Windows
Analysis Report
nteste.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- nteste.exe (PID: 3556 cmdline:
"C:\Users\ user\Deskt op\nteste. exe" MD5: 5367157A35583431B54B30426831640A)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00403E52 |
Source: | Code function: | 0_2_004045A6 |
Source: | Code function: | 0_2_004162A0 | |
Source: | Code function: | 0_2_0040C507 | |
Source: | Code function: | 0_2_0041F230 | |
Source: | Code function: | 0_2_00422366 | |
Source: | Code function: | 0_2_0040537A | |
Source: | Code function: | 0_2_004263B0 | |
Source: | Code function: | 0_2_00426570 | |
Source: | Code function: | 0_2_0041A862 | |
Source: | Code function: | 0_2_00426A60 | |
Source: | Code function: | 0_2_00422AA0 | |
Source: | Code function: | 0_2_00427B13 | |
Source: | Code function: | 0_2_0041FC50 | |
Source: | Code function: | 0_2_00423CF0 | |
Source: | Code function: | 0_2_00425C80 | |
Source: | Code function: | 0_2_00427CA1 | |
Source: | Code function: | 0_2_00401D5A | |
Source: | Code function: | 0_2_00427D7B | |
Source: | Code function: | 0_2_00425E90 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Initial sample: |
Source: | Code function: | 0_2_004134A3 |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Code function: | 0_2_0040195E |
Source: | Static PE information: |
Source: | Code function: | 0_2_0042741E | |
Source: | Code function: | 0_2_004277BE | |
Source: | Code function: | 0_2_0041FED1 |
Source: | Code function: | 0_2_00403E52 |
Source: | Code function: | 0_2_004045A6 |
Source: | Code function: | 0_2_0040592F |
Source: | Code function: | 0_2_0040195E |
Source: | Code function: | 0_2_004200F0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Spearphishing Link | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 2 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 3 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546271 |
Start date and time: | 2024-10-31 17:31:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | nteste.exe |
Detection: | MAL |
Classification: | mal48.winEXE@1/3@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 88.221.110.91, 2.16.100.168
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, download.windowsupdate.com.edgesuite.net
- VT rate limit hit for: nteste.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Process: | C:\Users\user\Desktop\nteste.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 454424 |
Entropy (8bit): | 7.957541049518111 |
Encrypted: | false |
SSDEEP: | 12288:koogWqQRedoQLhoUuAUTEC+KrG5yamr1jVP78PHUWGtk:koogW5edH+MoE3KrGMamr1GPHpG+ |
MD5: | 70A353DFB55F319A7B0D37F688EE77AC |
SHA1: | 94B30B4B2488325CAB033D40C84D0F825F641AB8 |
SHA-256: | 846B5CD3D0820027D65F7D54758EB11CD24373D5BBBDA8A56BD56E24BCA2A16D |
SHA-512: | CE1326018110D715334C567DD5C95A5CA7C3568139F4B91BA97304236CDD24E2C6CFA8A8A950CEACF3348F9D7ED65FFE4894742EB0C454F96894E158E63CEC41 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\nteste.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1886540 |
Entropy (8bit): | 7.935131728433788 |
Encrypted: | false |
SSDEEP: | 49152:NwFWEOPozZ07PG/Do6DhwiUOZQSsh2cZr21TaJe7:uoZsyu/DoUhSOeSsRYV7 |
MD5: | F1BF4C319D0FBD65BBBB994EFE51E2AD |
SHA1: | 668C4B0CCBDF0471287C096BB311AE34CC4B1F23 |
SHA-256: | 446D5AAECF4B33DA4C3861021C2BDC6823D57392B40849629654E90136B65B11 |
SHA-512: | 72955FA7E4DBA3BD8A1FBE313BFFB3BF8CEE00E4FB783669C425846B7B3F189F1C2D9770EA3261200A25F09E68385576F9EDFF9533035FFE9317097FD27D8298 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\nteste.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 542579 |
Entropy (8bit): | 7.660578132045769 |
Encrypted: | false |
SSDEEP: | 12288:kHVDVys22/lSisq1icXm2knbw1xkEHl8dzppupjR:k5Vys2YW2kbwLDF8dzA |
MD5: | EAE04A20AD4F3281FD6696DC4091A0B0 |
SHA1: | 937F595CCC01F0DFE74FD817F040FA97286B09D5 |
SHA-256: | 7D9284A1FD37AC9C132D24938319FED8C5958BD6782F3F630BB1E4A1AE8BFEC8 |
SHA-512: | BAF05BBA69927CA8300186BC224766E39763720512CE21FEBECAF618B114531A737A0FDC03E7D7F1FAA49B8C04A71B2699DA9971EDEC85D530F6F588461E804E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.971241163291758 |
TrID: |
|
File name: | nteste.exe |
File size: | 2'743'085 bytes |
MD5: | 5367157a35583431b54b30426831640a |
SHA1: | 8cb18452a832b235e376274f3f67125ed73da76c |
SHA256: | a1ea9eb86e26f04236bf7f47a63912af16f70463c47f8fd785f6e0f97d41c769 |
SHA512: | 2c7f568bde2db7e4c3bed28b82fe8d0f49ce7a1cf8786e9ed60d61d55e2dfe52fac6c1cede3b3aeb4fb80839ae491656ee5de53d16b16428c00e0a9127dccd8d |
SSDEEP: | 49152:HCtt1JXrncsqZRoNSWLlwsW4K70HQzrr5PxC1gIlC9lfhhiUzgTe:HUJjiZRM7+sG7gQPdPbIk9l5h8Te |
TLSH: | 8DC5233177E1C87EC42611318AE8EBF7707AEB8D0F1185932394D72A6E31665D23672B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B.i...i...i...v...i..>u...i...v...i...v...i..3a...i...i...i..>a...i...O...i...O...i....i..i....]..i..zo...i..Rich.i......... |
Icon Hash: | b8868baba9aba2d8 |
Entrypoint: | 0x4277c6 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | NX_COMPAT |
Time Stamp: | 0x5C6ECB00 [Thu Feb 21 16:00:00 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | da401ef5e9d5c4599673c26d95fa6029 |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 0042CCA0h |
push 004277C0h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 68h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
xor ebx, ebx |
mov dword ptr [ebp-04h], ebx |
push 00000002h |
call dword ptr [0042B13Ch] |
pop ecx |
or dword ptr [00436534h], FFFFFFFFh |
or dword ptr [00436538h], FFFFFFFFh |
call dword ptr [0042B138h] |
mov ecx, dword ptr [00434514h] |
mov dword ptr [eax], ecx |
call dword ptr [0042B134h] |
mov ecx, dword ptr [00434510h] |
mov dword ptr [eax], ecx |
mov eax, dword ptr [0042B130h] |
mov eax, dword ptr [eax] |
mov dword ptr [00436530h], eax |
call 00007FB1E48E5FA4h |
cmp dword ptr [00432170h], ebx |
jne 00007FB1E48E5E8Eh |
push 00412BA9h |
call dword ptr [0042B12Ch] |
pop ecx |
call 00007FB1E48E5F79h |
push 0043204Ch |
push 00432048h |
call 00007FB1E48E5F64h |
mov eax, dword ptr [0043450Ch] |
mov dword ptr [ebp-6Ch], eax |
lea eax, dword ptr [ebp-6Ch] |
push eax |
push dword ptr [00434508h] |
lea eax, dword ptr [ebp-64h] |
push eax |
lea eax, dword ptr [ebp-70h] |
push eax |
lea eax, dword ptr [ebp-60h] |
push eax |
call dword ptr [0042B124h] |
push 00432044h |
push 00432000h |
call 00007FB1E48E5F31h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x30974 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x38000 | 0x2090 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2b000 | 0x234 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x293f5 | 0x29400 | 2a572bd8572511c16cf22aae6fdfb407 | False | 0.5841619318181818 | COM executable for DOS | 6.676714054170099 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2b000 | 0x6500 | 0x6600 | 38373dcd80ae6d5d8044f9e98b4cec4a | False | 0.33903952205882354 | data | 4.4296711026291495 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x32000 | 0x453c | 0x200 | 21ab621bd3546bfa2ab5932413c3cc39 | False | 0.39453125 | data | 3.3900459809566854 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.sxdata | 0x37000 | 0x4 | 0x200 | 35925cfdc1176bd9ffc634a58b40ec17 | False | 0.02734375 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x38000 | 0x2090 | 0x2200 | 1dc164c6087a90028d0a924f2042e607 | False | 0.2819393382352941 | data | 3.1607948061827598 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x387c0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.16532258064516128 |
RT_ICON | 0x38aa8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.32094594594594594 |
RT_DIALOG | 0x39148 | 0x440 | data | English | United States | 0.39981617647058826 |
RT_DIALOG | 0x38bf8 | 0x12e | data | English | United States | 0.6225165562913907 |
RT_DIALOG | 0x38d28 | 0x2f4 | data | English | United States | 0.48148148148148145 |
RT_DIALOG | 0x39020 | 0x126 | data | English | United States | 0.5850340136054422 |
RT_STRING | 0x39608 | 0x3e | Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0 | English | United States | 0.6774193548387096 |
RT_STRING | 0x395c0 | 0x42 | data | English | United States | 0.7121212121212122 |
RT_STRING | 0x39648 | 0x60 | data | English | United States | 0.5625 |
RT_STRING | 0x3a060 | 0x30 | data | English | United States | 0.5833333333333334 |
RT_STRING | 0x396a8 | 0x20c | Matlab v4 mat-file (little endian) h, numeric, rows 0, columns 0 | English | United States | 0.42748091603053434 |
RT_STRING | 0x398b8 | 0xe4 | Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0 | English | United States | 0.44298245614035087 |
RT_STRING | 0x399a0 | 0x34 | data | English | United States | 0.6538461538461539 |
