Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gRo3W1D3VU.exe

Overview

General Information

Sample Name:gRo3W1D3VU.exe
Original Sample Name:159be70701e7fe1d7d41ae092f1892f87d0cc615c829b16aa78a333e6a7aa923.exe
Analysis ID:1287047
MD5:99ca96aad19f9b58bfaa026e8b3e40da
SHA1:11bfab7bc400bbeaec6a46eacbcdbcd490dd4640
SHA256:159be70701e7fe1d7d41ae092f1892f87d0cc615c829b16aa78a333e6a7aa923
Tags:exe
Infos:

Detection

Customer Loader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected Customer Loader
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
.NET source code contains potential unpacker
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
May sleep (evasive loops) to hinder dynamic analysis
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • gRo3W1D3VU.exe (PID: 7508 cmdline: C:\Users\user\Desktop\gRo3W1D3VU.exe MD5: 99CA96AAD19F9B58BFAA026E8B3E40DA)
  • cleanup
{"C2 url": "https://kyliansuperm92139124.shop/customer/914"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: gRo3W1D3VU.exe PID: 7508JoeSecurity_CustomerLoaderYara detected Customer LoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: gRo3W1D3VU.exeMalware Configuration Extractor: Customer Loader {"C2 url": "https://kyliansuperm92139124.shop/customer/914"}
    Source: gRo3W1D3VU.exeVirustotal: Detection: 50%Perma Link
    Source: gRo3W1D3VU.exeReversingLabs: Detection: 50%
    Source: https://kyliansuperm92139124.shop/customer/914Avira URL Cloud: Label: malware
    Source: https://kyliansuperm92139124.shopAvira URL Cloud: Label: phishing
    Source: kyliansuperm92139124.shopVirustotal: Detection: 17%Perma Link
    Source: https://kyliansuperm92139124.shopVirustotal: Detection: 11%Perma Link
    Source: https://kyliansuperm92139124.shop/customer/914Virustotal: Detection: 20%Perma Link
    Source: gRo3W1D3VU.exeString decryptor: VirtualProtect
    Source: gRo3W1D3VU.exeString decryptor: amsi.dll
    Source: gRo3W1D3VU.exeString decryptor: AmsiScanBuffer
    Source: gRo3W1D3VU.exeString decryptor: https://kyliansuperm92139124.shop/customer/914
    Source: gRo3W1D3VU.exeString decryptor: !!!(.*?)!!!
    Source: gRo3W1D3VU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://kyliansuperm92139124.shop/customer/914
    Source: unknownDNS traffic detected: query: kyliansuperm92139124.shop replaycode: Server failure (2)
    Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://kyliansuperm92139124.shop
    Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E641D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://kyliansuperm92139124.shop/customer/914
    Source: gRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64256000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://kyliansuperm92139124.shopx
    Source: unknownDNS traffic detected: queries for: kyliansuperm92139124.shop
    Source: gRo3W1D3VU.exeStatic PE information: No import functions for PE file found
    Source: gRo3W1D3VU.exeBinary or memory string: OriginalFilename vs gRo3W1D3VU.exe
    Source: gRo3W1D3VU.exe, 00000000.00000002.368211617.0000016E62432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs gRo3W1D3VU.exe
    Source: gRo3W1D3VU.exe, 00000000.00000002.368233230.0000016E625E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs gRo3W1D3VU.exe
    Source: gRo3W1D3VU.exeBinary or memory string: OriginalFilename vs gRo3W1D3VU.exe
    Source: gRo3W1D3VU.exeVirustotal: Detection: 50%
    Source: gRo3W1D3VU.exeReversingLabs: Detection: 50%
    Source: gRo3W1D3VU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
    Source: gRo3W1D3VU.exe, .csBase64 encoded string: 'mQ/DK6Sa9sDTlXe4IA2CbdDNyPolTdFsIZKsK+9E84ic4hIGDN9u4sAlXAikHcB6'
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\gRo3W1D3VU.exe.logJump to behavior
    Source: classification engineClassification label: mal92.troj.evad.winEXE@1/1@3/0
    Source: gRo3W1D3VU.exe, .csCryptographic APIs: 'CreateDecryptor'
    Source: gRo3W1D3VU.exe, .csCryptographic APIs: 'TransformFinalBlock'
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: gRo3W1D3VU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: gRo3W1D3VU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: Process Memory Space: gRo3W1D3VU.exe PID: 7508, type: MEMORYSTR
    Source: gRo3W1D3VU.exe, .cs.Net Code: System.AppDomain.Load(byte[])
    Source: gRo3W1D3VU.exeStatic PE information: real checksum: 0xffb5 should be: 0x2a65
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exe TID: 7540Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exe TID: 7532Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: gRo3W1D3VU.exe, 00000000.00000002.368334749.0000016E62692000.00000004.00000020.00020000.00000000.sdmp, gRo3W1D3VU.exe, 00000000.00000003.368035080.0000016E62691000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllgg
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeQueries volume information: C:\Users\user\Desktop\gRo3W1D3VU.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\gRo3W1D3VU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory21
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Software Packing
    NTDS1
    Remote System Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Obfuscated Files or Information
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    gRo3W1D3VU.exe51%VirustotalBrowse
    gRo3W1D3VU.exe50%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    kyliansuperm92139124.shop18%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://kyliansuperm92139124.shop/customer/914100%Avira URL Cloudmalware
    https://kyliansuperm92139124.shopx0%Avira URL Cloudsafe
    https://kyliansuperm92139124.shop100%Avira URL Cloudphishing
    https://kyliansuperm92139124.shop11%VirustotalBrowse
    https://kyliansuperm92139124.shop/customer/91420%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    kyliansuperm92139124.shop
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    https://kyliansuperm92139124.shop/customer/914true
    • 20%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://kyliansuperm92139124.shopgRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmptrue
    • 11%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    https://kyliansuperm92139124.shopxgRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64256000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namegRo3W1D3VU.exe, 00000000.00000002.368434168.0000016E64249000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      No contacted IP infos
      Joe Sandbox Version:38.0.0 Beryl
      Analysis ID:1287047
      Start date and time:2023-08-07 13:29:10 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 2m 42s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:1
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample file name:gRo3W1D3VU.exe
      Original Sample Name:159be70701e7fe1d7d41ae092f1892f87d0cc615c829b16aa78a333e6a7aa923.exe
      Detection:MAL
      Classification:mal92.troj.evad.winEXE@1/1@3/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 80%
      • Number of executed functions: 9
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Execution Graph export aborted for target gRo3W1D3VU.exe, PID 7508 because it is empty
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      13:30:07API Interceptor1x Sleep call for process: gRo3W1D3VU.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\gRo3W1D3VU.exe
      File Type:CSV text
      Category:dropped
      Size (bytes):1281
      Entropy (8bit):5.367899416177239
      Encrypted:false
      SSDEEP:24:ML9E4KrL1qE4GiD0E4KeGiKDE4KGKN08AKhPKIE4TKD1KoZAE4KKPz:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1Q
      MD5:7115A3215A4C22EF20AB9AF4160EE8F5
      SHA1:A4CAB34355971C1FBAABECEFA91458C4936F2C24
      SHA-256:A4A689E8149166591F94A8C84E99BE744992B9E80BDB7A0713453EB6C59BBBB2
      SHA-512:2CEF2BCD284265B147ABF300A4D26AD1AAC743EFE0B47A394FB614B6843A60B9F918E56261A56334078D0D9681132F3403FB734EE66E1915CF76F29411D5CE20
