Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
Analysis ID:1527906
MD5:eaf75c53fccbbb7bb45e96fe3c642cfc
SHA1:89741ce1b3f522d995ea1e311b758e09384ae4f6
SHA256:9f12616bd66ff80dfbed9355844515746b0371e075616ccb7b8f776584e02e05
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses bcdedit to modify the Windows boot settings
Abnormal high CPU Usage
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: New Kernel Driver Via SC.EXE
Sigma detected: Suspicious Copy From or To System Directory
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe (PID: 6984 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe" MD5: EAF75C53FCCBBB7BB45E96FE3C642CFC)
    • conhost.exe (PID: 7012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5480 cmdline: C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • bcdedit.exe (PID: 2860 cmdline: bcdedit /set hypervisorlaunchtype off MD5: 74F7B84B0A547592CA63A00A8C4AD583)
    • cmd.exe (PID: 4928 cmdline: C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f > NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • reg.exe (PID: 4900 cmdline: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • cmd.exe (PID: 2476 cmdline: C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 6024 cmdline: C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5224 cmdline: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7116 cmdline: C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys>NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 3140 cmdline: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4428 cmdline: C:\Windows\system32\cmd.exe /c sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S>NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6744 cmdline: sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , CommandLine: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6024, ParentProcessName: cmd.exe, ProcessCommandLine: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , ProcessId: 5224, ProcessName: sc.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL, CommandLine: C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe, ParentProcessId: 6984, ParentProcessName: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL, ProcessId: 2476, ProcessName: cmd.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , CommandLine: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6024, ParentProcessName: cmd.exe, ProcessCommandLine: sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" , ProcessId: 5224, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.3% probability
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: jC:\Users\Sleepy\Documents\coding\Roblox\registry-callbacks-master\UserMode\.pdb?? source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
Source: Binary string: C:\Users\Sleepy\Documents\coding\Roblox\registry-callbacks-master\UserMode\.pdb source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeString found in binary or memory: https://www.dearimgui.com/faq/
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeString found in binary or memory: https://www.dearimgui.com/faq/Set
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f
Source: classification engineClassification label: mal56.winEXE@24/7@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7012:120:WilError_03
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bcdedit.exe bcdedit /set hypervisorlaunchtype off
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f > NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys>NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S>NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys>NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S>NULJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bcdedit.exe bcdedit /set hypervisorlaunchtype offJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sysJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8SJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: xinput1_4.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\bcdedit.exeSection loaded: cryptsp.dllJump to behavior
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: jC:\Users\Sleepy\Documents\coding\Roblox\registry-callbacks-master\UserMode\.pdb?? source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
Source: Binary string: C:\Users\Sleepy\Documents\coding\Roblox\registry-callbacks-master\UserMode\.pdb source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NUL
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bcdedit.exe bcdedit /set hypervisorlaunchtype off
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NULJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bcdedit.exe bcdedit /set hypervisorlaunchtype offJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeWindow / User API: threadDelayed 3048Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeWindow / User API: threadDelayed 509Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeWindow / User API: foregroundWindowGot 762Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeWindow / User API: foregroundWindowGot 757Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe TID: 7124Thread sleep time: -30480s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys>NULJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S>NULJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\bcdedit.exe bcdedit /set hypervisorlaunchtype offJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sysJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8SJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Windows Service
1
Modify Registry
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network Medium1
Inhibit System Recovery
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1527906 Sample: SecuriteInfo.com.Variant.Te... Startdate: 07/10/2024 Architecture: WINDOWS Score: 56 29 Multi AV Scanner detection for submitted file 2->29 31 AI detected suspicious sample 2->31 7 SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe 2 1 2->7         started        process3 signatures4 33 Uses bcdedit to modify the Windows boot settings 7->33 10 cmd.exe 1 7->10         started        13 cmd.exe 1 7->13         started        15 cmd.exe 1 7->15         started        17 4 other processes 7->17 process5 signatures6 35 Uses bcdedit to modify the Windows boot settings 10->35 19 bcdedit.exe 1 1 10->19         started        21 reg.exe 1 13->21         started        23 sc.exe 1 15->23         started        25 sc.exe 1 17->25         started        27 sc.exe 1 17->27         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe18%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.dearimgui.com/faq/SetSecuriteInfo.com.Variant.Tedy.602488.7106.22030.exefalse
    unknown
    https://www.dearimgui.com/faq/SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exefalse
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1527906
      Start date and time:2024-10-07 11:36:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 9s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
      Detection:MAL
      Classification:mal56.winEXE@24/7@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
      TimeTypeDescription
      05:37:50API Interceptor568853x Sleep call for process: SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):445
      Entropy (8bit):5.309953850681003
      Encrypted:false
      SSDEEP:6:h1wv2sHU6BX38q1f+bqtHGwv2sHU6/f59e7uW/yT5oJ6JAYj0cMDtAMvgLkBwfM7:hmRhx5+bOR/R9cZfiAYj7Mv+fM2AF6w
      MD5:8131525E40B4C23E2308000C3CE05A4C
      SHA1:B47E7801A29420EEB77A639D20817093DA3E233D
      SHA-256:FB91D84AEA6AE64A3DE0DD171802EC06E6A1C60817EE408EA2FFEF21F02BFB0F
      SHA-512:176743BFE0991E03788A993E89734EC50EA436262A7A30AE0D6E37F1D157BD6097A170CD75A6F4C36D3A02D0DEEC956B7B4035E5A410FF70A7C22FFCAF17ADE1
      Malicious:false
      Preview:Path C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe..Registry value VulnerableDriverBlocklistEnable set to 0...Current directory under C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71..Driver C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys....[*] pinkel_tinkler by emlinhax..[!] could not find your driver...[Kernel driver not loaded]..[Info] Press VK_Home to unload...[Status] Running!..
      Process:C:\Windows\System32\sc.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):77
      Entropy (8bit):4.662591170919944
      Encrypted:false
      SSDEEP:3:OEAAKzgbzUWnRthLK5a6eCMABf:O5DePRoJPP
      MD5:51F0894392FBB61AD37D41C273902DF6
      SHA1:9AE239218209C65D125C098F5BE32B8943B1AB76
      SHA-256:43220363A318385B6C870AF82B163098813EB92E9A44D95FDDCF20D0B848FB2C
      SHA-512:6CEF129C13044E41AFEC7247A5AE8A1EBE7BC5150A8E48AF842BDAE8C7208C4E882E41F71884351464901D7322498B244BE5B921B4F0E3D929EDFC5A1845DE95
      Malicious:false
      Preview:[SC] StartService FAILED 2:....The system cannot find the file specified.....
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):6.614237660035011
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
      File size:688'640 bytes
      MD5:eaf75c53fccbbb7bb45e96fe3c642cfc
      SHA1:89741ce1b3f522d995ea1e311b758e09384ae4f6
      SHA256:9f12616bd66ff80dfbed9355844515746b0371e075616ccb7b8f776584e02e05
      SHA512:b4a6c521f33cba2d55248fd793fa248f0220e46836709c1e3ceca2d7d5d54d0757b722baa60147fa25bcc6472846597447ef0609f15004476913d887445796ed
      SSDEEP:12288:2dxHR0k2s1Qu/9NHUT4OWc0w0T9DiCE+RBOSSjDMcH3/Lrbny0xT0GRiLq+jm5vg:Sx0kJ1QYmWDwa0CRBOSSjDT3/Lrbnhxx
      TLSH:DFE4A052B2B440F9D067B039B0DA770BEB3178580321D6D727D856693F923F16ABB722
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............~K..~K..~K...K..~K...J..~K..{J..~K..zJ..~K..}J..~K...J..~K...K..~K..wJ..~K...K..~K..|J..~KRich..~K................PE..d..
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x14006d3c4
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x66771A92 [Sat Jun 22 18:40:18 2024 UTC]
      TLS Callbacks:0x4006d07c, 0x1
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:69722309cfb80c4be496b27b24e06a25
      Instruction
      dec eax
      sub esp, 28h
      call 00007F25D4DAF714h
      dec eax
      add esp, 28h
      jmp 00007F25D4DAF167h
      int3
      int3
      and dword ptr [00037951h], 00000000h
      ret
      dec eax
      mov dword ptr [esp+08h], ebx
      push ebp
      dec eax
      lea ebp, dword ptr [esp-000004C0h]
      dec eax
      sub esp, 000005C0h
      mov ebx, ecx
      mov ecx, 00000017h
      call dword ptr [00003D66h]
      test eax, eax
      je 00007F25D4DAF2F6h
      mov ecx, ebx
      int 29h
      mov ecx, 00000003h
      call 00007F25D4DAF2B9h
      xor edx, edx
      dec eax
      lea ecx, dword ptr [ebp-10h]
      inc ecx
      mov eax, 000004D0h
      call 00007F25D4DAFF75h
      dec eax
      lea ecx, dword ptr [ebp-10h]
      call dword ptr [00003DD1h]
      dec eax
      mov ebx, dword ptr [ebp+000000E8h]
      dec eax
      lea edx, dword ptr [ebp+000004D8h]
      dec eax
      mov ecx, ebx
      inc ebp
      xor eax, eax
      call dword ptr [00003D4Fh]
      dec eax
      test eax, eax
      je 00007F25D4DAF32Eh
      dec eax
      and dword ptr [esp+38h], 00000000h
      dec eax
      lea ecx, dword ptr [ebp+000004E0h]
      dec eax
      mov edx, dword ptr [ebp+000004D8h]
      dec esp
      mov ecx, eax
      dec eax
      mov dword ptr [esp+30h], ecx
      dec esp
      mov eax, ebx
      dec eax
      lea ecx, dword ptr [ebp+000004E8h]
      dec eax
      mov dword ptr [esp+28h], ecx
      dec eax
      lea ecx, dword ptr [ebp-10h]
      dec eax
      mov dword ptr [esp+20h], ecx
      xor ecx, ecx
      call dword ptr [00003D06h]
      dec eax
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xa11c40x1b8.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x1e8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa70000x47b8.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xad0000x47c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x979e00x70.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x97c000x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x97a500x138.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x710000x958.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x6f5930x6f6003f76d97b6f697fc1fc2f6bee9026fff7False0.5246124438832772data6.4767559577071685IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x710000x32eaa0x3300037dc466519efc5ec35d8bae47fd1e53eFalse0.3777908624387255data5.823076068710632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa40000x25080x80050734c2062982f28f1322c95429af3edFalse0.2470703125data3.9423627078888543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0xa70000x47b80x4800d9a555e9dc8bd0fcd43daa9c3a3281bfFalse0.4684787326388889data5.841821730276356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0xac0000x1e80x200708fe13d40a54950affd43033ce48eb1False0.54296875data4.762595083624659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xad0000x47c0x6003081672db8e8185b353067a3a1cab183False0.4205729166666667data4.576470345338892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0xac0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
      DLLImport
      KERNEL32.dllProcess32NextW, CreateFileA, DeleteFileW, Process32FirstW, CloseHandle, GetModuleHandleW, GetConsoleWindow, GetLastError, GetFileInformationByHandleEx, AreFileApisANSI, GetFileAttributesExW, FindNextFileW, CreateToolhelp32Snapshot, FindClose, CreateFileW, FormatMessageA, LocalFree, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, IsDebuggerPresent, CreateEventW, WaitForSingleObjectEx, ResetEvent, SetEvent, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, GetCurrentDirectoryA, DeviceIoControl, QueryPerformanceCounter, FreeLibrary, VerSetConditionMask, GetProcAddress, QueryPerformanceFrequency, LoadLibraryA, GetLocaleInfoA, GetModuleHandleA, GlobalUnlock, WideCharToMultiByte, RtlCaptureContext, GetFileAttributesA, GlobalLock, GlobalFree, GlobalAlloc, FindFirstFileExW, MultiByteToWideChar
      USER32.dllFindWindowA, PeekMessageW, GetMonitorInfoW, GetKeyboardLayout, DefWindowProcW, GetWindowRect, SetWindowDisplayAffinity, MoveWindow, SetLayeredWindowAttributes, TranslateMessage, LoadIconW, SetWindowLongW, PostQuitMessage, GetDesktopWindow, UpdateWindow, SendInput, GetKeyState, GetMessageExtraInfo, MonitorFromWindow, DestroyWindow, ScreenToClient, GetAsyncKeyState, GetCapture, ClientToScreen, SetClipboardData, CreateWindowExW, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard, GetSystemMetrics, GetCursorPos, UnregisterClassW, SetCursorPos, ReleaseCapture, TrackMouseEvent, RegisterClassExW, ShowWindow, IsWindowUnicode, SetProcessDPIAware, GetClientRect, SetCursor, SetCapture, LoadCursorW, GetForegroundWindow, DispatchMessageW
