Loading ...

Play interactive tourEdit tour

Analysis Report xuy1.bin

Overview

General Information

Joe Sandbox Version:26.0.0
Analysis ID:836034
Start date:11.04.2019
Start time:19:17:10
Joe Sandbox Product:Cloud
Overall analysis duration:0h 7m 50s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:xuy1.bin (renamed file extension from bin to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40 1.8.0_191, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
  • GSI enabled (Java)
Analysis stop reason:Timeout
Detection:MAL
Classification:mal68.evad.winEXE@5/1@0/4
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtUserCreateWindowEx calls found.
  • Report size getting too big, too many NtUserDestroyWindow calls found.
  • Skipping Hybrid Code Analysis (implementation is based on Java, .Net, VB or Delphi, or parses a document) for: xuy1.exe, regsvr32.exe, rundll32.exe

Detection

StrategyScoreRangeReportingWhitelistedDetection
Threshold680 - 100Report FP / FNfalsemalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and Control
Valid AccountsGraphical User Interface1Winlogon Helper DLLProcess Injection111Software Packing1Credential DumpingProcess Discovery1Application Deployment SoftwareData from Local SystemData Encrypted1Standard Non-Application Layer Protocol1
Replication Through Removable MediaService ExecutionPort MonitorsAccessibility FeaturesProcess Injection111Network SniffingSecurity Software Discovery1Remote ServicesData from Removable MediaExfiltration Over Other Network MediumStandard Application Layer Protocol1
Drive-by CompromiseWindows Management InstrumentationAccessibility FeaturesPath InterceptionObfuscated Files or Information2Input CaptureSystem Information Discovery1Windows Remote ManagementData from Network Shared DriveAutomated ExfiltrationCustom Cryptographic Protocol

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Antivirus or Machine Learning detection for sampleShow sources
Source: xuy1.exeJoe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked fileShow sources
Source: 0.0.xuy1.exe.400000.0.unpackJoe Sandbox ML: detected
Source: 0.1.xuy1.exe.400000.0.unpackJoe Sandbox ML: detected
Source: 0.2.xuy1.exe.3ff0000.2.unpackJoe Sandbox ML: detected

Networking:

barindex
Connects to IPs without corresponding DNS lookupsShow sources
Source: unknownTCP traffic detected without corresponding DNS query: 215.56.245.0
Source: unknownTCP traffic detected without corresponding DNS query: 215.56.245.0
Source: unknownTCP traffic detected without corresponding DNS query: 215.56.245.0
Source: unknownTCP traffic detected without corresponding DNS query: 174.60.72.9
Source: unknownTCP traffic detected without corresponding DNS query: 174.60.72.9
Source: unknownTCP traffic detected without corresponding DNS query: 174.60.72.9
Source: unknownTCP traffic detected without corresponding DNS query: 87.18.28.52
Source: unknownTCP traffic detected without corresponding DNS query: 87.18.28.52
Source: unknownTCP traffic detected without corresponding DNS query: 87.18.28.52
Source: unknownTCP traffic detected without corresponding DNS query: 150.132.134.24
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)Show sources
Source: global trafficTCP traffic: 192.168.1.81:49216 -> 215.56.245.0:443
Source: global trafficTCP traffic: 192.168.1.81:49217 -> 174.60.72.9:443
Source: global trafficTCP traffic: 192.168.1.81:49218 -> 87.18.28.52:443
Source: global trafficTCP traffic: 192.168.1.81:49219 -> 150.132.134.24:443
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 49218 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49219 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49217 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 443