RT_STRING | 0x399d8 | 0x30 | data | English | United States | 0.6041666666666666 |
RT_STRING | 0x39a08 | 0x6e | Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0 | English | United States | 0.6818181818181818 |
RT_STRING | 0x39a78 | 0x11a | data | English | United States | 0.5035460992907801 |
RT_STRING | 0x39b98 | 0x6a | data | English | United States | 0.5471698113207547 |
RT_STRING | 0x39588 | 0x32 | data | English | United States | 0.58 |
RT_STRING | 0x39c08 | 0x1ea | data | English | United States | 0.363265306122449 |
RT_STRING | 0x39df8 | 0x156 | Matlab v4 mat-file (little endian) U, numeric, rows 0, columns 0 | English | United States | 0.5175438596491229 |
RT_STRING | 0x39f50 | 0x56 | data | English | United States | 0.6162790697674418 |
RT_STRING | 0x39fa8 | 0xb6 | data | English | United States | 0.5164835164835165 |
RT_GROUP_ICON | 0x38bd0 | 0x22 | data | English | United States | 1.0 |
RT_VERSION | 0x38510 | 0x2b0 | data | English | United States | 0.4956395348837209 |
DLL | Import |
---|---|
OLEAUT32.dll | SysFreeString, SysAllocStringLen, SysAllocString, VariantClear, SysStringLen |
ole32.dll | CoCreateInstance, CoInitialize, CoUninitialize, OleInitialize |
USER32.dll | CheckDlgButton, IsDlgButtonChecked, EndDialog, SetDlgItemTextW, GetFocus, SetFocus, GetKeyState, InvalidateRect, SetWindowTextW, EnableWindow, PostMessageW, MessageBoxW, SetTimer, DialogBoxParamW, SetWindowLongW, GetWindowLongW, ShowWindow, MoveWindow, ScreenToClient, GetDlgItem, GetWindowRect, MapDialogRect, SystemParametersInfoW, GetWindowTextLengthW, GetWindowTextW, SendMessageW, LoadStringW, CharUpperW, LoadIconW, GetParent, SetCursor, LoadCursorW, KillTimer |
SHELL32.dll | SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHGetMalloc |
MSVCRT.dll | wcsstr, wcscmp, _beginthreadex, _except_handler3, ??1type_info@@UAE@XZ, ?terminate@@YAXXZ, __dllonexit, _onexit, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _controlfp, _CxxThrowException, malloc, memcpy, memmove, memset, _purecall, memcmp, __CxxFrameHandler, free |
KERNEL32.dll | GetStartupInfoA, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, WaitForSingleObject, lstrlenW, lstrcatW, VirtualFree, VirtualAlloc, SetPriorityClass, DeleteCriticalSection, Sleep, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetFileInformationByHandle, GetStdHandle, GlobalMemoryStatus, GetSystemInfo, GetCurrentProcess, GetProcessAffinityMask, FileTimeToLocalFileTime, FileTimeToSystemTime, CompareFileTime, SetEndOfFile, WriteFile, ReadFile, SetFilePointer, GetFileSize, GetLogicalDriveStringsW, GetFileAttributesW, GetModuleHandleA, FindNextFileW, FindFirstFileW, FindClose, GetTickCount, GetCurrentDirectoryW, SetLastError, DeleteFileW, CreateDirectoryW, GetModuleHandleW, MoveFileW, RemoveDirectoryW, SetFileAttributesW, CreateFileW, SetFileTime, CloseHandle, GetSystemDirectoryW, FormatMessageW, LocalFree, GetModuleFileNameW, MultiByteToWideChar, GetLastError, GetVersionExW, LoadLibraryW, GetProcAddress, FreeLibrary, GetCommandLineW, LoadLibraryExW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 31, 2024 17:32:17.715715885 CET | 1.1.1.1 | 192.168.2.5 | 0x542e | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 31, 2024 17:32:17.715715885 CET | 1.1.1.1 | 192.168.2.5 | 0x542e | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |
Target ID: | 0 |
Start time: | 12:31:58 |
Start date: | 31/10/2024 |
Path: | C:\Users\user\Desktop\nteste.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2'743'085 bytes |
MD5 hash: | 5367157A35583431B54B30426831640A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 4.5% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 31 |
Graph
