Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MP_TLK4EE_M_01G_Rev_E.exe

Overview

General Information

Sample name:MP_TLK4EE_M_01G_Rev_E.exe
Analysis ID:1530954
MD5:f1dd6bc64a726d4ecd808ce54c6dee6f
SHA1:45248f50638d1419b227afa2596340a757d736a3
SHA256:9637c20db05893ed94aef7fa8e5bbb6e55cee7b77c18e1c7fdca89171acef042
Infos:

Detection

Score:10
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Checks for kernel debuggers (COM1)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • MP_TLK4EE_M_01G_Rev_E.exe (PID: 7740 cmdline: "C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exe" MD5: F1DD6BC64A726D4ECD808CE54C6DEE6F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
MP_TLK4EE_M_01G_Rev_E.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1320318006.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: MP_TLK4EE_M_01G_Rev_E.exeString found in binary or memory: http://192.168.86.1/download.html
      Source: MP_TLK4EE_M_01G_Rev_E.exeString found in binary or memory: http://192.168.86.1/download.htmlHost192.168.86.1Content-Typemultipart/form-data;
      Source: MP_TLK4EE_M_01G_Rev_E.exeString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
      Source: MP_TLK4EE_M_01G_Rev_E.exeString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdurn:oasis:names:tc:entity:xmlns:x
      Source: MP_TLK4EE_M_01G_Rev_E.exeString found in binary or memory: http://www.xmlspy.com)
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: clean10.evad.winEXE@1/0@0/1
      Source: Yara matchFile source: MP_TLK4EE_M_01G_Rev_E.exe, type: SAMPLE
      Source: Yara matchFile source: 00000000.00000000.1320318006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeWindow found: window name: TComboBoxJump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeAutomated click: Continue
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic file information: File size 2429952 > 1048576
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x106200
      Source: MP_TLK4EE_M_01G_Rev_E.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x118600
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeWindow / User API: foregroundWindowGot 536Jump to behavior
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeWindow / User API: foregroundWindowGot 496Jump to behavior
      Source: MP_TLK4EE_M_01G_Rev_E.exe, 00000000.00000002.2587860474.000000000092F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP-
      Source: MP_TLK4EE_M_01G_Rev_E.exe, 00000000.00000002.2587860474.0000000000960000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/g
      Source: MP_TLK4EE_M_01G_Rev_E.exe, 00000000.00000002.2587860474.0000000000960000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exeFile opened: COM1Jump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
      Process Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      Application Window Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://192.168.86.1/download.htmlHost192.168.86.1Content-Typemultipart/form-data;MP_TLK4EE_M_01G_Rev_E.exefalse
          unknown
          http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdurn:oasis:names:tc:entity:xmlns:xMP_TLK4EE_M_01G_Rev_E.exefalse
            unknown
            http://www.xmlspy.com)MP_TLK4EE_M_01G_Rev_E.exefalse
              unknown
              http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdMP_TLK4EE_M_01G_Rev_E.exefalse
                unknown
                http://192.168.86.1/download.htmlMP_TLK4EE_M_01G_Rev_E.exefalse
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  IP
                  127.0.0.1
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1530954
                  Start date and time:2024-10-10 18:13:52 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 44s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:MP_TLK4EE_M_01G_Rev_E.exe
                  Detection:CLEAN
                  Classification:clean10.evad.winEXE@1/0@0/1
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: MP_TLK4EE_M_01G_Rev_E.exe
                  No simulations
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  s-part-0017.t-0009.t-msedge.nethttps://clicktime.symantec.com/15tpJCqdM9QTMPCbrFFYy?h=klzqFfVRykrA0KxCmyOSMtGNk2cnn93amKCU2afEZ8c=&u=https://www.tiktok.com/link/v2?aid%3D1988%26lang%3Den%26scene%3Dbio_url%26target%3Dhttps://www.google.ht/url?q%3Dhttps://google%25E3%2580%2582com/amp/s/cli.re/kBNkWr%23a2FyZW4ubWNjcm9ob25AdXJlbmNvLmNvbQ%3D%3D%252F%26opi%3D256371986142%26usg%3DlxfGUQNysmkDx%26source%3Dgmail%26ust%3D2908128326238375%26usg%3DAO2mBxLVnqpOjng75rOWFwZ2mBxLVnqpOqR75Get hashmaliciousHTMLPhisherBrowse
                  • 13.107.246.45
                  https://simplexml.federalinvoice.com/uQ3xo/Get hashmaliciousHTMLPhisherBrowse
                  • 13.107.246.45
                  https://pearl-contol.powerappsportals.comGet hashmaliciousHTMLPhisherBrowse
                  • 13.107.246.45
                  http://flipsnack.com/BA85A977C6F/oct2024/full-view.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 13.107.246.45
                  https://onlinefeature.blob.core.windows.net/plus/online.html?jd6123Get hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  fTq2vadDnr.exeGet hashmaliciousFormBookBrowse
                  • 13.107.246.45
                  https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                  • 13.107.246.45
                  jQw7LVWJYw.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  SecuriteInfo.com.Trojan-Ransom.Win32.Zerber.gkca.4990.15640.exeGet hashmaliciousUnknownBrowse
                  • 13.107.246.45
                  SecuriteInfo.com.Win32.CrypterX-gen.327.26539.exeGet hashmaliciousFormBookBrowse
                  • 13.107.246.45
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.522231277785134
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.70%
                  • Windows Screen Saver (13104/52) 0.13%
                  • DOS Executable Borland C++ (13009/5) 0.13%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  File name:MP_TLK4EE_M_01G_Rev_E.exe
                  File size:2'429'952 bytes
                  MD5:f1dd6bc64a726d4ecd808ce54c6dee6f
                  SHA1:45248f50638d1419b227afa2596340a757d736a3
                  SHA256:9637c20db05893ed94aef7fa8e5bbb6e55cee7b77c18e1c7fdca89171acef042
                  SHA512:c62679408e7052c3bef8cd7b8ed73f0df18d2486eba66e502041079d375ac66811ca690fb8f18958f6079bbcc905f1144fe3c22de6eaa0317dab70ca95833e93
                  SSDEEP:24576:GzXwkFWOfsaLRdsLPuHcacaqXcXa6Zue+6Qxp5AaqfzM2gQS1sKuBy4HB/BNl7BE:cdj9VdHt1a6g6Qpuyg2sK4//0e3cjuf
                  TLSH:65B5E026B2838036C11B12B04C6B5B3E9A3BFE103B34E19757F5295C5FB879179162EB
                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                  Icon Hash:aba9236263372626
                  Entrypoint:0x4013cc
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:
                  Time Stamp:0x5B2A5BE5 [Wed Jun 20 13:51:33 2018 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:fc89dec0f42d6a9b40797db8229922e9
                  Instruction
                  jmp 00007FC250DBA452h
                  bound di, dword ptr [edx]
                  inc ebx
                  sub ebp, dword ptr [ebx]
                  dec eax
                  dec edi
                  dec edi
                  dec ebx
                  nop
                  jmp 00007FC2512C24DDh
                  mov eax, dword ptr [0050808Bh]
                  shl eax, 02h
                  mov dword ptr [0050808Fh], eax
                  push edx
                  push 00000000h
                  call 00007FC250EBF95Ch
                  mov edx, eax
                  call 00007FC250E9C0BBh
                  pop edx
                  call 00007FC250E9C019h
                  call 00007FC250E9C0F0h
                  push 00000000h
                  call 00007FC250E9D7F1h
                  pop ecx
                  push 00508034h
                  push 00000000h
                  call 00007FC250EBF936h
                  mov dword ptr [00508093h], eax
                  push 00000000h
                  jmp 00007FC250EA78E8h
                  jmp 00007FC250E9D81Fh
                  xor eax, eax
                  mov al, byte ptr [0050807Dh]
                  ret
                  mov eax, dword ptr [00508093h]
                  ret
                  pushad
                  mov ebx, BCB05000h
                  push ebx
                  push 00000BADh
                  ret
                  mov ecx, 0000026Ch
                  or ecx, ecx
                  je 00007FC250DBA48Fh
                  cmp dword ptr [0050808Bh], 00000000h
                  jnc 00007FC250DBA44Ch
                  mov eax, 000000FEh
                  call 00007FC250DBA41Ch
                  mov ecx, 0000026Ch
                  push ecx
                  push 00000008h
                  call 00007FC250EBF8F9h
                  push eax
                  call 00007FC250EBF97Dh
                  or eax, eax
                  jne 00007FC250DBA44Ch
                  mov eax, 000000FDh
                  call 00007FC250DBA3FBh
                  push eax
                  push eax
                  push dword ptr [0050808Bh]
                  call 00007FC250EA7AB2h
                  push dword ptr [0050808Bh]
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x14f0000x158.edata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x14c0000x2b5d.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1500000x11840c.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x2690000xec10.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x14b0000x18.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1070000x10620067bd78885d0fe9160d0bca7e065ca1c5False0.48972863018597995data6.584006784746428IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x1080000x420000x2040065fbbc677e21dddca2e58a5c273e37b0False0.28558775436046513data5.531343197326775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .tls0x14a0000x10000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x14b0000x10000x200861223d5fe91108772b247c0273de960False0.0546875data0.2147325177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                  .idata0x14c0000x30000x2c0061de5cfacc1ab0dc0d937d1870a80c36False0.3280362215909091data5.216491594441706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .edata0x14f0000x10000x200fa77f06274bddcf2d1112c8948741eb0False0.453125data3.8654590554576145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x1500000x11840c0x118600663b52d22e64373d3d4f4e6a5860d845False0.895078090169416data7.989273671471123IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x2690000xf0000xee0019ab1502ffc4d42b8d19a5d15f7bf7dcFalse0.6578092174369747data6.705049900055149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_CURSOR0x150b280x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                  RT_CURSOR0x150c5c0x134data0.4642857142857143
                  RT_CURSOR0x150d900x134data0.4805194805194805
                  RT_CURSOR0x150ec40x134data0.38311688311688313
                  RT_CURSOR0x150ff80x134data0.36038961038961037
                  RT_CURSOR0x15112c0x134data0.4090909090909091
                  RT_CURSOR0x1512600x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                  RT_BITMAP0x1513940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                  RT_BITMAP0x1515640x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                  RT_BITMAP0x1517480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                  RT_BITMAP0x1519180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                  RT_BITMAP0x151ae80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                  RT_BITMAP0x151cb80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                  RT_BITMAP0x151e880x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                  RT_BITMAP0x1520580x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                  RT_BITMAP0x1522280x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                  RT_BITMAP0x1523f80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                  RT_BITMAP0x1525c80xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                  RT_ICON0x1526b00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640FinnishFinland0.25806451612903225
                  RT_DIALOG0x1529980x52data0.7682926829268293
                  RT_STRING0x1529ec0x42data0.6666666666666666
                  RT_STRING0x152a300x2fcdata0.4489528795811518
                  RT_STRING0x152d2c0xc0data0.6041666666666666
                  RT_STRING0x152dec0xfcdata0.5873015873015873
                  RT_STRING0x152ee80x120data0.5729166666666666
                  RT_STRING0x1530080x49cdata0.38305084745762713
                  RT_STRING0x1534a40x398data0.4108695652173913
                  RT_STRING0x15383c0xf0data0.4666666666666667
                  RT_STRING0x15392c0xd8data0.5740740740740741
                  RT_STRING0x153a040x274data0.4745222929936306
                  RT_STRING0x153c780x390data0.31359649122807015
                  RT_STRING0x1540080x3acdata0.3819148936170213
                  RT_STRING0x1543b40x2bcdata0.42857142857142855
                  RT_STRING0x1546700x3a4data0.3551502145922747
                  RT_STRING0x154a140x43cdata0.3856088560885609
                  RT_RCDATA0x154e500x10data1.5
                  RT_RCDATA0x154e600x2351exported SGML document, Unicode text, UTF-8 text, with CRLF line terminators0.22807211591638094
                  RT_RCDATA0x1571b40xb1ASCII text, with no line terminators0.6836158192090396
                  RT_RCDATA0x1572680x10c36ddata0.9080820083618164
                  RT_RCDATA0x2635d80x4b0aDelphi compiled form 'TForm1'0.9162935970848516
                  RT_RCDATA0x2680e40x288Delphi compiled form 'TPasswordDlg'0.5941358024691358
                  RT_GROUP_CURSOR0x26836c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                  RT_GROUP_CURSOR0x2683800x14Lotus unknown worksheet or configuration, revision 0x11.25
                  RT_GROUP_CURSOR0x2683940x14Lotus unknown worksheet or configuration, revision 0x11.3
                  RT_GROUP_CURSOR0x2683a80x14Lotus unknown worksheet or configuration, revision 0x11.3
                  RT_GROUP_CURSOR0x2683bc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                  RT_GROUP_CURSOR0x2683d00x14Lotus unknown worksheet or configuration, revision 0x11.3
                  RT_GROUP_CURSOR0x2683e40x14Lotus unknown worksheet or configuration, revision 0x11.3
                  RT_GROUP_ICON0x2683f80x14dataFinnishFinland1.2
                  DLLImport
                  WININET.DLLHttpEndRequestA, HttpOpenRequestA, HttpSendRequestA, HttpSendRequestExA, InternetCloseHandle, InternetConnectA, InternetOpenA, InternetReadFile, InternetSetStatusCallback, InternetWriteFile
                  WTSAPI32.DLLWTSEnumerateProcessesA, WTSFreeMemory
                  ADVAPI32.DLLRegCloseKey, RegOpenKeyExA, RegQueryValueExA
                  KERNEL32.DLLBeep, BeginUpdateResourceA, CloseHandle, CompareStringA, CreateEventA, CreateFileA, CreateFileW, CreateMutexA, CreateSemaphoreA, CreateThread, DeleteCriticalSection, DeleteFileA, EndUpdateResourceA, EnterCriticalSection, EnumCalendarInfoA, ExitProcess, FileTimeToLocalFileTime, FileTimeToSystemTime, FindClose, FindFirstFileA, FindResourceA, FormatMessageA, FreeLibrary, FreeResource, GetACP, GetCPInfo, GetCommState, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcessId, GetCurrentThreadId, GetDateFormatA, GetDiskFreeSpaceA, GetDriveTypeA, GetEnvironmentStrings, GetFileAttributesA, GetFileAttributesW, GetFileSize, GetFileType, GetFullPathNameA, GetLastError, GetLocalTime, GetLocaleInfoA, GetLogicalDrives, GetModuleFileNameA, GetModuleHandleA, GetOEMCP, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, GetStringTypeA, GetStringTypeExA, GetStringTypeW, GetSystemDefaultLangID, GetSystemInfo, GetThreadLocale, GetTickCount, GetTimeZoneInformation, GetUserDefaultLCID, GetVersion, GetVersionExA, GlobalAddAtomA, GlobalAlloc, GlobalDeleteAtom, GlobalFindAtomA, GlobalFree, GlobalHandle, GlobalLock, GlobalReAlloc, GlobalUnlock, HeapAlloc, HeapFree, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, IsValidLocale, LCMapStringA, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadResource, LocalAlloc, LocalFree, LockResource, MulDiv, MultiByteToWideChar, RaiseException, ReadFile, ReleaseMutex, ReleaseSemaphore, ResetEvent, RtlUnwind, SetCommMask, SetCommState, SetCommTimeouts, SetConsoleCtrlHandler, SetEndOfFile, SetErrorMode, SetEvent, SetFilePointer, SetHandleCount, SetLastError, SetNamedPipeHandleState, SetThreadLocale, SizeofResource, Sleep, TerminateThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UpdateResourceA, VirtualAlloc, VirtualFree, VirtualQuery, WaitCommEvent, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcmpA, lstrcpyA, lstrcpynA, lstrlenA
                  VERSION.DLLGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
                  WSOCK32.DLLWSACleanup, WSAGetLastError, WSAStartup, __WSAFDIsSet, closesocket, connect, gethostbyname, getsockopt, htons, inet_ntoa, ntohs, recv, select, send, socket
                  COMCTL32.DLLImageList_Add, ImageList_BeginDrag, ImageList_Create, ImageList_Destroy, ImageList_DragEnter, ImageList_DragLeave, ImageList_DragMove, ImageList_DragShowNolock, ImageList_Draw, ImageList_DrawEx, ImageList_EndDrag, ImageList_GetBkColor, ImageList_GetDragImage, ImageList_GetIconSize, ImageList_GetImageCount, ImageList_Read, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetBkColor, ImageList_SetDragCursorImage, ImageList_SetIconSize, ImageList_Write
                  COMDLG32.DLLGetOpenFileNameA, GetSaveFileNameA
                  GDI32.DLLBitBlt, CombineRgn, CopyEnhMetaFileA, CreateBitmap, CreateBrushIndirect, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, CreateDIBitmap, CreateFontIndirectA, CreateHalftonePalette, CreatePalette, CreatePenIndirect, CreateRectRgn, CreateSolidBrush, DeleteDC, DeleteEnhMetaFile, DeleteObject, ExcludeClipRect, ExtTextOutA, GdiFlush, GetBitmapBits, GetBrushOrgEx, GetClipBox, GetCurrentPositionEx, GetDCOrgEx, GetDIBColorTable, GetDIBits, GetDeviceCaps, GetEnhMetaFileBits, GetEnhMetaFileHeader, GetEnhMetaFilePaletteEntries, GetObjectA, GetPaletteEntries, GetPixel, GetRgnBox, GetStockObject, GetSystemPaletteEntries, GetTextExtentPoint32A, GetTextMetricsA, GetWinMetaFileBits, GetWindowOrgEx, IntersectClipRect, LineTo, MaskBlt, MoveToEx, PatBlt, PlayEnhMetaFile, RealizePalette, RectVisible, Rectangle, RestoreDC, SaveDC, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetBrushOrgEx, SetDIBColorTable, SetEnhMetaFileBits, SetPixel, SetROP2, SetStretchBltMode, SetTextColor, SetViewportOrgEx, SetWinMetaFileBits, SetWindowOrgEx, StretchBlt, UnrealizeObject
                  SHELL32.DLLSHBrowseForFolderA, ShellExecuteA, SHGetPathFromIDListA
