007EFC54EBD976h
jmp 00007EFC54F810D9h
jmp 00007EFC54F4ED38h
jmp 00007EFC54F35F5Fh
jmp 00007EFC54EB6BA2h
jmp 00007EFC54F2712Dh
jmp 00007EFC54EB68F8h
jmp 00007EFC54EF89E7h
jmp 00007EFC54F0507Eh
jmp 00007EFC54F14E49h
jmp 00007EFC54F3A004h
jmp 00007EFC54EE9B93h
jmp 00007EFC54DEF0FAh
jmp 00007EFC54F8E085h
jmp 00007EFC54F250CCh
jmp 00007EFC54ED2983h
jmp 00007EFC54F5E302h
jmp 00007EFC54E3BA51h
jmp 00007EFC54ED2788h
jmp 00007EFC54EEE9BBh
jmp 00007EFC54F59AAAh
jmp 00007EFC54F4EB15h
jmp 00007EFC54EDF70Ch
jmp 00007EFC54F193AFh
jmp 00007EFC54ED8C56h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x24fbd00x78.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2390000x13a4c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x2550000x1828.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x2093400x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x20aa200x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2091c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x24f0000xbd0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1dadeb0x1dae0010a6d7ad3ff35e8016eb80224a048754False0.34828706978810214data5.697633872285412IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1dc0000x553fb0x5540000cc44b0b3032f83001650a59af046fdFalse0.2979804343841642DIY-Thermocam raw data (Lepton 3.x), scale 29298-28530, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2361183241434822606848.000000, slope 18056348397753959481006358528.0000004.88354001059169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x2320000x68e00x3a009b27573eb65d809520a2a4d49c8b8385False0.130859375data3.112707803326104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x2390000x15aec0x15c00b4727c49c34746c0875efa255203cf5bFalse0.49016702586206895data5.87110131093572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0x24f0000x2ed10x3000906ce74aac2163d3fd2658373db52d63False0.24951171875data4.029686692197833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x2520000x3090x400c573bd7cea296a9c5d230ca6b5aee1a6False0.021484375data0.011173818721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0x2530000x1750x20077b66dfefd19366e7812c31a2435dc31False0.0703125data0.41168091652472194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.fptable0x2540000x2330x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x2550000x33410x34005aed6357a8902b771fcbf4f252033ffaFalse0.19005408653846154data3.376969983481898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
CRYPT32.dllCertGetNameStringW, CryptQueryObject, CertFindExtension, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryW, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertCreateCertificateChainEngine, CertOpenStore
ADVAPI32.dllCryptImportKey, CryptDestroyKey, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW, CryptEncrypt
WS2_32.dllconnect, getsockopt, gethostname, ioctlsocket, sendto, recvfrom, freeaddrinfo, getaddrinfo, listen, htonl, accept, select, __WSAFDIsSet, WSAIoctl, socket, setsockopt, recv, htons, getsockname, send, getpeername, bind, WSACleanup, WSAStartup, inet_ntop, WSASetLastError, ntohs, inet_pton, WSAGetLastError, closesocket, WSAWaitForMultipleEvents, WSASetEvent, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent
bcrypt.dllBCryptGenRandom
KERNEL32.dllWriteConsoleW, HeapSize, OutputDebugStringW, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, SetConsoleCtrlHandler, SetEndOfFile, SetStdHandle, HeapReAlloc, GetTimeZoneInformation, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, VirtualProtect, IsThreadAFiber, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, HeapFree, HeapAlloc, GetConsoleOutputCP, ReadConsoleW, GetConsoleMode, GetCommandLineW, GetCommandLineA, SetFilePointerEx, GetModuleHandleExW, FreeLibraryAndExitThread, ResumeThread, GetEnvironmentVariableW, SetEnvironmentVariableW, SetCurrentDirectoryW, GetCurrentDirectoryW, CreateDirectoryW, CreateFileW, DeleteFileW, GetFileAttributesW, GetFileSize, ReadFile, RemoveDirectoryW, WriteFile, IsDebuggerPresent, CloseHandle, GetLastError, SetLastError, SetNamedPipeHandleState, CreateNamedPipeW, InitializeConditionVariable, SetEvent, ResetEvent, ReleaseMutex, WaitForSingleObject, CreateMutexW, CreateEventW, CreateEventExW, CreateWaitableTimerExW, Sleep, WaitForMultipleObjects, GetCurrentProcess, GetCurrentProcessId, ExitProcess, GetCurrentThread, GetCurrentThreadId, SetThreadPriority, CreateProcessA, ProcessIdToSessionId, GetProcessId, OpenProcess, GetProcessHandleCount, SetProcessPriorityBoost, GetSystemInfo, GetSystemTime, SetSystemTime, GetLogicalProcessorInformation, GetSystemTimePreciseAsFileTime, CreateFileMappingW, OpenFileMappingW, MapViewOfFile, MapViewOfFileEx, UnmapViewOfFile, OpenJobObjectW, AssignProcessToJobObject, SetInformationJobObject, GetModuleFileNameW, GetModuleHandleW, GlobalAlloc, GlobalFree, LocalAlloc, LocalFree, SetProcessAffinityMask, QueryFullProcessImageNameW, RegisterWaitForSingleObject, FreeConsole, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceFrequency, GetSystemDirectoryW, FreeLibrary, GetProcAddress, LoadLibraryW, SleepEx, QueryPerformanceCounter, GetTickCount, MultiByteToWideChar, WideCharToMultiByte, MoveFileExW, WaitForSingleObjectEx, GetEnvironmentVariableA, GetStdHandle, GetFileType, PeekNamedPipe, VerSetConditionMask, GetModuleHandleA, VerifyVersionInfoW, GetFileSizeEx, FormatMessageA, GetLocaleInfoEx, ReleaseSRWLockShared, AcquireSRWLockShared, TryAcquireSRWLockExclusive, TryAcquireSRWLockShared, SleepConditionVariableSRW, GetTickCount64, GetStringTypeW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetDiskFreeSpaceExW, GetFileAttributesExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, GetFullPathNameW, SetFileAttributesW, SetFileInformationByHandle, SetFileTime, GetTempPathW, AreFileApisANSI, DeviceIoControl, CreateDirectoryExW, CopyFileW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, InitOnceExecuteOnce, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetSystemTimeAsFileTime, FreeLibraryWhenCallbackReturns, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, EncodePointer, DecodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, WakeAllConditionVariable, GetStartupInfoW, InitializeSListHead, ExitThread, RtlPcToFileHeader, RaiseException, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetDriveTypeW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, CreateThread, RtlUnwind
Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:21:26:20
Start date:02/10/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x7ff76bc10000
File size:2'427'392 bytes
MD5 hash:ED7E56BB217C2448AD3B61F5BFD83E16
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:21:26:20
Start date:02/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6ee680000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly