Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe
Analysis ID:1529188
MD5:b8192d9e9ce7362a3aba5a02fd309a32
SHA1:93a36ca96babd90db517f329a6a37fc3931667f3
SHA256:75f0da5d20808037e11e583ccfe0ec12d848e562e768e339e3da321019180806
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Entry point lies outside standard sections
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe (PID: 4464 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe" MD5: B8192D9E9CE7362A3ABA5A02FD309A32)
    • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeAvira: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeString found in binary or memory: https://sectigo.com/CPS0

System Summary

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: section name: .+&`
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: section name: ._h
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeReversingLabs: Detection: 39%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: d3dcompiler_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: xinput1_3.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeSection loaded: vcruntime140.dllJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic file information: File size 7209984 > 1048576
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: Raw size of .CF6 is bigger than: 0x100000 < 0x6dd600
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .CF6
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: section name: .+&`
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: section name: ._h
Source: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exeStatic PE information: section name: .CF6
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe39%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe100%AviraTR/AVI.Agent.hopoj
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSecuriteInfo.com.Win32.MalwareX-gen.218.20145.exefalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exefalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1529188
Start date and time:2024-10-08 18:24:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe
Detection:MAL
Classification:mal60.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe, PID 4464 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):7.9726915726766885
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe
File size:7'209'984 bytes
MD5:b8192d9e9ce7362a3aba5a02fd309a32
SHA1:93a36ca96babd90db517f329a6a37fc3931667f3
SHA256:75f0da5d20808037e11e583ccfe0ec12d848e562e768e339e3da321019180806
SHA512:521cae440f454dfa1b9504c90755ff73499c986954046bc74b937fb09496116428feada8beb7d8de1714d4ade227c04e51e18757509117c48eec11380c66c8bb
SSDEEP:196608:CiSFfmdI7uriJk0NbLEaPHQpmJJ/kkVXTZVJNKqV+:ZWfJ0zcL5Pwp4xTD3JfA
TLSH:757633632275118AF8D5CD3A8637FEE5B1F603ABCA81EC7854DE29C17D134E19723862
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...V<1d...............#............=.............@.................................W.n...@.............................O..
Icon Hash:90cececece8e8eb0
Entrypoint:0xceba3d
Entrypoint Section:.CF6
Digitally signed:true
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x64313C56 [Sat Apr 8 10:05:10 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e9d3b3b3fc4283cfcbc15752f4953517
Signature Valid:false
Signature Issuer:CN=Daniyar, E=espex@outlook.com, O=EspEx comp, L=Moscow, C=RU
Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
Error Number:-2146762487
Not Before, Not After
  • 31/03/2023 01:00:00 31/03/2031 01:00:00
Subject Chain
  • CN=Daniyar, E=espex@outlook.com, O=EspEx comp, L=Moscow, C=RU
Version:3
Thumbprint MD5:56ABEF17A392306016865A0C0A159F85
Thumbprint SHA-1:4722993BB461F9F4C2B0530476CE43C727DBE7FD
Thumbprint SHA-256:D7157AB9FFE3645FB0E998D98D08776DFB6EF1EBB25E8C6E07F6702962A8C21E
Serial:6143C24F375C4E3C
Instruction
call 00007F665D15DA0Ch
add ebp, 00000004h
cmp esp, edi
cmp edi, 3B205DF5h
xor ecx, ebx
stc
clc
not ecx
add ecx, 63880039h
clc
cmc
stc
ror ecx, 02h
cmc
test ebp, 5C8E5288h
not ecx
cmc
xor ebx, ecx
test esi, edi
cmp ecx, 02987A6Bh
jmp 00007F665CCDDCCAh
jne 00007F665CCFEF7Bh
mov eax, dword ptr [ebp+00h]
jmp 00007F665D093CBEh
dec ecx
jmp 00007F665CBFCDA2h
mov ecx, dword ptr [ebp+00h]
xor dx, bx
rcr dx, FF8Ch
movzx dx, dl
movzx dx, byte ptr [ecx]
cwde
add ebp, 00000002h
mov word ptr [ebp+00h], dx
movzx ax, bl
movsx eax, si
and ax, 00002C41h
lea edi, dword ptr [edi-00000004h]
mov eax, dword ptr [edi]
cmc
xor eax, ebx
jmp 00007F665CC77342h
dec edx
cmc
ror edx, 1
cmp eax, 4726086Bh
lea edx, dword ptr [edx+5B0D3454h]
xor ebx, edx
cmc
add esi, edx
jmp 00007F665D0DFE21h
jmp esi
jmp 00007F665CCF9451h
xor eax, ebx
test bp, si
cmp di, bp
sub eax, 28C363FBh
cmp sp, 7D2Ch
clc
neg eax
sub eax, 239D495Fh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x9d1ce40xc4f.CF6
IMAGE_DIRECTORY_ENTRY_IMPORT0xae96cc0x1cc.CF6
IMAGE_DIRECTORY_ENTRY_RESOURCE0xafa0000x1d5.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x6dec000x1800.CF6
IMAGE_DIRECTORY_ENTRY_BASERELOC0xaf90000x608.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x9dad080x18.CF6
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xaf82f00x40.CF6
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x41a0000xc8._h
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x48cf10x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x4a0000xa6b20x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x550000xda40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.+&`0x560000x3c395d0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
._h 0x41a0000x7580x8004076ab28271f3618c3fcf818ab574a6fFalse0.07421875data0.47187042525883377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CF60x41b0000x6dd5900x6dd600e5882c3c0b424499bd4230b9f2d11d65unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0xaf90000x6080x800ead0c3977d28c7fcca6af6545f5f6c41False0.42138671875data3.5293489168392984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xafa0000x1d50x20076e8d8753216a6d0e8ebea67318bc15aFalse0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xafa0580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllProcess32First
USER32.dllDispatchMessageA
ADVAPI32.dllGetUserNameA
MSVCP140.dll??Bid@locale@std@@QAEIXZ
d3d11.dllD3D11CreateDeviceAndSwapChain
dwmapi.dllDwmExtendFrameIntoClientArea
IMM32.dllImmReleaseContext
D3DCOMPILER_43.dllD3DCompile
XINPUT1_3.dll
VCRUNTIME140.dll_CxxThrowException
api-ms-win-crt-heap-l1-1-0.dll_callnewh
api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_exe
api-ms-win-crt-stdio-l1-1-0.dllfflush
api-ms-win-crt-string-l1-1-0.dllstrncpy
api-ms-win-crt-utility-l1-1-0.dllqsort
api-ms-win-crt-convert-l1-1-0.dllatof
api-ms-win-crt-locale-l1-1-0.dllsetlocale
api-ms-win-crt-math-l1-1-0.dll_CIfmod
api-ms-win-crt-filesystem-l1-1-0.dll_lock_file
KERNEL32.dllGetSystemTimeAsFileTime
USER32.dllCharUpperBuffW
KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:12:24:56
Start date:08/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.218.20145.exe"
Imagebase:0xe40000
File size:7'209'984 bytes
MD5 hash:B8192D9E9CE7362A3ABA5A02FD309A32
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:12:24:57
Start date:08/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly