Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VALUESearchUpdater.exe

Overview

General Information

Sample name:VALUESearchUpdater.exe
Analysis ID:1546345
MD5:4ab61ee925a3c1d719ebce6214ecdb45
SHA1:42856c8176a27060ddc20d284187cd86183fdfb2
SHA256:9ad2b8535a844e9da74ab6d99bdc9b6f264ccb7e2fb1fcb143f7de46f2334156
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • VALUESearchUpdater.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\VALUESearchUpdater.exe" MD5: 4AB61EE925A3C1D719EBCE6214ECDB45)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T19:46:16.967217+010020229301A Network Trojan was detected172.202.163.200443192.168.2.749746TCP
2024-10-31T19:46:56.333467+010020229301A Network Trojan was detected172.202.163.200443192.168.2.749959TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T19:46:00.909051+010020283713Unknown Traffic192.168.2.7497033.36.251.235443TCP
2024-10-31T19:46:02.581513+010020283713Unknown Traffic192.168.2.7497043.36.251.235443TCP

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: VALUESearchUpdater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 3.36.251.235:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: VALUESearchUpdater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49704 -> 3.36.251.235:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49703 -> 3.36.251.235:443
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:49959
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.7:49746
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /files/publish/xlllibver.txt HTTP/1.1Connection: Keep-AliveAccept: application/json, text/plain, */*Accept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr
Source: global trafficHTTP traffic detected: GET /files/publish/valuesearchn.zip HTTP/1.1Connection: Keep-AliveAccept: application/json, text/plain, */*Accept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr
Source: global trafficDNS traffic detected: DNS query: valuesearch.co.kr
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 31 Oct 2024 18:46:02 GMTContent-Type: text/html; charset=utf-8Content-Length: 45Connection: closeServer: VALUESearch - 1.95.0.1581
Source: VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/70
Source: VALUESearchUpdater.exeString found in binary or memory: https://valuesearch.co.kr/files/publish/
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298375804.000000000291B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/files/publish/valuesearchn.zip
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/files/publish/valuesearchn.zipGN
Source: VALUESearchUpdater.exeString found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txt
Source: VALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txtC
Source: VALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txttia
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownHTTPS traffic detected: 3.36.251.235:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: VALUESearchUpdater.exeStatic PE information: Number of sections : 11 > 10
Source: VALUESearchUpdater.exe, 00000000.00000003.1298375804.000000000293C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs VALUESearchUpdater.exe
Source: VALUESearchUpdater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean3.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeFile created: C:\Users\user\Desktop\valuesearchn.zipJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: VALUESearchUpdater.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
Source: VALUESearchUpdater.exeString found in binary or memory: application/vnd.groove-help
Source: VALUESearchUpdater.exeString found in binary or memory: "application/x-install-instructions
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Excel\AddIns\VALUESearch.XLL\Jump to behavior
Source: VALUESearchUpdater.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: VALUESearchUpdater.exeStatic file information: File size 3151872 > 1048576
Source: VALUESearchUpdater.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x290400
Source: VALUESearchUpdater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: VALUESearchUpdater.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VALUESearchUpdater.exe TID: 7484Thread sleep time: -30000s >= -30000sJump to behavior
Source: VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299182990.0000000000C62000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000C9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\VALUESearchUpdater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
VALUESearchUpdater.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
valuesearch.co.kr
3.36.251.235
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://valuesearch.co.kr/files/publish/valuesearchn.zipfalse
      unknown
      https://valuesearch.co.kr/files/publish/xlllibver.txtfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://valuesearch.co.kr/VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://valuesearch.co.kr/70VALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmp, VALUESearchUpdater.exe, 00000000.00000002.1299278175.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://valuesearch.co.kr/files/publish/valuesearchn.zipGNVALUESearchUpdater.exe, 00000000.00000003.1298175516.0000000000C8D000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://valuesearch.co.kr/files/publish/xlllibver.txtCVALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://valuesearch.co.kr/files/publish/xlllibver.txttiaVALUESearchUpdater.exe, 00000000.00000003.1262311074.0000000000C81000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exefalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    3.36.251.235