      Malicious:false
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.490603300851477
      TrID:
      • Win64 Executable GUI (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:gRo3W1D3VU.exe
      File size:10'752 bytes
      MD5:99ca96aad19f9b58bfaa026e8b3e40da
      SHA1:11bfab7bc400bbeaec6a46eacbcdbcd490dd4640
      SHA256:159be70701e7fe1d7d41ae092f1892f87d0cc615c829b16aa78a333e6a7aa923
      SHA512:7267e98d590a906653216f92bc46dd598d54cf8fac2a74ccdda1bf4130d9f7d52a2c0e899cc434978ea0d188f486dfcef1b1ccb695640d2805300dae171e51a8
      SSDEEP:192:xSHXwiZU4+PVsBdlCnnV87Mf7Fhqg9QblGr3bzssFssq:MHVU4kVs3UnoezTyl+vssFssq
      TLSH:4F221A088BFC111BE59B97BCDDB302821275AA7B3543EF2B9A9C91C90C613D06F91376
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.d.........."...0.................. ....@...... .......................`............`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x400000
      Entrypoint Section:
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x64AA69BF [Sun Jul 9 08:03:11 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:
      Signature Valid:
      Signature Issuer:
      Signature Validation Error:
      Error Number:
      Not Before, Not After
        Subject Chain
          Version:
          Thumbprint MD5:
          Thumbprint SHA-1:
          Thumbprint SHA-256:
          Serial:
          Instruction
          dec ebp
          pop edx
          nop
          add byte ptr [ebx], al
          add byte ptr [eax], al
          add byte ptr [eax+eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x788.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x26000x1758.text
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x1e880x2000False0.5687255859375data5.671244000096234IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x40000x7880x800False0.31298828125data4.6088024886109595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_GROUP_ICON0x40b80x6data1.8333333333333333
          RT_VERSION0x40c00x364data0.6232718894009217
          RT_VERSION0x44240x364dataEnglishUnited States0.6255760368663594
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Aug 7, 2023 13:30:01.858216047 CEST5799053192.168.2.38.8.8.8
          Aug 7, 2023 13:30:02.888842106 CEST5799053192.168.2.38.8.8.8
          Aug 7, 2023 13:30:03.933128119 CEST5799053192.168.2.38.8.8.8
          Aug 7, 2023 13:30:05.899796009 CEST53579908.8.8.8192.168.2.3
          Aug 7, 2023 13:30:06.932257891 CEST53579908.8.8.8192.168.2.3
          Aug 7, 2023 13:30:08.000737906 CEST53579908.8.8.8192.168.2.3
          TimestampSource IPDest IPChecksumCodeType
          Aug 7, 2023 13:30:06.932440996 CEST192.168.2.38.8.8.8cffc(Port unreachable)Destination Unreachable
          Aug 7, 2023 13:30:08.000837088 CEST192.168.2.38.8.8.8cffc(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Aug 7, 2023 13:30:01.858216047 CEST192.168.2.38.8.8.80x4bd1Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
          Aug 7, 2023 13:30:02.888842106 CEST192.168.2.38.8.8.80x4bd1Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
          Aug 7, 2023 13:30:03.933128119 CEST192.168.2.38.8.8.80x4bd1Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Aug 7, 2023 13:30:05.899796009 CEST8.8.8.8192.168.2.30x4bd1Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false
          Aug 7, 2023 13:30:06.932257891 CEST8.8.8.8192.168.2.30x4bd1Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false
          Aug 7, 2023 13:30:08.000737906 CEST8.8.8.8192.168.2.30x4bd1Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:13:30:00
          Start date:07/08/2023
          Path:C:\Users\user\Desktop\gRo3W1D3VU.exe
          Wow64 process (32bit):false
          Commandline:C:\Users\user\Desktop\gRo3W1D3VU.exe
          Imagebase:0x16e62430000
          File size:10'752 bytes
          MD5 hash:99CA96AAD19F9B58BFAA026E8B3E40DA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Reputation:low