System Summary:

barindex
Blacklisted process start detected (Windows program)Show sources
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0
PE file has nameless sectionsShow sources
Source: xuy1.exeStatic PE information: section name:
PE file contains executable resources (Code or Archives)Show sources
Source: xuy1.exeStatic PE information: Resource name: RT_STRING type: ump; DOS executable (COM)
Tries to load missing DLLsShow sources
Source: C:\Windows\System32\regsvr32.exeSection loaded: f1.dll
PE file has an executable .text section which is very likely to contain packed code (zlib compression ratio < 0.3)Show sources
Source: xuy1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Classification labelShow sources
Source: classification engineClassification label: mal68.evad.winEXE@5/1@0/4
Creates files inside the user directoryShow sources
Source: C:\Users\user\Desktop\xuy1.exeFile created: C:\Users\user\Desktop\xuy1.dllJump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: xuy1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Parts of this applications are using Borland Delphi (Probably coded in Delphi)Show sources
Source: C:\Users\user\Desktop\xuy1.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\xuy1.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Reads software policiesShow sources
Source: C:\Users\user\Desktop\xuy1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Runs a DLL by calling functionsShow sources
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\xuy1.exe 'C:\Users\user\Desktop\xuy1.exe'
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0
Source: C:\Users\user\Desktop\xuy1.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0

Data Obfuscation:

barindex
PE file contains sections with non-standard namesShow sources
Source: xuy1.exeStatic PE information: section name: .newIT
Source: xuy1.exeStatic PE information: section name:
Source: xuy1.dll.0.drStatic PE information: section name: .didata
Registers a DLLShow sources
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224
Binary may include packed or encrypted codeShow sources
Source: initial sampleStatic PE information: section name: .text entropy: 7.29911063566

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Users\user\Desktop\xuy1.exeFile created: C:\Users\user\Desktop\xuy1.dllJump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\xuy1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xuy1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Checks the free space of harddrivesShow sources
Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformation
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)Show sources
Source: C:\Users\user\Desktop\xuy1.exeWindow / User API: threadDelayed 420Jump to behavior
Source: C:\Users\user\Desktop\xuy1.exeWindow / User API: threadDelayed 420Jump to behavior
Found dropped PE file which has not been started or loadedShow sources
Source: C:\Users\user\Desktop\xuy1.exeDropped PE file which has not been started: C:\Users\user\Desktop\xuy1.dllJump to dropped file
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\Desktop\xuy1.exe TID: 2712Thread sleep count: 420 > 30Jump to behavior
Source: C:\Users\user\Desktop\xuy1.exe TID: 2588Thread sleep count: 420 > 30Jump to behavior
Queries a list of all running processesShow sources
Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\Desktop\xuy1.exeSystem information queried: KernelDebuggerInformation

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 87.18.28.52 443
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 150.132.134.24 443
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 215.56.245.0 443
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 174.60.72.9 443
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\xuy1.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: rundll32.exe, 00000003.00000002.1645767935.00600000.00000002.sdmpBinary or memory string: Program Manager
Source: rundll32.exe, 00000003.00000002.1645767935.00600000.00000002.sdmpBinary or memory string: Progman
Source: rundll32.exe, 00000003.00000002.1645767935.00600000.00000002.sdmpBinary or memory string: Shell_TrayWnd

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformation
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\xuy1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 836034 Sample: xuy1.bin Startdate: 11/04/2019 Architecture: WINDOWS Score: 68 25 Antivirus or Machine Learning detection for sample 2->25 27 PE file has nameless sections 2->27 29 Antivirus or Machine Learning detection for unpacked file 2->29 7 xuy1.exe 1 2->7         started        process3 file4 17 C:\Users\user\Desktop\xuy1.dll, PE32 7->17 dropped 10 regsvr32.exe 7->10         started        process5 signatures6 31 Blacklisted process start detected (Windows program) 10->31 13 rundll32.exe 10->13         started        process7 dnsIp8 19 150.132.134.24, 443 ERI-AS-EricssonNetworkSystemsIncUS Sweden 13->19 21 215.56.245.0, 443 DNIC-ASBLK-00721-00726-DoDNetworkInformationCenterUS United States 13->21 23 2 other IPs or domains 13->23 33 System process connects to network (likely due to code injection or exploit) 13->33 signatures9

Simulations

Behavior and APIs

TimeTypeDescription
19:18:14API Interceptor498x Sleep call for process: xuy1.exe modified
19:18:14API Interceptor1x Sleep call for process: regsvr32.exe modified
19:18:15API Interceptor1x Sleep call for process: rundll32.exe modified

Antivirus and Machine Learning Detection

Initial Sample

SourceDetectionScannerLabelLink
xuy1.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.0.xuy1.exe.400000.0.unpack100%Joe Sandbox MLDownload File
0.1.xuy1.exe.400000.0.unpack100%Joe Sandbox MLDownload File
0.2.xuy1.exe.3ff0000.2.unpack100%Joe Sandbox MLDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Startup

  • System is w7_1
  • xuy1.exe (PID: 224 cmdline: 'C:\Users\user\Desktop\xuy1.exe' MD5: 9977310186F3DF14EE1C3D60EDBB9821)
    • regsvr32.exe (PID: 5932 cmdline: C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224 MD5: 432BE6CF7311062633459EEF6B242FB5)
      • rundll32.exe (PID: 5960 cmdline: C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • cleanup

Created / dropped Files

C:\Users\user\Desktop\xuy1.dll Download File
Process:C:\Users\user\Desktop\xuy1.exe
File Type:PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
Size (bytes):453648
Entropy (8bit):6.321533380248072
Encrypted:false
MD5:A2E35DF6B51831044519B392E3050B6F
SHA1:6FA35EA0C642B0C7954B36B27948B29EE12C9BC9
SHA-256:B7AB58BD4CB1E31C1ABA4BB5B14CCF669A9D9CD9A7D8B7217CDE84548FC78EDD
SHA-512:990A4952E1A409FEBB799A07BB7050B79CAD18012EE017D38571379A7FC4BDDB539D57F912D65CC87DCC3A9D64A264F94F4B4DDB96651212C958044D3ECE69BF
Malicious:false
Reputation:low
Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..\.................^..........(u............@..................................................................@..p.... ...............................`..d=...................................................".......0.......................text....T.......V.................. ..`.itext..H....p.......Z.............. ..`.data....%.......&...b..............@....bss.....b...............................idata....... ......................@....didata......0......................@....edata..p....@......................@..@.rdata..D....P......................@..@.reloc..d=...`...>..................@..B.rsrc...............................@..@....................................@..@........................................................

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPCountryFlagASNASN NameMalicious
87.18.28.52Italy
3269ASN-IBSNAZITtrue
150.132.134.24Sweden
158ERI-AS-EricssonNetworkSystemsIncUStrue
215.56.245.0United States
721DNIC-ASBLK-00721-00726-DoDNetworkInformationCenterUStrue
174.60.72.9United States
7922unknowntrue

Static File Info

General

File type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Entropy (8bit):6.993291537469341
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:xuy1.exe
File size:952320
MD5:9977310186f3df14ee1c3d60edbb9821
SHA1:2be94450d8677cb819aa74684901bb52e1604674
SHA256:67a77942a7aa208f2a7e178de2b75e5acab6c5fd89883f691255bb9457a0ca4c
SHA512:b50125e0eea2e6e873a16354b30bdab8227ebfa6f25aefc3a5461bec3feb330b2b054878b70c68b31daebe47b7ae7bbc186d58e48086a502e4014a93e7c7f174
SSDEEP:24576:MWn0sX1FqSgNfscXtaJPnzKeAnjTy+RzHZ:9qfawh
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8..\............................h:............@.................................K............@.........................

File Icon

Icon Hash:aab2e3e39383aa00

Static PE Info

General

Entrypoint:0x403a68
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x5CADA338 [Wed Apr 10 08:03:04 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f7bf957f6a3c581f66fe6f6bb8756c85