                    valuesearch.co.krUnited States
                    8987AMAZONEXPANSIONGBfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1546345
                    Start date and time:2024-10-31 19:45:03 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 10s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:VALUESearchUpdater.exe
                    Detection:CLEAN
                    Classification:clean3.winEXE@1/1@1/1
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: VALUESearchUpdater.exe
                    TimeTypeDescription
                    14:46:02API Interceptor1x Sleep call for process: VALUESearchUpdater.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AMAZONEXPANSIONGBFw Message from Kevin - Update on Coles Supply Chain Modernisation 31-10-24.emlGet hashmaliciousUnknownBrowse
                    • 3.33.220.150
                    Indocount Invoice Amendment.exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    Statement Cargomind 2024-09-12 (K07234).exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    SWIFT.exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                    • 52.223.34.155
                    Order SO311180.exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                    • 52.223.34.155
                    #10302024.exeGet hashmaliciousFormBookBrowse
                    • 3.33.130.190
                    http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                    • 52.223.34.155
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaCBrowse
                    • 3.36.251.235
                    Lana_Rhoades_Photoos.jsGet hashmaliciousUnknownBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaCBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWormBrowse
                    • 3.36.251.235
                    a.htaGet hashmaliciousDarkComet, DarkTortilla, NeshtaBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 3.36.251.235
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                    • 3.36.251.235
                    Set-Up.exeGet hashmaliciousLummaCBrowse
                    • 3.36.251.235
                    No context
                    Process:C:\Users\user\Desktop\VALUESearchUpdater.exe
                    File Type:HTML document, ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):45
                    Entropy (8bit):4.430198929422622
                    Encrypted:false
                    SSDEEP:3:qV4QU1kSDKe9oIJb:q2/7Ke9jb
                    MD5:57B18FB66E2CF4E1C6CEE32E1E50EA7B
                    SHA1:15313913A1B58585C4B8BC4CAC52B84686FB1230
                    SHA-256:5A94C2E3A53717089E9BA1C06CAB35B31EE32EB0888C38407B1BABDE29A166EB
                    SHA-512:9D46143594BA10FF86C8C7699741EDC4DD6937669AD29D6AB3239656939BDC47030CE61F82306CF19E588F13814DC834B42FA35CDF8C989EB15DB4C85D374907
                    Malicious:false
                    Reputation:low
                    Preview:<html>File valuesearchn.zip not found.</html>
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.668855895299851
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.53%
                    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    File name:VALUESearchUpdater.exe
                    File size:3'151'872 bytes
                    MD5:4ab61ee925a3c1d719ebce6214ecdb45
                    SHA1:42856c8176a27060ddc20d284187cd86183fdfb2
                    SHA256:9ad2b8535a844e9da74ab6d99bdc9b6f264ccb7e2fb1fcb143f7de46f2334156
                    SHA512:e31349abb5a8b295870b7aab42b0477f927215e8129004381239265be37f16f68fec43f7757611b14cbbd1783db3a7edbd9fa55afde4fda1c8cd8f0cc536973f
                    SSDEEP:49152:DovHkRO80l+J4diSroc8N7tXfJacep7MK5:DoPks80CpNxfJa9l
                    TLSH:12E57E13B34A753ED46F1B3A6877E260983F76617A138D4BABF4084C8F395812D3A647
                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                    Icon Hash:a092ce62989cd8c8
                    Entrypoint:0x693ce0
                    Entrypoint Section:.itext
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66711C89 [Tue Jun 18 05:35:05 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:3dc1b665c8592d9fd7a15054c2c7aff4
                    Instruction
                    push ebp
                    mov ebp, esp
                    add esp, FFFFFFF0h
                    mov eax, 0068947Ch
                    call 00007F2389765F2Dh
                    mov eax, dword ptr [0069E92Ch]
                    mov eax, dword ptr [eax]
                    call 00007F2389946A95h
                    mov eax, dword ptr [0069E92Ch]
                    mov eax, dword ptr [eax]
                    mov dl, 01h
                    call 00007F2389948A73h
                    mov ecx, dword ptr [0069EAE8h]
                    mov eax, dword ptr [0069E92Ch]
                    mov eax, dword ptr [eax]
                    mov edx, dword ptr [00688B20h]
                    call 00007F2389946A87h
                    mov eax, dword ptr [0069E92Ch]
                    mov eax, dword ptr [eax]
                    call 00007F2389946BDBh
                    call 00007F238975E34Eh
                    nop
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x2ab0000x7b.edata
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2a60000x3860.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e60000x27800.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2ae0000x37d10.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x2ad0000x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2a69b00x898.idata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2aa0000xee8.didata
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x2903140x2904003879a1729bf233d6c12d90130f773e3cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .itext0x2920000x1d340x1e0042384be932bdfd3d6a84058aaa881788False0.5360677083333333data6.291846377379588IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x2940000xac640xae00588b81580ba421427aba36f48e546c68False0.5552711925287356data6.188394974382231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .bss0x29f0000x6d240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata0x2a60000x38600x3a008f4a5149e5da43d5ae45a7d1bf6460d6False0.3211880387931034data5.145753577938233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .didata0x2aa0000xee80x10004ab86dbca4c9ab830cfe3e5576191f38False0.33154296875data4.263715688166435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .edata0x2ab0000x7b0x2009ae030fd3bde19d9e91eaa5d09fdc2bfFalse0.19921875data1.4913188767429284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .tls0x2ac0000x5c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rdata0x2ad0000x5d0x200d10b1e34149117b7858571e8c25b20bcFalse0.189453125data1.3878006252217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x2ae0000x37d100x37e00a7bb34f05a5fa1f273b3ce85220afd71False0.5833813968120806data6.729835525026279IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .rsrc0x2e60000x278000x27800d7010fc483fe468bb4f2c23c00ed43faFalse0.7530594837816456data7.209891921042113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_CURSOR0x2e6bfc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                    RT_CURSOR0x2e6d300x134dataEnglishUnited States0.4642857142857143
                    RT_CURSOR0x2e6e640x134dataEnglishUnited States0.4805194805194805
                    RT_CURSOR0x2e6f980x134dataEnglishUnited States0.38311688311688313
                    RT_CURSOR0x2e70cc0x134dataEnglishUnited States0.36038961038961037
                    RT_CURSOR0x2e72000x134dataEnglishUnited States0.4090909090909091
                    RT_CURSOR0x2e73340x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                    RT_ICON0x2e74680x528Device independent bitmap graphic, 16 x 32 x 32, image size 1280EnglishUnited States0.5371212121212121
                    RT_ICON0x2e79900x1428Device independent bitmap graphic, 32 x 64 x 32, image size 5120EnglishUnited States0.4312015503875969
                    RT_ICON0x2e8db80x2d28Device independent bitmap graphic, 48 x 96 x 32, image size 11520EnglishUnited States0.3768166089965398
                    RT_ICON0x2ebae00x1777aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9983354487006096
                    RT_STRING0x30325c0x33cdata0.34782608695652173
                    RT_STRING0x3035980x428data0.3693609022556391
                    RT_STRING0x3039c00x4b0data0.365
                    RT_STRING0x303e700x364data0.33410138248847926
                    RT_STRING0x3041d40x414data0.40804597701149425
                    RT_STRING0x3045e80x10cdata0.6231343283582089
                    RT_STRING0x3046f40xccdata0.6764705882352942
                    RT_STRING0x3047c00x2dcdata0.4562841530054645
                    RT_STRING0x304a9c0x35cdata0.3953488372093023
                    RT_STRING0x304df80x3f8data0.37893700787401574
                    RT_STRING0x3051f00x408data0.3943798449612403
                    RT_STRING0x3055f80x554data0.32111436950146627
                    RT_STRING0x305b4c0x364data0.3456221198156682
                    RT_STRING0x305eb00x274data0.31369426751592355
                    RT_STRING0x3061240x478data0.4187062937062937
                    RT_STRING0x30659c0x494data0.3532423208191126
                    RT_STRING0x306a300x488data0.3887931034482759
                    RT_STRING0x306eb80x474data0.3201754385964912
                    RT_STRING0x30732c0x378data0.40765765765765766
                    RT_STRING0x3076a40x3a4data0.3369098712446352
                    RT_STRING0x307a480x43cdata0.36808118081180813
                    RT_STRING0x307e840x10cdata0.5410447761194029
                    RT_STRING0x307f900xccdata0.6029411764705882
                    RT_STRING0x30805c0x214data0.5281954887218046
                    RT_STRING0x3082700x40cdata0.36003861003861004
                    RT_STRING0x30867c0x384data0.3688888888888889
                    RT_STRING0x308a000x318data0.3787878787878788
                    RT_STRING0x308d180x300data0.3684895833333333
                    RT_RCDATA0x3090180x10data1.5
                    RT_RCDATA0x3090280x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0020916524054002
                    RT_RCDATA0x30a4b40x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0025102692834322
                    RT_RCDATA0x30b5d40xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031718569780854
                    RT_RCDATA0x30c3600x7fcdata0.5024461839530333
                    RT_RCDATA0x30cb5c0x4dataEnglishUnited States3.0
                    RT_RCDATA0x30cb600x274Delphi compiled form 'TfmUpdater'0.6337579617834395
                    RT_GROUP_CURSOR0x30cdd40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                    RT_GROUP_CURSOR0x30cde80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                    RT_GROUP_CURSOR0x30cdfc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                    RT_GROUP_CURSOR0x30ce100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                    RT_GROUP_CURSOR0x30ce240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                    RT_GROUP_CURSOR0x30ce380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                    RT_GROUP_CURSOR0x30ce4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                    RT_GROUP_ICON0x30ce600x3edataEnglishUnited States0.7741935483870968
                    RT_VERSION0x30cea00x23cdataEnglishUnited States0.4597902097902098
                    RT_MANIFEST0x30d0dc0x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
                    DLLImport
                    winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
                    comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
                    shell32.dllShell_NotifyIconW, SHAppBarMessage
                    user32.dllCopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, CreateAcceleratorTableW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, ShowOwnedPopups, GetSystemMenu, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, SetWindowLongW, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, ClientToScreen, GetClipboardData, SetClipboardData, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, GetClassLongW, ActivateKeyboardLayout, GetParent, DrawTextW, SetScrollRange, MonitorFromRect, InsertMenuItemW, PeekMessageA, GetPropW, SetClassLongW, MessageBoxW, MessageBeep, SetPropW, RemovePropW, UpdateWindow, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, EmptyClipboard, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowPos, SetWindowRgn, GetMenuItemCount, RemoveMenu, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, OpenClipboard, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CloseClipboard, DestroyCursor, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, CopyIcon, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, ValidateRect, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowLongW, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, CreateIconIndirect, FindWindowW, DeleteMenu, GetKeyboardLayout
                    version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                    oleaut32.dllSafeArrayPutElement, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SafeArrayAccessData, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, SysAllocStringLen, SafeArrayUnaccessData, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, VariantChangeType
                    advapi32.dllRegSetValueExW, RegConnectRegistryW, OpenThreadToken, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, IsValidSid, RegReplaceKeyW, GetSidSubAuthority, GetTokenInformation, RegCreateKeyExW, GetSidSubAuthorityCount, RegLoadKeyW, RegEnumKeyExW, GetSidIdentifierAuthority, RegDeleteKeyW, RegOpenKeyExW, OpenProcessToken, RegDeleteValueW, RegFlushKey, RegEnumValueW, RegQueryValueExW, RegCloseKey, RegRestoreKeyW
                    msvcrt.dllmemcpy, memset
                    WTSAPI32.DLLWTSUnRegisterSessionNotification, WTSRegisterSessionNotification
                    winhttp.dllWinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption
                    kernel32.dllSetFileAttributesW, GetFileType, SetFileTime, QueryDosDeviceW, GetACP, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, MapViewOfFile, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, GetLogicalDrives, GetFileAttributesExW, LoadLibraryExW, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, GlobalFindAtomW, VirtualQuery, VirtualQueryEx, GlobalFree, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, GetConsoleOutputCP, UnmapViewOfFile, GetConsoleCP, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, GetLocaleInfoW, CreateFileW, SystemTimeToFileTime, EnumResourceNamesW, DeleteFileW, GetLocalTime, WaitForSingleObject, GetOEMCP, WriteFile, CreateFileMappingW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, TzSpecificLocalTimeToSystemTime, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
                    ole32.dllIsEqualGUID, OleInitialize, CoInitializeEx, OleUninitialize, CoInitialize, CoCreateInstance, CoUninitialize, CoTaskMemFree, CoTaskMemAlloc
                    gdi32.dllPie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, RectVisible, AngleArc, SetAbortProc, SetTextColor, StretchBlt, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, PolyBezierTo, CreateICW, CreateDCW, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, CreateFontIndirectW, PolyBezier, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, Rectangle, SaveDC, DeleteDC, FrameRgn, BitBlt, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, SetWinMetaFileBits, CombineRgn, GetStretchBltMode, CreateDIBitmap, SetStretchBltMode, GetDIBits, CreateDIBSection, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
                    NameOrdinalAddress
                    __dbk_fcall_wrapper20x411ffc
                    dbkFCallWrapperAddr10x6a2648
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-10-31T19:46:00.909051+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.7497033.36.251.235443TCP
                    2024-10-31T19:46:02.581513+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.7497043.36.251.235443TCP
                    2024-10-31T19:46:16.967217+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.749746TCP
