Source: C:\Users\user\Desktop\CamScanner 23-10-2024 19.12.pdf |
Joe Sandbox ML: detected |
Source: nteste.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00403E52 FindFirstFileW, |
0_2_00403E52 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004045A6 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW, |
0_2_004045A6 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004162A0 |
0_2_004162A0 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0040C507 |
0_2_0040C507 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0041F230 |
0_2_0041F230 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00422366 |
0_2_00422366 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0040537A |
0_2_0040537A |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004263B0 |
0_2_004263B0 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00426570 |
0_2_00426570 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0041A862 |
0_2_0041A862 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00426A60 |
0_2_00426A60 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00422AA0 |
0_2_00422AA0 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00427B13 |
0_2_00427B13 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0041FC50 |
0_2_0041FC50 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00423CF0 |
0_2_00423CF0 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00425C80 |
0_2_00425C80 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00427CA1 |
0_2_00427CA1 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00401D5A |
0_2_00401D5A |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00427D7B |
0_2_00427D7B |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00425E90 |
0_2_00425E90 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: String function: 004020F6 appears 69 times |
|
Source: C:\Users\user\Desktop\nteste.exe |
Code function: String function: 00427400 appears 234 times |
|
Source: nteste.exe, 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilename7z.sfx.exe, vs nteste.exe |
Source: nteste.exe |
Binary or memory string: OriginalFilename7z.sfx.exe, vs nteste.exe |
Source: nteste.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal48.winEXE@1/3@0/0 |
Source: CamScanner 23-10-2024 19.13.pdf.0.dr |
Initial sample: https:\057\057v3.camscanner.com\057user\057download |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004134A3 __EH_prolog,_CxxThrowException,_CxxThrowException,CoCreateInstance, |
0_2_004134A3 |
Source: C:\Users\user\Desktop\nteste.exe |
File created: C:\Users\user\Desktop\CamScanner 23-10-2024 19.12.pdf |
Jump to behavior |
Source: nteste.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\nteste.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
File read: C:\Users\user\Desktop\nteste.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: explorerframe.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\nteste.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32 |
Jump to behavior |
Source: nteste.exe |
Static file information: File size 2743085 > 1048576 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0040195E LoadLibraryW,GetProcAddress,memset,FreeLibrary, |
0_2_0040195E |
Source: nteste.exe |
Static PE information: section name: .sxdata |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00427400 push eax; ret |
0_2_0042741E |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00427790 push eax; ret |
0_2_004277BE |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0041FED0 push ecx; mov dword ptr [esp], ecx |
0_2_0041FED1 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_00403E52 FindFirstFileW, |
0_2_00403E52 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004045A6 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW, |
0_2_004045A6 |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0040592F GetSystemInfo, |
0_2_0040592F |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_0040195E LoadLibraryW,GetProcAddress,memset,FreeLibrary, |
0_2_0040195E |
Source: C:\Users\user\Desktop\nteste.exe |
Code function: 0_2_004200F0 GetVersionExW, |
0_2_004200F0 |