Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
Analysis ID:1532505
MD5:2452e269ee2a615e90c5e19a373b0239
SHA1:6e02258265d33f5d622997091065953c4730ec10
SHA256:4c0dbbf022d7dfc0b4eacb34dbb4d41e3fd860c04057362002a5d4a6e0220a55
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe (PID: 6884 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe" MD5: 2452E269EE2A615E90C5E19A373B0239)
    • conhost.exe (PID: 6896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeReversingLabs: Detection: 52%
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeVirustotal: Detection: 54%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 18.166.250.135:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\bin\Release\Bootstrapper.pdb source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
Source: global trafficHTTP traffic detected: GET /quiving/Solara/raw/branch/main/Files/endpoint HTTP/1.1Host: gitea.comConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /quiving/Solara/raw/branch/main/Files/endpoint HTTP/1.1Host: gitea.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: gitea.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 13 Oct 2024 12:27:01 GMTContent-Type: text/plain;charset=utf-8Content-Length: 11Connection: closeCache-Control: max-age=0, private, must-revalidate, no-transformServer: CaddySet-Cookie: i_like_gitea=775661cd8dc0adc0; Path=/; HttpOnly; Secure; SameSite=LaxSet-Cookie: _csrf=6ppViQ1aeWleoIZL9QKPor9alOY6MTcyODgyMjQyMTcxMzI0NzM3MA; Path=/; Max-Age=86400; HttpOnly; Secure; SameSite=LaxX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGIN
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gitea.com
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gitea.comd
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: http://james.newtonking.com/projects/json
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://aka.ms/vs/16/release/vc_redist.x64.exe#vc_redist.x64.exeiVisual
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/vs/17/release/vc_redist.x64.exe
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://aka.ms/vs/17/release/vc_redist.x64.exeiWebView2
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gitea.com
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://gitea.com/quiving/Solara/raw/branch/main/Files/endpoint
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 18.166.250.135:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2942925913.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000000.1696542029.000000000068A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.evad.winEXE@2/0@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6896:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeMutant created: NULL
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeReversingLabs: Detection: 52%
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeVirustotal: Detection: 54%
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: pv]Error checking WebView2 runtime installation: chttps://go.microsoft.com/fwlink/p/?LinkId=2124703=MicrosoftEdgeWebview2Setup.exe!/silent /installQWebView2 runtime installed successfully.qWebView2 runtime installation failed with exit code {0}.GError installing WebView2 runtime: iSOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeString found in binary or memory: Version3Error checking registry: ]https://aka.ms/vs/16/release/vc_redist.x64.exe#vc_redist.x64.exeiVisual C++ Redistributable installer downloaded to: 5/install /quiet /norestart
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeSection loaded: gpapi.dllJump to behavior
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\bin\Release\Bootstrapper.pdb source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe

Data Obfuscation

barindex
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, DynamicUtils.cs.Net Code: CreateSharpArgumentInfoArray
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, LateBoundReflectionDelegateFactory.cs.Net Code: CreateDefaultConstructor
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeMemory allocated: DA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeMemory allocated: 4990000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe TID: 6848Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2942925913.0000000000E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Query Registry
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe53%ReversingLabsWin32.Trojan.AgentTesla
SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe55%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
gitea.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.nuget.org/packages/Newtonsoft.Json.Bson0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://james.newtonking.com/projects/json0%URL Reputationsafe
https://www.newtonsoft.com/jsonschema0%URL Reputationsafe
https://aka.ms/vs/17/release/vc_redist.x64.exe0%VirustotalBrowse
https://aka.ms/vs/17/release/vc_redist.x64.exeiWebView20%VirustotalBrowse
https://gitea.com1%VirustotalBrowse
https://gitea.com/quiving/Solara/raw/branch/main/Files/endpoint0%VirustotalBrowse
http://gitea.com1%VirustotalBrowse
https://aka.ms/vs/16/release/vc_redist.x64.exe#vc_redist.x64.exeiVisual0%VirustotalBrowse
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
gitea.com
18.166.250.135
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://gitea.com/quiving/Solara/raw/branch/main/Files/endpointfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://aka.ms/vs/17/release/vc_redist.x64.exeSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalseunknown
https://gitea.comSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalseunknown
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msiSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalseunknown
https://www.nuget.org/packages/Newtonsoft.Json.BsonSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalse
  • URL Reputation: safe
unknown
http://gitea.comdSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002A11000.00000004.00000800.00020000.00000000.sdmpfalse
    unknown
    https://aka.ms/vs/17/release/vc_redist.x64.exeiWebView2SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalseunknown
    http://gitea.comSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002A11000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, 00000000.00000002.2943769676.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://aka.ms/vs/16/release/vc_redist.x64.exe#vc_redist.x64.exeiVisualSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalseunknown
    http://james.newtonking.com/projects/jsonSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalse
    • URL Reputation: safe
    unknown
    https://www.newtonsoft.com/jsonschemaSecuriteInfo.com.Variant.Cerbu.210262.1524.886.exefalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    18.166.250.135
    gitea.comUnited States
    16509AMAZON-02USfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1532505
    Start date and time:2024-10-13 14:26:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 20s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
    Detection:MAL
    Classification:mal56.evad.winEXE@2/0@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 5
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe, PID 6884 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    18.166.250.135LisectAVT_2403002B_286.exeGet hashmaliciousUnknownBrowse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      gitea.comLisectAVT_2403002B_286.exeGet hashmaliciousUnknownBrowse
      • 18.166.250.135
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AMAZON-02USm68k.elfGet hashmaliciousMirai, MoobotBrowse
      • 54.214.132.50
      sh4.elfGet hashmaliciousMirai, MoobotBrowse
      • 157.175.218.20
      x86_64.elfGet hashmaliciousMirai, MoobotBrowse
      • 18.251.142.227
      c5yDnHUmFv.exeGet hashmaliciousCredential FlusherBrowse
      • 52.222.236.80
      c5yDnHUmFv.exeGet hashmaliciousCredential FlusherBrowse
      • 52.222.236.120
      849128312.cmdGet hashmaliciousUnknownBrowse
      • 54.231.171.137
      na.elfGet hashmaliciousMiraiBrowse
      • 44.240.65.146
      https://confortdelaine.net/_t/c/A1020005-17FCBF5826D778A0-C9FF7535?l=AAAjUdfNc16+VqCOWdjhu7TjhebDwXm6ITDaAzM2/RBqTCouOd4syZWt0oQeHch0J32d09qewtBep0xMzEqQw5uCDD5jzGMptv2Ml8tKG/C8CtlmUW+BwgihXDjkVb9+HrdQMTDnH/ltKCqbqkeSWCTVbTbsi7hQm50lkSO+uIKP+WaZVK5CwB+KNw5vz0h1+VWB9nXYS7r/65KwDXG1eoQ7LpgExf5uqFhJOeKU2lxyf8MZFWma+Jpcd8qAgpI5cl3w3zd+Vm0EYEfvHWX+4U6+p25bR3xOeQgBPB06jegeQ9cdnaCwg3Jra3NPSUfO/ZRQe9TJEW4VVwilXp7v0mwUyqJcK2y5kBNWNZEBnnQaAV+iawzJY19HetwEfzVabFBg3HhgYGx7XFWZYjHTHjwVWsbkjfgBb5461v0CHJjM9jrxfdj1kWIpcxid8O+dUSurKUOY4Hbb6SKXakBTmnkrYs0n3Xg5Ig==&c=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 hashmaliciousUnknownBrowse
      • 18.245.46.78
