Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Sysiq.exe

Overview

General Information

Sample name:Sysiq.exe
Analysis ID:1364079
MD5:d4ba5e2982463378357486b8d7f656c1
SHA1:dd0502d38ad2bb63e57bb71956bb02b38f825c86
SHA256:d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Sysiq.exe (PID: 5024 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 5480 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 2928 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 5784 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 5864 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 5608 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 5284 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 1684 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 4720 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 7104 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • Sysiq.exe (PID: 1436 cmdline: C:\Users\user\Desktop\Sysiq.exe MD5: D4BA5E2982463378357486B8D7F656C1)
  • customer.exe (PID: 1568 cmdline: "C:\Users\user\AppData\Roaming\customer.exe" MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 4180 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6984 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 2380 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 5564 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6620 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 4512 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 3496 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 1684 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 5284 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 5568 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
  • customer.exe (PID: 6196 cmdline: "C:\Users\user\AppData\Roaming\customer.exe" MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 2284 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 2812 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 5792 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 4336 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6664 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6056 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6096 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 4848 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6760 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
    • customer.exe (PID: 6788 cmdline: C:\Users\user\AppData\Roaming\customer.exe MD5: D4BA5E2982463378357486B8D7F656C1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.asiaparadisehotel.com", "Username": "asia@asiaparadisehotel.com", "Password": "^b2ycDldex$@"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2029549814.000001D3254D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2030388281.000001D33DA90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000018.00000002.2265691260.000001C800280000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 25 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Sysiq.exe.1d33da90000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.Sysiq.exe.1d3353bad30.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Sysiq.exe.1d3353bad30.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Sysiq.exe.1d3353bad30.3.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x32618:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3268a:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x32714:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x327a6:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x32810:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x32882:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x32918:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x329a8:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.Sysiq.exe.1d3353bad30.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 5 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Sysiq.exeAvira: detected
                    Source: http://45.137.22.163/Sluhmuv.mp3Avira URL Cloud: Label: malware
                    Source: http://45.137.22.163Avira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Roaming\customer.exeAvira: detection malicious, Label: HEUR/AGEN.1360909
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.asiaparadisehotel.com", "Username": "asia@asiaparadisehotel.com", "Password": "^b2ycDldex$@"}
                    Source: C:\Users\user\AppData\Roaming\customer.exeReversingLabs: Detection: 37%
                    Source: Sysiq.exeReversingLabs: Detection: 56%
                    Source: C:\Users\user\AppData\Roaming\customer.exeJoe Sandbox ML: detected
                    Source: Sysiq.exeJoe Sandbox ML: detected
                    Source: Sysiq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 45.137.22.163 45.137.22.163
                    Source: Joe Sandbox ViewIP Address: 45.137.22.163 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /Sluhmuv.mp3 HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D325261000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.0000018589981000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D325261000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029075002.000001D323789000.00000004.00000020.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.0000018589981000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163/Sluhmuv.mp3
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D325261000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.0000018589981000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Sysiq.exe, 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Sysiq.exe, 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2182677868.0000018599A4F000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2267122749.000001C8100CF000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, 7TKWGnXn73a.cs.Net Code: TCRT08Jk

                    System Summary

                    barindex
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 12.2.customer.exe.18589a98a98.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F79419 NtUnmapViewOfSection,24_2_00007FF848F79419
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 12_2_00007FF849002EF412_2_00007FF849002EF4
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F5913824_2_00007FF848F59138
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F569F024_2_00007FF848F569F0
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F5914824_2_00007FF848F59148
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F530F424_2_00007FF848F530F4
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F6F32B24_2_00007FF848F6F32B
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F6E3ED24_2_00007FF848F6E3ED
                    Source: customer.exe.0.drStatic PE information: No import functions for PE file found
                    Source: Sysiq.exeStatic PE information: No import functions for PE file found
                    Source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7abe5cc2-0bc4-4b46-a628-af4aacaf298a.exe4 vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7abe5cc2-0bc4-4b46-a628-af4aacaf298a.exe4 vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Sysiq.exe
                    Source: Sysiq.exe, 00000000.00000002.2029374005.000001D3238B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameHeqsj.dll" vs Sysiq.exe