Entrypoint Preview

Instruction
pushad
xor ebx, ebx
push 00002111h
push 00008777h
call 5D1F994Bh
or eax, eax
jne 5D1F9FE2h
push 00000014h
call 5D1F9E43h
or eax, eax
jne 5D1F9FD7h
push 00000040h
push 00001000h
push dword ptr [ebx+004D000Ch]
push 00000000h
call dword ptr [ebx+004D0688h]
mov edi, eax
mov dword ptr [ebx+004D0024h], edi
cmp ebx, 00000000h
jbe 5D1F9FCEh
add dword ptr [ebx+004D0000h], ebx
add dword ptr [ebx+004D0030h], ebx
mov esi, dword ptr [ebx+004D0000h]
mov ecx, dword ptr [ebx+004D000Ch]
rep movsb
mov ecx, 000FFFFFh
mov eax, dword ptr [ebx+004D0024h]
push 00403AE9h
pop dword ptr [ebx+004D0034h]
and dword ptr [ebx+004D0034h], ecx
xor eax, dword ptr [ebx+004D0034h]
jmp eax
push FFFF0000h
call 5D1F9BEBh
or ebx, ebx
je 5D1F9FD7h
push 00000004h
push 00001000h
push dword ptr [ebx+004D001Ch]
push 00000000h
call dword ptr [ebx+004D0688h]
push eax
pop dword ptr [ebx+004D0028h]
mov dword ptr [ebx+004D0018h], 00000002h
mov dword ptr [ebx+004D0014h], eax
lea eax, dword ptr [ebx+004D0018h]
push eax
push 00000040h
push dword ptr [ebx+0000000Ch]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x15a0000xf0.newIT
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1510000x83f0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xd04000x18.data
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2400xf4
IMAGE_DIRECTORY_ENTRY_IAT0xd06000x1c4.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xce8d80xcea00False0.808364526618ump; data7.29911063566IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0xd00000x80d6e0x1400False0.418359375ump; data4.23078910028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x1510000x83f00x8400False0.5498046875ump; data6.48386562547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.newIT0x15a0000xf00x200False0.248046875ump; data2.09852780187IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
0x15b0000x100000x10000False0.00128173828125ump; data0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x1516280x25a8ump; data
RT_MENU0x153bd00x3fcump; data
RT_MENU0x153fcc0x350ump; data
RT_MENU0x15431c0x274ump; data
RT_MENU0x1545900x3ccump; data
RT_MENU0x15495c0x4caump; data
RT_MENU0x154e280x312ump; data
RT_DIALOG0x15513c0x224ump; data
RT_DIALOG0x1553600x5ceump; data
RT_DIALOG0x1559300x100ump; data
RT_DIALOG0x155a300x294ump; data
RT_DIALOG0x155cc40x8cump; data
RT_DIALOG0x155d500x1a6ump; data
RT_DIALOG0x155ef80x100ump; data
RT_DIALOG0x155ff80x298ump; data
RT_STRING0x1562900x3eeump; data
RT_STRING0x1566800x37aump; DBase 3 data file
RT_STRING0x1569fc0x934ump; data
RT_STRING0x1573300x940ump; DOS executable (COM)
RT_STRING0x157c700x5e2ump; data
RT_STRING0x1582540x192ump; data
RT_STRING0x1583e80xb54ump; data
RT_STRING0x158f3c0x208ump; data
RT_RCDATA0x1591440x4fump; data
RT_RCDATA0x1591940x50ump; data
RT_RCDATA0x1591e40x3aump; data
RT_RCDATA0x1592200x5cump; data
RT_GROUP_ICON0x15927c0x16ump; MS Windows icon resource
RT_MANIFEST0x1592940x15aump; ASCII text, with CRLF line terminatorsEnglishUnited States