      https://confortdelaine.net/_t/c/A1020005-17FCBF5826D778A0-C9FF7535?l=AACrcmbDni/ExL+6O84qnOq7s+7FEV7f2cEnFZCBGkVuVLwxJJ9kIF+/XsJvnT/ZZCSNu0ZPkHJMldgNU5hySzD4vbkLFmicZpeb27RRNiBBqzluO2njDgWrhNVOuuG5KecX01qr4Wu4+GPJbk1wcH4NmoDfnECMgEyVdYVJNd9SJ/Z6oeOmLYfmhHtJEcZB1zTo2XcCZUK4o1X55Z6mDqHfXia9/zchVngkbUJFubdOeeGrUXmliV4kA4X0r42Yjp3RKfpMvJU0dvSKL9oGxXQi9sD/MbbP4pxgNW6CajbdZVfsCIontUHWT1eFW4HrQm9NkGaKTegqBxEs/bh3fwfINtkSa08UEhuWP97GhgCO8AMh0qPvYF1Rp7eiHGFkb8QogMMfuDrW2QnTqHRWnTzitTqkjecFMC67nh1FVX/+SWo05+3MmWfzaTxkwp1iAJoDUcmTFcR0WSTfeepWakTIU1exnjYHjHsm9FYU&c=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 hashmaliciousUnknownBrowse
      • 18.245.46.2
      https://confortdelaine.net/_t/c/A1020005-17FC1B6DB5BD9241-7C90090F?l=AADy6+7GSFDtie9t8Cg/YUEnWHeQNpQUM5LtDe7UJMsLOceAyoyG1gPOseIEt6wEQOIS0cQG9+43HQOpwin+IcDGpXOmivIAoIj+kjiIGL1D2+8BvnDBEaMAH0f591eHch8eVhYXQMKLzHwgDODg3wt5JqhlbP9RQzflWbxkgz8rcLW9fZi6fO8I2q/H/mufxAmprX0pckYJIlZDOjEWtANKm9qQyuOPBTmTxFfQ7lSnZTWTopfzM4iUzlHH6YHH2Gwf9rOJKxuawJshVk1D6tC4SPWT4Qn+EH36v6noVRG1OVZuyh8POMokxISZrUYw04m/WI9EIj5YnXnJ0pu3aN84TxZoMpQWLf/bmERiIc3Nyv1tTCdvcY5yUV048SjizDEvcSo7xAYIkZcbJD4FxApNB4P7tHx7BM4Ye85I4pWktamhPb27vCl/+uYQPRubCgSnJCgEpm957xU4Pe9/Mw441Bx0a9Cw1g==&c=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 hashmaliciousUnknownBrowse
      • 35.157.212.223
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      3b5074b1b5d032e5620f69f9f700ff0e849128312.cmdGet hashmaliciousUnknownBrowse
      • 18.166.250.135
      SecuriteInfo.com.Win32.MalwareX-gen.14234.12476.exeGet hashmaliciousUnknownBrowse
      • 18.166.250.135
      http://servicesopm.com/login.phpGet hashmaliciousUnknownBrowse
      • 18.166.250.135
      H#0813-186765.vbsGet hashmaliciousAsyncRATBrowse
      • 18.166.250.135
      1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • 18.166.250.135
      20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • 18.166.250.135
      Purchase Order No. 4500017624.jsGet hashmaliciousAgentTeslaBrowse
      • 18.166.250.135
      narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
      • 18.166.250.135
      https://document.cert-sha256.com/pages/10ab5b62ac22/XdXJasPWh0dHqBzOi8vZGo9jdW1ldmbnQufY2VydC1zfaGkEyNTYuY29tL3BhZ2VzhLzEwYWI1YjYyYWMyMiZlbWFpbF90ZW1wbGF0ZV9pZD04MjI4NjI5JmFjdGlvbj1wcmV2aWV3JnVzZXJfaWQ9NzM0MTE0NTY=Get hashmaliciousUnknownBrowse
      • 18.166.250.135
      http://starlightps.org/Get hashmaliciousUnknownBrowse
      • 18.166.250.135
      No context
      No created / dropped files found
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.597571432264211
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
      File size:816'128 bytes
      MD5:2452e269ee2a615e90c5e19a373b0239
      SHA1:6e02258265d33f5d622997091065953c4730ec10
      SHA256:4c0dbbf022d7dfc0b4eacb34dbb4d41e3fd860c04057362002a5d4a6e0220a55
      SHA512:2542dbbedd0d7df24fb8327665ddde1abe3a8ac37e2a30d65295273c7565779f41c0513cc04849078eb19f580f00e61c3a089c89dd64a7d4aea6751d96a622aa
      SSDEEP:12288:tgKN3biG+NgNbbwjlkr3oAQ2jFVfGBc4XqCon9hUpVo34u:aKNr7+Er3oAQ2jFVGBHXqlF4u
      TLSH:50054A15BBE8DB13E1AF6771E8B08B2417B5E042E362E78F154817E92C437096CA536F
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................j............... ........@.. ....................................`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x4c88aa
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x66A2AC98 [Thu Jul 25 19:50:48 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [004C88B8h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      mov word ptr [eax+0000000Ch], cs
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      cwde
      lodsb
      mov byte ptr [00000066h], al
      add byte ptr [edx], al
      add byte ptr [eax], al
      add byte ptr [edi+00h], dh
      add byte ptr [eax], al
      fmul qword ptr [eax+6ADC000Ch]
      or al, 00h
      push edx
      push ebx
      inc esp
      push ebx
      arpl word ptr [esi+55h], si
      inc edi
      pop ecx
      dec ecx
      inc ecx
      scasd
      push esi
      js 00007F8AFD25925Eh
      in eax, 17h
      sbb cl, byte ptr [edx+00000001h]
      inc ebx
      cmp bl, byte ptr [ebp+edx*2+73h]
      jc 00007F8AFD259336h
      pop esp
      inc ecx
      jnc 00007F8AFD25932Ah
      je 00007F8AFD25932Bh
      outsb
      pop esp
      inc esp
      jnc 00007F8AFD25932Eh
      je 00007F8AFD259331h
      jo 00007F8AFD25931Eh
      push edi
      push esp
      inc esi
      pop esp
      push ebx