                  USER32.DLLActivateKeyboardLayout, AdjustWindowRectEx, BeginPaint, CallNextHookEx, CallWindowProcA, CharLowerA, CharLowerBuffA, CharNextA, CheckMenuItem, ChildWindowFromPoint, ClientToScreen, CreateIcon, CreateMenu, CreatePopupMenu, CreateWindowExA, DefFrameProcA, DefMDIChildProcA, DefWindowProcA, DeleteMenu, DestroyCursor, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageA, DrawEdge, DrawFocusRect, DrawFrameControl, DrawIcon, DrawIconEx, DrawMenuBar, DrawTextA, EnableMenuItem, EnableScrollBar, EnableWindow, EndPaint, EnumThreadWindows, EnumWindows, EqualRect, FillRect, FindWindowA, FrameRect, GetActiveWindow, GetCapture, GetClassInfoA, GetClassNameA, GetClientRect, GetClipboardData, GetCursor, GetCursorPos, GetDC, GetDCEx, GetDesktopWindow, GetDlgItem, GetFocus, GetForegroundWindow, GetIconInfo, GetKeyNameTextA, GetKeyState, GetKeyboardLayout, GetKeyboardLayoutList, GetKeyboardState, GetKeyboardType, GetLastActivePopup, GetMenu, GetMenuItemCount, GetMenuItemID, GetMenuItemInfoA, GetMenuState, GetMenuStringA, GetMessagePos, GetParent, GetPropA, GetScrollInfo, GetScrollPos, GetScrollRange, GetSubMenu, GetSystemMenu, GetSystemMetrics, GetTopWindow, GetWindow, GetWindowDC, GetWindowLongA, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, InflateRect, InsertMenuA, InsertMenuItemA, IntersectRect, InvalidateRect, IsChild, IsDialogMessageA, IsIconic, IsRectEmpty, IsWindow, IsWindowEnabled, IsWindowVisible, IsZoomed, KillTimer, LoadBitmapA, LoadCursorA, LoadIconA, LoadKeyboardLayoutA, LoadStringA, MapVirtualKeyA, MapWindowPoints, MessageBoxA, OemToCharA, OffsetRect, PeekMessageA, PostMessageA, PostQuitMessage, PtInRect, RedrawWindow, RegisterClassA, RegisterClipboardFormatA, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, RemoveMenu, RemovePropA, ScreenToClient, ScrollWindow, SendMessageA, SetActiveWindow, SetCapture, SetClassLongA, SetCursor, SetFocus, SetForegroundWindow, SetMenu, SetMenuItemInfoA, SetPropA, SetRect, SetScrollInfo, SetScrollPos, SetScrollRange, SetTimer, SetWindowLongA, SetWindowPlacement, SetWindowPos, SetWindowTextA, SetWindowsHookExA, ShowCursor, ShowOwnedPopups, ShowScrollBar, ShowWindow, SystemParametersInfoA, TrackPopupMenu, TranslateMDISysAccel, TranslateMessage, UnhookWindowsHookEx, UnregisterClassA, UpdateWindow, WaitMessage, WinHelpA, WindowFromPoint, wsprintfA, GetSysColor
                  OLE32.DLLCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoUninitialize
                  OLEAUT32.DLLSafeArrayCreate, SafeArrayGetElement, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayRedim, SysAllocStringLen, SysFreeString, SysReAllocStringLen, VariantChangeType, VariantClear, VariantCopy, VariantCopyInd, VariantInit
                  NameOrdinalAddress
                  @@Maidcomutil@Finalize50x4118d8
                  @@Maidcomutil@Initialize40x4118c8
                  @@Main_form@Finalize30x40c818
                  @@Main_form@Initialize20x40c800
                  @@Wininet_post@Finalize70x412988
                  @@Wininet_post@Initialize60x412978
                  _Form190x528268
                  _PasswordDlg100x543980
                  __GetExceptDLLinfo10x401425
                  ___CPPdebugHook80x508098
                  Language of compilation systemCountry where language is spokenMap
                  FinnishFinland
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 10, 2024 18:14:40.039271116 CEST1.1.1.1192.168.2.90xf402No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                  Oct 10, 2024 18:14:40.039271116 CEST1.1.1.1192.168.2.90xf402No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:12:14:41
                  Start date:10/10/2024
                  Path:C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\MP_TLK4EE_M_01G_Rev_E.exe"
                  Imagebase:0x400000
                  File size:2'429'952 bytes
                  MD5 hash:F1DD6BC64A726D4ECD808CE54C6DEE6F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:Borland Delphi
                  Yara matches:
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1320318006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  No disassembly