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 12.2.customer.exe.18589a98a98.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, oUNrFbu7.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, JvgeUdCS7.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, UUqvN9Qp1Mm.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, r9z0egVzR.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, mA0cD4lJnL.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, mvuSkzq.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, PBhpbUDXgKv.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, PBhpbUDXgKv.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, PBhpbUDXgKv.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, PBhpbUDXgKv.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@63/4@0/1
                    Source: C:\Users\user\Desktop\Sysiq.exeFile created: C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: Sysiq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Sysiq.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                    Source: C:\Users\user\Desktop\Sysiq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Sysiq.exeReversingLabs: Detection: 56%
                    Source: C:\Users\user\Desktop\Sysiq.exeFile read: C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\customer.exe "C:\Users\user\AppData\Roaming\customer.exe"
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\customer.exe "C:\Users\user\AppData\Roaming\customer.exe"
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exe
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Sysiq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Sysiq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Sysiq.exe, DecoratorWrapperResolver.cs.Net Code: InstantiateFactory System.Reflection.Assembly.Load(byte[])
                    Source: customer.exe.0.dr, DecoratorWrapperResolver.cs.Net Code: InstantiateFactory System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Sysiq.exe.1d335299ab0.5.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.Sysiq.exe.1d335299ab0.5.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.Sysiq.exe.1d335299ab0.5.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.Sysiq.exe.1d335299ab0.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.Sysiq.exe.1d335299ab0.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.Sysiq.exe.1d33dd50000.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.Sysiq.exe.1d33dd50000.8.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.Sysiq.exe.1d33dd50000.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.Sysiq.exe.1d33dd50000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.Sysiq.exe.1d33dd50000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.Sysiq.exe.1d3352e9ae8.6.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.Sysiq.exe.1d3352e9ae8.6.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.Sysiq.exe.1d3352e9ae8.6.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.Sysiq.exe.1d3352e9ae8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.Sysiq.exe.1d3352e9ae8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d33da90000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D3254D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2030388281.000001D33DA90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800280000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.0000018589C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Sysiq.exeCode function: 0_2_00007FF848F0E2B3 push FFFFFFE8h; retf 0_2_00007FF848F0E2F1
                    Source: C:\Users\user\Desktop\Sysiq.exeCode function: 0_2_00007FF848F000BD pushad ; iretd 0_2_00007FF848F000C1
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 12_2_00007FF848F1E2B3 push FFFFFFE8h; retf 12_2_00007FF848F1E2F1
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 12_2_00007FF848F100BD pushad ; iretd 12_2_00007FF848F100C1
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F100BD pushad ; iretd 24_2_00007FF848F100C1
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F57963 push ebx; retf 24_2_00007FF848F5796A
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F55BF0 push eax; ret 24_2_00007FF848F55C5C
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F70D91 push ds; ret 24_2_00007FF848F70DB4
                    Source: C:\Users\user\AppData\Roaming\customer.exeCode function: 24_2_00007FF848F758B1 pushfd ; retf 24_2_00007FF848F758F1
                    Source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, Gt8Y8ua.csHigh entropy of concatenated method names: 'anZeP', 'N8MkSiRD', 'HzU0NMuK6', 'obFEacQg6', 'tkzz5e', 'q3fvpUP', 'fCmKhm0O', 'G4sAGKitM', 'f42w1', 'xSTFJHrP'
                    Source: C:\Users\user\Desktop\Sysiq.exeFile created: C:\Users\user\AppData\Roaming\customer.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Sysiq.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run customerJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run customerJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                    Source: C:\Users\user\Desktop\Sysiq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exe TID: 4512Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exe TID: 6620Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exe TID: 3624Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exe TID: 2276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exe TID: 2820Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exe TID: 7060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                    Source: customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                    Source: Sysiq.exe, 00000000.00000002.2029075002.000001D32377C000.00000004.00000020.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2180346695.0000018587FC1000.00000004.00000020.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2267415235.000001C8729AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeProcess created: C:\Users\user\Desktop\Sysiq.exe C:\Users\user\Desktop\Sysiq.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeProcess created: C:\Users\user\AppData\Roaming\customer.exe C:\Users\user\AppData\Roaming\customer.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeQueries volume information: C:\Users\user\Desktop\Sysiq.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeQueries volume information: C:\Users\user\AppData\Roaming\customer.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\customer.exeQueries volume information: C:\Users\user\AppData\Roaming\customer.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Sysiq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.customer.exe.18589a98a98.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.customer.exe.18589a98a98.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Sysiq.exe.1d3353bad30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.customer.exe.18589a98a98.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sysiq.exe PID: 5024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 1568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: customer.exe PID: 6196, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                    Valid AccountsWindows Management Instrumentation1