      outsd
      insb
      popad
      jc 00007F8AFD259323h
      inc edx
      outsd
      outsd
      je 00007F8AFD259335h
      je 00007F8AFD259334h
      popad
      jo 00007F8AFD259332h
      jc 00007F8AFD25931Fh
      push ebx
      outsd
      insb
      popad
      jc 00007F8AFD259323h
      inc edx
      outsd
      outsd
      je 00007F8AFD259335h
      je 00007F8AFD259334h
      popad
      jo 00007F8AFD259332h
      jc 00007F8AFD25931Fh
      bound ebp, dword ptr [ecx+6Eh]
      pop esp
      push edx
      insb
      popad
      jnc 00007F8AFD259327h
      pop esp
      inc edx
      outsd
      outsd
      je 00007F8AFD259335h
      je 00007F8AFD259334h
      popad
      jo 00007F8AFD259332h
      jc 00007F8AFD2592F1h
      jo 00007F8AFD259326h
      bound eax, dword ptr [eax]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xc885c0x4c.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xca0000x575.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xcc0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xc88c00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xc88b80x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000xc69530xc6a00090cd6467469a9a8f39f2a8454b797c9False0.3454646692101951data5.603198343916829IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0xca0000x5750x600706ed0398f1aa324656eb5102ff400cfFalse0.39453125data3.770686100904012IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xcc0000xc0x200ca907b0617da5a5a8707f014c49f4e10False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0xca0900x36cdata0.3995433789954338
      RT_MANIFEST0xca40c0x169XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.6204986149584487
      DLLImport
      mscoree.dll_CorExeMain
      TimestampSource PortDest PortSource IPDest IP
      Oct 13, 2024 14:27:00.325134039 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:00.325180054 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:00.325314045 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:00.337549925 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:00.337562084 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.346148014 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.346512079 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:01.357608080 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:01.357634068 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.358026028 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.408620119 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:01.428266048 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:01.471436977 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.870663881 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.870834112 CEST4434973018.166.250.135192.168.2.4
      Oct 13, 2024 14:27:01.871061087 CEST49730443192.168.2.418.166.250.135
      Oct 13, 2024 14:27:01.977665901 CEST49730443192.168.2.418.166.250.135
      TimestampSource PortDest PortSource IPDest IP
      Oct 13, 2024 14:27:00.294003963 CEST5065253192.168.2.41.1.1.1
      Oct 13, 2024 14:27:00.320527077 CEST53506521.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 13, 2024 14:27:00.294003963 CEST192.168.2.41.1.1.10x8e55Standard query (0)gitea.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 13, 2024 14:27:00.320527077 CEST1.1.1.1192.168.2.40x8e55No error (0)gitea.com18.166.250.135A (IP address)IN (0x0001)false
      • gitea.com
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.44973018.166.250.1354436884C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
      TimestampBytes transferredDirectionData
      2024-10-13 12:27:01 UTC104OUTGET /quiving/Solara/raw/branch/main/Files/endpoint HTTP/1.1
      Host: gitea.com
      Connection: Keep-Alive
      2024-10-13 12:27:01 UTC497INHTTP/1.1 404 Not Found
      Date: Sun, 13 Oct 2024 12:27:01 GMT
      Content-Type: text/plain;charset=utf-8
      Content-Length: 11
      Connection: close
      Cache-Control: max-age=0, private, must-revalidate, no-transform
      Server: Caddy
      Set-Cookie: i_like_gitea=775661cd8dc0adc0; Path=/; HttpOnly; Secure; SameSite=Lax
      Set-Cookie: _csrf=6ppViQ1aeWleoIZL9QKPor9alOY6MTcyODgyMjQyMTcxMzI0NzM3MA; Path=/; Max-Age=86400; HttpOnly; Secure; SameSite=Lax
      X-Content-Type-Options: nosniff
      X-Frame-Options: SAMEORIGIN
      2024-10-13 12:27:01 UTC11INData Raw: 4e 6f 74 20 66 6f 75 6e 64 2e 0a
      Data Ascii: Not found.