      GDI32.dllCreateSolidBrush
      ADVAPI32.dllRegOpenKeyExW, RegSetValueExW, RegSetValueExA, RegCloseKey, RegOpenKeyExA
      SHELL32.dllSHGetFolderPathW
      IMM32.dllImmSetCompositionWindow, ImmGetContext, ImmSetCandidateWindow, ImmReleaseContext
      D3DCOMPILER_47.dllD3DCompile
      dwmapi.dllDwmExtendFrameIntoClientArea
      MSVCP140.dll?always_noconv@codecvt_base@std@@QEBA_NXZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Xout_of_range@std@@YAXPEBD@Z, ?_Xlength_error@std@@YAXPEBD@Z, _Xtime_get_ticks, ??Bid@locale@std@@QEAA_KXZ, _Query_perf_frequency, ?_Throw_Cpp_error@std@@YAXH@Z, ?uncaught_exceptions@std@@YAHXZ, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?_Random_device@std@@YAIXZ, _Cnd_do_broadcast_at_thread_exit, _Thrd_sleep, _Query_perf_counter, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, _Thrd_id, _Thrd_join, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z, ?_Winerror_map@std@@YAHH@Z, ?_Throw_C_error@std@@YAXH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, _Thrd_detach, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
      d3d11.dllD3D11CreateDeviceAndSwapChain
      VCRUNTIME140_1.dll__CxxFrameHandler4
      VCRUNTIME140.dllmemchr, __std_terminate, memcmp, memcpy, memmove, strstr, __std_exception_destroy, __std_exception_copy, __C_specific_handler, _CxxThrowException, memset, __current_exception_context, __current_exception
      api-ms-win-crt-stdio-l1-1-0.dllungetc, setvbuf, fgetpos, fgetc, fputc, fsetpos, _get_stream_buffer_pointers, __acrt_iob_func, __p__commode, fclose, ftell, fflush, _fseeki64, fseek, __stdio_common_vfprintf, fwrite, _wfopen, __stdio_common_vsprintf, __stdio_common_vsscanf, fread, _set_fmode
      api-ms-win-crt-utility-l1-1-0.dllrand, qsort
      api-ms-win-crt-string-l1-1-0.dllstrncpy, strncmp, strcmp
      api-ms-win-crt-heap-l1-1-0.dll_callnewh, _set_new_mode, free, malloc
      api-ms-win-crt-convert-l1-1-0.dllatof, strtoull
      api-ms-win-crt-runtime-l1-1-0.dllexit, _beginthreadex, system, _register_thread_local_exe_atexit_callback, _c_exit, __p___argv, __p___argc, terminate, _exit, _initterm_e, _initterm, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _invalid_parameter_noinfo_noreturn
      api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
      api-ms-win-crt-math-l1-1-0.dllpow, acosf, sinf, atan2f, sqrt, cosf, ceilf, fmodf, sqrtf, powf, __setusermatherr
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.7106.22030.exe"
      Imagebase:0x7ff69cee0000
      File size:688'640 bytes
      MD5 hash:EAF75C53FCCBBB7BB45E96FE3C642CFC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:2
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c bcdedit /set hypervisorlaunchtype off >NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Windows\System32\bcdedit.exe
      Wow64 process (32bit):false
      Commandline:bcdedit /set hypervisorlaunchtype off
      Imagebase:0x7ff6690d0000
      File size:491'864 bytes
      MD5 hash:74F7B84B0A547592CA63A00A8C4AD583
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:4
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f > NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:05:37:00
      Start date:07/10/2024
      Path:C:\Windows\System32\reg.exe
      Wow64 process (32bit):false
      Commandline:reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 0 /f
      Imagebase:0x7ff6a4da0000
      File size:77'312 bytes
      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:6
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c copy "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.602488.71KernelMode.sys" "C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys" > NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\sc.exe
      Wow64 process (32bit):false
      Commandline:sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binPath="C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys"
      Imagebase:0x7ff7f7bb0000
      File size:72'192 bytes
      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:9
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys>NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\sc.exe
      Wow64 process (32bit):false
      Commandline:sc create sPdzrFj5MyJVEO29Rs0hjwD7Npia8S type=kernel binpath=C:\Windows\System32\drivers\sPdzrFj5MyJVEO29Rs0hjwD7Npia8S.sys
      Imagebase:0x7ff7f7bb0000
      File size:72'192 bytes
      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:11
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S>NUL
      Imagebase:0x7ff6f2390000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:05:37:01
      Start date:07/10/2024
      Path:C:\Windows\System32\sc.exe
      Wow64 process (32bit):false
      Commandline:sc start sPdzrFj5MyJVEO29Rs0hjwD7Npia8S
      Imagebase:0x7ff7f7bb0000
      File size:72'192 bytes
      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      No disassembly