                    Registry Run Keys / Startup Folder
                    11
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    21
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Ingress Tool Transfer
                    SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                    Domain AccountsAtLogon Script (Windows)Logon Script (Windows)21
                    Virtualization/Sandbox Evasion
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Application Layer Protocol
                    Data Encrypted for ImpactDNS ServerEmail Addresses
                    Local AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureTraffic Duplication1
                    Application Layer Protocol
                    Data DestructionVirtual Private ServerEmployee Names
                    Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                    Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                    External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1364079 Sample: Sysiq.exe Startdate: 18/12/2023 Architecture: WINDOWS Score: 100 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for URL or domain 2->41 43 8 other signatures 2->43 6 customer.exe 14 5 2->6         started        9 Sysiq.exe 15 5 2->9         started        13 customer.exe 4 2->13         started        process3 dnsIp4 45 Antivirus detection for dropped file 6->45 47 Multi AV Scanner detection for dropped file 6->47 49 Machine Learning detection for dropped file 6->49 15 customer.exe 6->15         started        17 customer.exe 6->17         started        19 customer.exe 6->19         started        27 7 other processes 6->27 35 45.137.22.163, 49704, 49705, 49714 ROOTLAYERNETNL Netherlands 9->35 33 C:\Users\user\AppData\Roaming\customer.exe, PE32+ 9->33 dropped 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->51 21 Sysiq.exe 9->21         started        23 Sysiq.exe 9->23         started        25 Sysiq.exe 9->25         started        29 7 other processes 9->29 31 10 other processes 13->31 file5 signatures6 process7

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Sysiq.exe57%ReversingLabsByteCode-MSIL.Trojan.Zilla
                    Sysiq.exe100%AviraHEUR/AGEN.1360909
                    Sysiq.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\customer.exe100%AviraHEUR/AGEN.1360909
                    C:\Users\user\AppData\Roaming\customer.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\customer.exe38%ReversingLabsByteCode-MSIL.Trojan.Zilla
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://45.137.22.163/Sluhmuv.mp3100%Avira URL Cloudmalware
                    http://45.137.22.163100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://45.137.22.163/Sluhmuv.mp3false
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://github.com/mgravell/protobuf-netSysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.ipify.orgSysiq.exe, 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://45.137.22.163Sysiq.exe, 00000000.00000002.2029549814.000001D325261000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.0000018589981000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800010000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://github.com/mgravell/protobuf-netiSysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/14436606/23354customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/Sysiq.exe, 00000000.00000002.2030034541.000001D3353A5000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D325474000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800214000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netJSysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2182677868.0000018599A4F000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2267122749.000001C8100CF000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSysiq.exe, 00000000.00000002.2029549814.000001D325261000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.0000018589981000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800010000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/11564914/23354;Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2029549814.000001D3252A2000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 0000000C.00000002.2181771504.00000185899C2000.00000004.00000800.00020000.00000000.sdmp, customer.exe, 00000018.00000002.2265691260.000001C800094000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354Sysiq.exe, 00000000.00000002.2030613160.000001D33DD50000.00000004.08000000.00040000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D3352E9000.00000004.00000800.00020000.00000000.sdmp, Sysiq.exe, 00000000.00000002.2030034541.000001D335271000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      45.137.22.163
                                      unknownNetherlands
                                      51447ROOTLAYERNETNLfalse
                                      Joe Sandbox version:38.0.0 Ammolite
                                      Analysis ID:1364079
                                      Start date and time:2023-12-18 18:43:06 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 48s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:36
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Sysiq.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@63/4@0/1
                                      EGA Information:
                                      • Successful, ratio: 33.3%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target Sysiq.exe, PID 5024 because it is empty
                                      • Execution Graph export aborted for target customer.exe, PID 1568 because it is empty
                                      • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • VT rate limit hit for: Sysiq.exe
                                      TimeTypeDescription
                                      18:43:54API Interceptor1x Sleep call for process: Sysiq.exe modified
                                      18:43:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run customer C:\Users\user\AppData\Roaming\customer.exe
                                      18:44:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run customer C:\Users\user\AppData\Roaming\customer.exe
                                      18:44:10API Interceptor2x Sleep call for process: customer.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      45.137.22.163NEW_ORDER_12-18-23.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 45.137.22.163/Akoob.pdf
                                      SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 45.137.22.163/hiii.pdf
                                      Controllo saldo 30% Ordine 5667.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/bless_Jkvszuhw.png
                                      Quotation-pdf______________________________________.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/Toscgshw_Yvmodcuo.png
                                      #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/orderfile_Hecqxfqw.png
                                      New order _xls.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/New_order__xls_Ivuuoipf.bmp
                                      SecuriteInfo.com.W32.MSIL_Kryptik.GXA.genEldorado.18172.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/fact_Sptqaevl.bmp