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:08:26:59
      Start date:13/10/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Cerbu.210262.1524.886.exe"
      Imagebase:0x5c0000
      File size:816'128 bytes
      MD5 hash:2452E269EE2A615E90C5E19A373B0239
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:08:26:59
      Start date:13/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >
        Memory Dump Source
        • Source File: 00000000.00000002.2942766306.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_da0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 48246f26bfb1a7b0ba0bd585c1b4dfde40c170163e713f7cb3caf5211c8d1dd2
        • Instruction ID: f1748ea613f2fce8ea751280a6926a31abc73182257380334215d8001f260a49
        • Opcode Fuzzy Hash: 48246f26bfb1a7b0ba0bd585c1b4dfde40c170163e713f7cb3caf5211c8d1dd2
        • Instruction Fuzzy Hash: 9861BD34A04616DFCB24DF68C485BADBBF2BF4A300F248569D449E7281DB74E985CFA4
        Memory Dump Source
        • Source File: 00000000.00000002.2942766306.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_da0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dd2439713d4c2d836c2772aff9bd90226f42dc650c1707b440a984798a4331ff
        • Instruction ID: 241474160ca8c8b9d7dbee9a5cd4c94708538ffc3c898ae0bbb69167e3914bbb
        • Opcode Fuzzy Hash: dd2439713d4c2d836c2772aff9bd90226f42dc650c1707b440a984798a4331ff
        • Instruction Fuzzy Hash: FB31AD38A0462ADBDB24CFA9C4447ADFBF2BF49340F24852AD455E7281CB74D945CFA4
        Memory Dump Source
        • Source File: 00000000.00000002.2942766306.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_da0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b3ba7b24d7127fe6ae78410564f2d381fe12ca652c9547bfcc9ee2e93d407f58
        • Instruction ID: c6a5f5774601f4973fd0577ed78571c1bc86dd612a6eca135f25ce8df5b1e305
        • Opcode Fuzzy Hash: b3ba7b24d7127fe6ae78410564f2d381fe12ca652c9547bfcc9ee2e93d407f58
        • Instruction Fuzzy Hash: 88211D34A042158FCB64EB38C455B6D7BB2AF49704F2084AAD04EEB351DF759D86CFA1
        Memory Dump Source
        • Source File: 00000000.00000002.2942766306.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_da0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f33cb660dd519cd821b5d9c6039612def594e65acdf4715ae5e62ba04e27c363
        • Instruction ID: 042611d90a48ae3eb611739721d433c6f3c6f2227d5e7c7f828baaa00e48e00a
        • Opcode Fuzzy Hash: f33cb660dd519cd821b5d9c6039612def594e65acdf4715ae5e62ba04e27c363
        • Instruction Fuzzy Hash: B421F574A002188FCB54EFB8C455B6C7BB1AF49300F2044AAE00EEB3A5DF749E858F61
        Memory Dump Source
        • Source File: 00000000.00000002.2942766306.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_da0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e57a3ac0f93c1df9e5e74f6dbb6cf456551a7577a2ec5cf21f30a755d7e2b4f
        • Instruction ID: 1f6db86e17066178794f5779f965a17b478f7c1101cce096f416fa5af91fcada
        • Opcode Fuzzy Hash: 3e57a3ac0f93c1df9e5e74f6dbb6cf456551a7577a2ec5cf21f30a755d7e2b4f
        • Instruction Fuzzy Hash: 1D118F38A00218CFCB24EF24C945B6D7BB2AF89710F144196D449EB391CB748D85CFA2