                    2024-10-31T19:46:56.333467+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.749959TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 31, 2024 19:45:59.904227972 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:45:59.904268026 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:45:59.904352903 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:45:59.911545992 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:45:59.911559105 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:00.908987045 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:00.909050941 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:00.996491909 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:00.996517897 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:00.996870995 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.050076008 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.145409107 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.191329956 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.464137077 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.464226007 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.464277983 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.565980911 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.565993071 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.566035032 CET49703443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.566039085 CET443497033.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.574835062 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.574882030 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:01.574935913 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.575126886 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:01.575141907 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.580996990 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.581512928 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:02.581549883 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.582573891 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:02.582580090 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.901103020 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.901211023 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.901256084 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:02.901603937 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:02.901613951 CET443497043.36.251.235192.168.2.7
                    Oct 31, 2024 19:46:02.901639938 CET49704443192.168.2.73.36.251.235
                    Oct 31, 2024 19:46:02.901645899 CET443497043.36.251.235192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 31, 2024 19:45:59.379789114 CET5210253192.168.2.71.1.1.1
                    Oct 31, 2024 19:45:59.898832083 CET53521021.1.1.1192.168.2.7
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 31, 2024 19:45:59.379789114 CET192.168.2.71.1.1.10x940dStandard query (0)valuesearch.co.krA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 31, 2024 19:45:59.898832083 CET1.1.1.1192.168.2.70x940dNo error (0)valuesearch.co.kr3.36.251.235A (IP address)IN (0x0001)false
                    Oct 31, 2024 19:45:59.898832083 CET1.1.1.1192.168.2.70x940dNo error (0)valuesearch.co.kr3.39.130.246A (IP address)IN (0x0001)false
                    • valuesearch.co.kr
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.7497033.36.251.2354437432C:\Users\user\Desktop\VALUESearchUpdater.exe
                    TimestampBytes transferredDirectionData
                    2024-10-31 18:46:01 UTC209OUTGET /files/publish/xlllibver.txt HTTP/1.1
                    Connection: Keep-Alive
                    Accept: application/json, text/plain, */*
                    Accept-Charset: utf-8
                    Accept-Language: ko-KR
                    User-Agent: Zewus Agent
                    Host: valuesearch.co.kr
                    2024-10-31 18:46:01 UTC256INHTTP/1.1 200 OK
                    Date: Thu, 31 Oct 2024 18:46:01 GMT
                    Content-Type: text/plain; charset=utf-8
                    Content-Length: 8
                    Connection: close
                    Expires: Sat, 30 Nov 2024 18:46:01 GMT
                    Last-Modified: Wed, 30 Oct 2024 08:11:11 GMT
                    Server: VALUESearch - 1.95.0.1581
                    2024-10-31 18:46:01 UTC8INData Raw: 3e 31 2e 31 2e 36 2e 34
                    Data Ascii: >1.1.6.4


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.7497043.36.251.2354437432C:\Users\user\Desktop\VALUESearchUpdater.exe
                    TimestampBytes transferredDirectionData
                    2024-10-31 18:46:02 UTC212OUTGET /files/publish/valuesearchn.zip HTTP/1.1
                    Connection: Keep-Alive
                    Accept: application/json, text/plain, */*
                    Accept-Charset: utf-8
                    Accept-Language: ko-KR
                    User-Agent: Zewus Agent
                    Host: valuesearch.co.kr
                    2024-10-31 18:46:02 UTC177INHTTP/1.1 404 Not Found
                    Date: Thu, 31 Oct 2024 18:46:02 GMT
                    Content-Type: text/html; charset=utf-8
                    Content-Length: 45
                    Connection: close
                    Server: VALUESearch - 1.95.0.1581
                    2024-10-31 18:46:02 UTC45INData Raw: 3c 68 74 6d 6c 3e 46 69 6c 65 20 76 61 6c 75 65 73 65 61 72 63 68 6e 2e 7a 69 70 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 68 74 6d 6c 3e
                    Data Ascii: <html>File valuesearchn.zip not found.</html>


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:14:45:58
                    Start date:31/10/2024
                    Path:C:\Users\user\Desktop\VALUESearchUpdater.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\VALUESearchUpdater.exe"
                    Imagebase:0x300000
                    File size:3'151'872 bytes
                    MD5 hash:4AB61EE925A3C1D719EBCE6214ECDB45
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Borland Delphi
                    Reputation:low
                    Has exited:true

                    No disassembly