                                      order confirmation 46574 -QT-04-0022.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/order_confirmation_46574_-QT-04-0022_Yszciyqc.jpg
                                      Quotation-pdf______________________________________.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/Kwcmalox_Bcqlnfnp.jpg
                                      2467864 _INV_pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/Hebvr_Lwvvdxxi.bmp
                                      conferma d'ordine 46574.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/fresh_Djctepjr.png
                                      factura proforma PI- PI04522 7486.exeGet hashmaliciousUnknownBrowse
                                      • 45.137.22.163/trans_Yygygcyg.jpg
                                      PI- PI04522 74868.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/proforma_invoice_Crnbdlom.png
                                      paymentcopy-pdf__________________________________.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/Wmdmjhtr_Pendcahw.bmp
                                      Paymentcopy-pdf___________________________________.exeGet hashmaliciousAgentTeslaBrowse
                                      • 45.137.22.163/Dhjuzchby_Xwgoflwi.bmp
                                      AIR CARGO BOARDING shipment MAWB 40608657504.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/Ejghs_Imuzrnrb.png
                                      PI- PI04522748-pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/Cpogmqp_Qhkfesil.jpg
                                      Ordine di acquisto PO-JTT-00001018.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 45.137.22.163/Htrcekszm_Kcdcxrzw.jpg
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ROOTLAYERNETNLNEW_ORDER_12-18-23.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 45.137.22.163
                                      PAYMENT_TT_COPY.pdf.exeGet hashmaliciousRedLineBrowse
                                      • 185.222.58.239
                                      SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 45.137.22.163
                                      cVw2fI6l0l.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      D4CJJrRyRV.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      C2qEwpO6ff.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, PureLog Stealer, RedLine, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      rQ7KS66xHz.exeGet hashmaliciousGlupteba, PureLog Stealer, RedLine, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      cgROS79PO8.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      GQmlDdfIus.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      tFXV5OO73i.exeGet hashmaliciousGlupteba, PureLog Stealer, RedLine, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      xR0Sb2wGy9.exeGet hashmaliciousRedLineBrowse
                                      • 185.222.58.99
                                      rdU3cg9xmI.exeGet hashmaliciousGlupteba, LummaC Stealer, PureLog Stealer, RedLine, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      Dzc2otu6qd.exeGet hashmaliciousGlupteba, LummaC Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      YRdCIU1WYM.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      ae6r1Pwu4b.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      8d6f8324030f8c1566ab38f8ade3c386b7b7740ccaf28.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      e6Ebnpst2H.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
                                      • 45.137.21.8
                                      C2Q2uZGYEJ.exeGet hashmaliciousLummaC Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      O67RAr74KS.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      HVT3sNz081.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                      • 45.137.21.8
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\Sysiq.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):1492
                                      Entropy (8bit):5.3787668257697945
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNt1qE4GIs0E4KVE4kh:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIx
                                      MD5:E6AD1A632B3ED1855D07C71585EE32C3
                                      SHA1:D44EC2568001E1B1492B86681211788246A55ADD
                                      SHA-256:CA2883CA6638072E9A3E8A455CFD1C5D7903EEF606924F06E90C2F474751E88D
                                      SHA-512:B09AD19DB449687B3BB91CA8E97E553AB7CBC1B5323D920F75D0CC930FBF1637CB1087170AD00E34677D29A9EBDA5F9A96A4AA1C736C7AC1C24A70DFB4A215D0
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                      Process:C:\Users\user\AppData\Roaming\customer.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):1492
                                      Entropy (8bit):5.3787668257697945
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNt1qE4GIs0E4KVE4kh:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIx
                                      MD5:E6AD1A632B3ED1855D07C71585EE32C3
                                      SHA1:D44EC2568001E1B1492B86681211788246A55ADD
                                      SHA-256:CA2883CA6638072E9A3E8A455CFD1C5D7903EEF606924F06E90C2F474751E88D
                                      SHA-512:B09AD19DB449687B3BB91CA8E97E553AB7CBC1B5323D920F75D0CC930FBF1637CB1087170AD00E34677D29A9EBDA5F9A96A4AA1C736C7AC1C24A70DFB4A215D0
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                      Process:C:\Users\user\Desktop\Sysiq.exe
                                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):48640
                                      Entropy (8bit):5.6309314294226205
                                      Encrypted:false
                                      SSDEEP:768:F20/1cyCPJmQcsmC2+vdiS8hYo8gk4nFYiBIuSWC93hxb/xeFe746FCi:F2s1bwJt2Lj8gfii3hC93hX4E4K
                                      MD5:D4BA5E2982463378357486B8D7F656C1
                                      SHA1:DD0502D38AD2BB63E57BB71956BB02B38F825C86
                                      SHA-256:D13BEBABC4063D86102CEF3BDAED105D826EE3F604986EEBEFA2E8BE3620F29D
                                      SHA-512:CC617EBEA4B67E85FC02C56D9099649D88F88D8463E62DC3D78B139BAA0C32E3B7B346C584EE4C1DFD3D8D97121E6C39EA4D91BEE91FDA5D05EB437930A06E37
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 38%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...I.ze................................. ....@...... ....................................`...@......@............... .................................. ............................................................................................ ..H............text........ ...................... ..`.rsrc... ...........................@..@........................................H............>......9.......?............................................*...(....*...(....*.0..>....... ........8........E&...f...................T...Y.......................x...........\...............k...................Z.......Y..."...E.......+...1...........6...............8a....... 8...X..X..Xa.. ....8A..... ..7a..Xffefeefeffe.. p...X