Imports

DLLImport
kernel32.dllGetACP, GetModuleHandleA, GetProcAddress, GetVersion, ExitThread, Sleep, VirtualAlloc, VirtualProtect, LoadLibraryA, CreateThread, ExitProcess, SetLocalPrimaryComputerNameA, GetSystemTimeAdjustment, GetConsoleInputWaitHandle, GetProcessHandleCount, WritePrivateProfileStructW, SetThreadAffinityMask, FindActCtxSectionGuid, SetComputerNameExA, HeapDestroy
comctl32.dllInitCommonControls, ImageList_GetFlags, DefSubclassProc, DPA_DeleteAllPtrs, FlatSB_GetScrollRange, SetWindowSubclass, ImageList_ReplaceIcon, ImageList_Replace
ole32.dllOleUninitialize, OleInitialize, CoAllowSetForegroundWindow, CoPopServiceDomain, DllGetClassObject, CoGetClassVersion, CoGetSystemSecurityPermissions
gdi32.dllGdiSetBatchLimit, ClearBitmapAttributes, GetWorldTransform, GetMetaRgn, GdiConvertDC, GdiGetBitmapBitsSize, GetPolyFillMode, CombineRgn, GetGlyphIndicesW, PaintRgn, DdEntry24
msimg32.dllTransparentBlt, AlphaBlend, vSetDdrawflag
oledlg.dllOleUIObjectPropertiesW, OleUIChangeSourceW, OleUIConvertA, OleUIUpdateLinksW, OleUIPromptUserW, OleUIEditLinksA, OleUIAddVerbMenuA, OleUICanConvertOrActivateAs, OleUIInsertObjectW, OleUIBusyA, OleUIChangeIconW, OleUIBusyW, OleUIUpdateLinksA
winspool.drvPerfCollect, EnumPrinterDataExA, SetPrinterDataExA, EnumFormsA, DocumentPropertiesW, EnumPortsW, EndDocPrinter
imagehlp.dllImageEnumerateCertificates, SymGetSymFromName, MapDebugInformation, SymGetSymPrev, ImageGetDigestStream, SymGetLineNext
oleacc.dllAccessibleObjectFromEvent, GetOleaccVersionInfo, GetStateTextW, AccessibleObjectFromWindow, AccessibleChildren, CreateStdAccessibleObject, CreateStdAccessibleProxyW, IID_IAccessible
shlwapi.dllPathAppendA, SHOpenRegStream2W, SHRegGetPathW, PathRenameExtensionA, PathFindFileNameA, SHRegSetUSValueA, PathGetCharTypeA, PathFindNextComponentA, PathUnquoteSpacesA, AssocQueryStringA, PathIsUNCW
shell32.dllSHStartNetConnectionDialogW, FindExecutableW, SHPathPrepareForWriteA, CommandLineToArgvW, ShellExecuteEx, SHCloneSpecialIDList, RealShellExecuteA, SHGetNewLinkInfoW

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Apr 11, 2019 19:19:05.048475981 MESZ49216443192.168.1.81215.56.245.0
Apr 11, 2019 19:19:08.048301935 MESZ49216443192.168.1.81215.56.245.0
Apr 11, 2019 19:19:14.047909975 MESZ49216443192.168.1.81215.56.245.0
Apr 11, 2019 19:19:26.075037003 MESZ49217443192.168.1.81174.60.72.9
Apr 11, 2019 19:19:29.063646078 MESZ49217443192.168.1.81174.60.72.9
Apr 11, 2019 19:19:35.064271927 MESZ49217443192.168.1.81174.60.72.9
Apr 11, 2019 19:19:47.072783947 MESZ49218443192.168.1.8187.18.28.52
Apr 11, 2019 19:19:50.079416990 MESZ49218443192.168.1.8187.18.28.52
Apr 11, 2019 19:19:56.079925060 MESZ49218443192.168.1.8187.18.28.52
Apr 11, 2019 19:20:08.082268953 MESZ49219443192.168.1.81150.132.134.24

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:19:17:15
Start date:11/04/2019
Path:C:\Users\user\Desktop\xuy1.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\xuy1.exe'
Imagebase:0x400000
File size:952320 bytes
MD5 hash:9977310186F3DF14EE1C3D60EDBB9821
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

General

Start time:19:18:13
Start date:11/04/2019
Path:C:\Windows\System32\regsvr32.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\regsvr32.exe -s C:\Users\user~1\Desktop\xuy1.dll f1 C:\Users\user~1\Desktop\xuy1.exe@224
Imagebase:0xfd0000
File size:14848 bytes
MD5 hash:432BE6CF7311062633459EEF6B242FB5
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

General

Start time:19:18:14
Start date:11/04/2019
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\\rundll32.exe C:\Users\user~1\Desktop\xuy1.dll,f0
Imagebase:0x4e0000
File size:44544 bytes
MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

Disassembly

Code Analysis

Reset < >