Windows Analysis Report
SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe

Overview

General Information

Sample name: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Analysis ID: 1531476
MD5: e34989a504f009621c104f1b0d2b96a3
SHA1: d81ca519a01c142fd9daaf7ff2f209a811eedeec
SHA256: 4a97dac518b8632b89ddd91bb3a8fb641a7a992e346aa4f8a1023f1d260b48bb
Tags: exe
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Program does not show much activity (idle)

Classification

AV Detection

barindex
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Virustotal: Detection: 19% Perma Link
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\user\source\repos\ConsoleApplication2\x64\Release\ConsoleApplication2.pdb source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Source: classification engine Classification label: mal48.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2132:120:WilError_03
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Virustotal: Detection: 19%
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Section loaded: wintypes.dll Jump to behavior
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\user\source\repos\ConsoleApplication2\x64\Release\ConsoleApplication2.pdb source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Code function: 0_2_00007FF63AFE17CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF63AFE17CC
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Code function: 0_2_00007FF63AFE17CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF63AFE17CC
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Code function: 0_2_00007FF63AFE12D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF63AFE12D8
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Code function: 0_2_00007FF63AFE1974 SetUnhandledExceptionFilter, 0_2_00007FF63AFE1974
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe Code function: 0_2_00007FF63AFE16A4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00007FF63AFE16A4
No contacted IP infos