Function 0040195E Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 40libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C507 Relevance: 6.6, APIs: 4, Instructions: 648COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004134A3 Relevance: 6.1, APIs: 4, Instructions: 118comCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403E52 Relevance: 1.5, APIs: 1, Instructions: 24fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C08 Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 126windowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401039 Relevance: 14.5, APIs: 3, Strings: 5, Instructions: 459comCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040595E Relevance: 14.0, APIs: 4, Strings: 4, Instructions: 47libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041384A Relevance: 9.0, APIs: 6, Instructions: 35COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415A42 Relevance: 7.5, APIs: 5, Instructions: 38windowCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004192DC Relevance: 6.2, APIs: 4, Instructions: 154COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DC9 Relevance: 4.5, APIs: 3, Instructions: 42COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415B7E Relevance: 4.5, APIs: 3, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A5B5 Relevance: 3.2, APIs: 2, Instructions: 203COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414E43 Relevance: 3.1, APIs: 2, Instructions: 80COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B257 Relevance: 3.0, APIs: 2, Instructions: 39COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404729 Relevance: 3.0, APIs: 2, Instructions: 38COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426240 Relevance: 3.0, APIs: 2, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040591C Relevance: 3.0, APIs: 2, Instructions: 7COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020CF Relevance: 2.5, APIs: 2, Instructions: 15COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417A2E Relevance: 2.1, APIs: 1, Instructions: 603COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F28B Relevance: 2.0, APIs: 1, Instructions: 486COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AF85 Relevance: 1.7, APIs: 1, Instructions: 222COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C5F Relevance: 1.7, APIs: 1, Instructions: 190COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040EC65 Relevance: 1.7, APIs: 1, Instructions: 180COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418BD7 Relevance: 1.6, APIs: 1, Instructions: 134COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F928 Relevance: 1.6, APIs: 1, Instructions: 132COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041770B Relevance: 1.6, APIs: 1, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DB3E Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413F01 Relevance: 1.6, APIs: 1, Instructions: 72windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B923 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004174EA Relevance: 1.5, APIs: 1, Instructions: 36COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417499 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418325 Relevance: 1.5, APIs: 1, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415417 Relevance: 1.5, APIs: 1, Instructions: 30COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415FEC Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415F97 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DCC3 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E700 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414DF0 Relevance: 1.5, APIs: 1, Instructions: 24timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416F09 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404685 Relevance: 1.5, APIs: 1, Instructions: 23fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040489A Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004153CF Relevance: 1.5, APIs: 1, Instructions: 20windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415474 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004047FA Relevance: 1.5, APIs: 1, Instructions: 18fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E9B Relevance: 1.5, APIs: 1, Instructions: 18windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B580 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414F4B Relevance: 1.5, APIs: 1, Instructions: 16COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415004 Relevance: 1.5, APIs: 1, Instructions: 14COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487D Relevance: 1.5, APIs: 1, Instructions: 9timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E43 Relevance: 1.5, APIs: 1, Instructions: 7COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040AB Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404919 Relevance: 1.5, APIs: 1, Instructions: 6fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403AC7 