          Reset < >
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID: #=a_^
            • API String ID: 0-863911569
            • Opcode ID: f42928a97fecce7114afc1f62e01ed060f5a7806fafbc49adce538a6551cc1bd
            • Instruction ID: 741005f924314f4edcdaa5dd8787ff643f4ff6067cff426a1a638f8ddc632548
            • Opcode Fuzzy Hash: f42928a97fecce7114afc1f62e01ed060f5a7806fafbc49adce538a6551cc1bd
            • Instruction Fuzzy Hash: 1B51E2F2A0EA8E4FE7AB9634C8491B477E1EF85314F0401BAD88DC72D2D93DA8068755
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b5e270404c1043a82cb9c2d274b5ea3e85d79410b967d694f105b55e89ac591b
            • Instruction ID: dddc81724a12f02bdab95340188c17c78d9013e582b64a99c4ec09c64040d5a6
            • Opcode Fuzzy Hash: b5e270404c1043a82cb9c2d274b5ea3e85d79410b967d694f105b55e89ac591b
            • Instruction Fuzzy Hash: 3241577161894E8FDB89EF28C455AE973E2FF58300B5045B8D41EC7696CE35EC42CB90
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a04d64a20df71dd639c15584eefd294317edd8e6d412c76e2c334e4b63cb367d
            • Instruction ID: de97088d7488798f064e41a05dfdbfa492484927910bc1fd647698a7fe523adf
            • Opcode Fuzzy Hash: a04d64a20df71dd639c15584eefd294317edd8e6d412c76e2c334e4b63cb367d
            • Instruction Fuzzy Hash: B7315270A08A4E8FDF85DF58C894AEA77F1FF98310F104569D819D7295CB35E852CB90
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8bc40005847ad17cdc44b1ce9363da772a57f5d7fdb0f637bceeaa5e5df9749d
            • Instruction ID: 503ff0765f2ca6a9c203e090b002472ac30258c0bd9b9b9d6204ff6be4dfca06
            • Opcode Fuzzy Hash: 8bc40005847ad17cdc44b1ce9363da772a57f5d7fdb0f637bceeaa5e5df9749d
            • Instruction Fuzzy Hash: B121A1A294E7D20FE35387B498696A07FE0DF5312071D41EBD486CB4A3DA1C884AC7A2
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 40eeb0df1e8b3c7f289dcdd4f11b5c2b4e47e519fc1194f1c9842ff9fb5e49c7
            • Instruction ID: c2995bcdd0cc3b08f712ca186440f2eeda5d2855621dd29a22a287670dc2fca1
            • Opcode Fuzzy Hash: 40eeb0df1e8b3c7f289dcdd4f11b5c2b4e47e519fc1194f1c9842ff9fb5e49c7
            • Instruction Fuzzy Hash: 8811B2B1C0D28D8FDB06AB7084551EA7FB0AF12314F4400FED086D61A3DA7C4549CB51
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9318914b5bb1d09e3fcf24138b7bf1fcbbf6db8aee05f2da4a793b24e8e56ab4
            • Instruction ID: c9259bbe8d968ccec2ecd4959fd56831aa661303581e79bd156159ccdc3d8612
            • Opcode Fuzzy Hash: 9318914b5bb1d09e3fcf24138b7bf1fcbbf6db8aee05f2da4a793b24e8e56ab4
            • Instruction Fuzzy Hash: EC01807170C9894FC785EB6CD869A447BE1FF99311B5A01E6E009CB2A3DA24DC41C792
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a82c690fdaea42c9c8272f078de4a3a78af804b7d6eccb158d65eeecf92d5b1f
            • Instruction ID: dc7e6f225ab09da422dac9081e5247851485e544acfdc8be8c83607d57629766
            • Opcode Fuzzy Hash: a82c690fdaea42c9c8272f078de4a3a78af804b7d6eccb158d65eeecf92d5b1f
            • Instruction Fuzzy Hash: EBF08B81A1E6CA0FD307EBB458292F47BD0AF46160F0900FAC44DC71A3DC1CDD4547A6
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6eb4cf13003857d075f21a109987434dfe6043c52c7906e16f8fb4ae266e2ac8
            • Instruction ID: 5480f678f0522b564ec381fd01f45f135c8ff7eb0b7da96ede13a72bb899b44a
            • Opcode Fuzzy Hash: 6eb4cf13003857d075f21a109987434dfe6043c52c7906e16f8fb4ae266e2ac8
            • Instruction Fuzzy Hash: 75E02231A1C91C8FC794EA2CA8996A037E1FF6832038A01E7E008C726BEA14DC428380
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.368701532.00007FFBAC180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAC180000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffbac180000_gRo3W1D3VU.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 81e5cc00ff44d70a6635e96beb5c9a85846535719aaca59b67d04633853b5050
            • Instruction ID: 8756ab6c7d59d772fa8f513115969d49cc5fea161d2daf573b4aff21f5291037
            • Opcode Fuzzy Hash: 81e5cc00ff44d70a6635e96beb5c9a85846535719aaca59b67d04633853b5050
            • Instruction Fuzzy Hash: 86A00284D9B80E01D80B31BA9D8B09674506B8A924FC51560EC1980186E89E95E90397
            Uniqueness

            Uniqueness Score: -1.00%