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406671 Relevance: 1.3, APIs: 1, Instructions: 38COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F583 Relevance: 1.3, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F4E0 Relevance: 1.3, APIs: 1, Instructions: 8COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F550 Relevance: 1.3, APIs: 1, Instructions: 8COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F5A3 Relevance: 1.3, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F570 Relevance: 1.3, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F500 Relevance: 1.3, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040537A Relevance: 4.7, APIs: 3, Instructions: 183timeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004045A6 Relevance: 4.6, APIs: 3, Instructions: 86COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E90 Relevance: 4.0, APIs: 3, Instructions: 230COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A862 Relevance: 3.5, APIs: 2, Instructions: 484COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004200F0 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592F Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D5A Relevance: 1.3, Strings: 1, Instructions: 97COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423CF0 Relevance: .7, Instructions: 744COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422366 Relevance: .5, Instructions: 516COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422AA0 Relevance: .5, Instructions: 480COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426570 Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A60 Relevance: .3, Instructions: 297COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425C80 Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FC50 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F230 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004263B0 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427B13 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427CA1 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427D7B Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004100F2 Relevance: 40.6, APIs: 19, Strings: 4, Instructions: 309windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420210 Relevance: 21.1, APIs: 7, Strings: 5, Instructions: 81librarystringloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C2B Relevance: 16.4, APIs: 13, Instructions: 196COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414AA5 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 72windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403F2D Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 29libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00412EC0 Relevance: 9.1, APIs: 6, Instructions: 141windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411C58 Relevance: 9.0, APIs: 6, Instructions: 44windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413B6C Relevance: 7.8, APIs: 5, Instructions: 265COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041516C Relevance: 7.6, APIs: 5, Instructions: 88windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040897C Relevance: 7.6, APIs: 6, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041103B Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406521 Relevance: 6.3, APIs: 5, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402D7B Relevance: 6.3, APIs: 5, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004104FE Relevance: 6.1, APIs: 4, Instructions: 138COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040578A Relevance: 6.0, APIs: 4, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403F7A Relevance: 6.0, APIs: 4, Instructions: 38COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414B6C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 20windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A198 Relevance: 5.1, APIs: 4, Instructions: 58COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040FB5D Relevance: 5.1, APIs: 4, Instructions: 58COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004018A8 Relevance: 5.1, APIs: 4, Instructions: 57COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004132D7 Relevance: 5.0, APIs: 4, Instructions: 28sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|