Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1239840531439025921.js

Overview

General Information

Sample name:1239840531439025921.js
Analysis ID:1417023
MD5:f06bb1a7df51df32d783b34f92d9b66a
SHA1:b687119329ce2407964f5230baf368d76073a8e1
SHA256:84e1edd28a73544499787540829363608648e12c3f3f2955ab2fb3b1af1d1e05
Infos:

Detection

Strela Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
Yara detected Strela Stealer
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected EXE embedded in BAT file
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Scripting/CommandLine Process Spawned Regsvr32
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 6560 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 6684 cmdline: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 3808 cmdline: wmic path win32_operatingsystem get oslanguage MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • find.exe (PID: 6368 cmdline: find /i "1033" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • findstr.exe (PID: 5076 cmdline: findstr /V flyutopianobedient ""C:\Users\user\\mindtrembleopen.bat"" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
      • certutil.exe (PID: 4416 cmdline: certutil -f -decode astonishinglewdselective muddledfreedesert.ico MD5: F17616EC0522FC5633151F7CAA278CAA)
      • powershell.exe (PID: 6680 cmdline: powershell regsvr32 muddledfreedesert.ico MD5: 04029E121A0CFA5991749937DD22A1D9)
        • regsvr32.exe (PID: 6372 cmdline: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
{"C2 url": "45.9.74.12/server.php"}
SourceRuleDescriptionAuthorStrings
1239840531439025921.jsJoeSecurity_EXEembeddedinBATfileYara detected EXE embedded in BAT fileJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\mindtrembleopen.batJoeSecurity_EXEembeddedinBATfileYara detected EXE embedded in BAT fileJoe Security
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          Process Memory Space: regsvr32.exe PID: 6372JoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            8.2.regsvr32.exe.7ffe1023e734.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              8.2.regsvr32.exe.7ffe1023e734.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                8.2.regsvr32.exe.7ffe10230000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, CommandLine: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: powershell regsvr32 muddledfreedesert.ico, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6680, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, ProcessId: 6372, ProcessName: regsvr32.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", ProcessId: 6560, ProcessName: wscript.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, CommandLine: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: powershell regsvr32 muddledfreedesert.ico, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6680, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico, ProcessId: 6372, ProcessName: regsvr32.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat", CommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6560, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat", ProcessId: 6684, ProcessName: cmd.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js", ProcessId: 6560, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell regsvr32 muddledfreedesert.ico, CommandLine: powershell regsvr32 muddledfreedesert.ico, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6684, ParentProcessName: cmd.exe, ProcessCommandLine: powershell regsvr32 muddledfreedesert.ico, ProcessId: 6680, ProcessName: powershell.exe

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: powershell regsvr32 muddledfreedesert.ico, CommandLine: powershell regsvr32 muddledfreedesert.ico, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6684, ParentProcessName: cmd.exe, ProcessCommandLine: powershell regsvr32 muddledfreedesert.ico, ProcessId: 6680, ProcessName: powershell.exe
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 45.9.74.12/server.phpAvira URL Cloud: Label: malware
                  Source: 8.2.regsvr32.exe.7ffe10230000.0.unpackMalware Configuration Extractor: Strela Stealer {"C2 url": "45.9.74.12/server.php"}
                  Source: 45.9.74.12/server.phpVirustotal: Detection: 11%Perma Link
                  Source: 1239840531439025921.jsVirustotal: Detection: 35%Perma Link

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 45.9.74.12/server.php

                  System Summary

                  barindex
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 muddledfreedesert.ico
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_024812408_2_02481240
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0248EE888_2_0248EE88
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_024817408_2_02481740
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02486C5C8_2_02486C5C
                  Source: 1239840531439025921.jsInitial sample: Strings found which are bigger than 50
                  Source: muddledfreedesert.ico.6.drStatic PE information: Number of sections : 19 > 10
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                  Source: classification engineClassification label: mal100.troj.expl.evad.winJS@16/7@0/0
                  Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\mindtrembleopen.batJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6712:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qjllnkuc.i0s.ps1Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 1239840531439025921.jsVirustotal: Detection: 35%
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguage
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V flyutopianobedient ""C:\Users\user\\mindtrembleopen.bat""
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode astonishinglewdselective muddledfreedesert.ico
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 muddledfreedesert.ico
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguageJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V flyutopianobedient ""C:\Users\user\\mindtrembleopen.bat"" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode astonishinglewdselective muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IHost.ScriptFullName();IWshShell3.Run("cmd /k copy "C:\Users\user\Desktop\1239840531439025921.js" "%userprofile%", "0", "false")
                  Source: Yara matchFile source: 1239840531439025921.js, type: SAMPLE
                  Source: Yara matchFile source: C:\Users\user\mindtrembleopen.bat, type: DROPPED
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFE102314B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00007FFE102314B0
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /4
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: .xdata
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /14
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /29
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /41
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /55
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /67
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /80
                  Source: muddledfreedesert.ico.6.drStatic PE information: section name: /91
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0248B542 push esp; ret 8_2_0248B545
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0248C5CC push cs; ret 8_2_0248C5CD
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0248C5EF push esp; ret 8_2_0248C5F5
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\muddledfreedesert.icoJump to dropped file
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\muddledfreedesert.icoJump to dropped file
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\muddledfreedesert.icoJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\muddledfreedesert.icoJump to dropped file
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1396Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1932Jump to behavior
                  Source: C:\Windows\System32\regsvr32.exeAPI coverage: 4.5 %
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep count: 1396 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep count: 1932 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5040Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: astonishinglewdselective.1.drBinary or memory string: GWlRoxN5vY29mS0J0b01v0PtGaWtsbUUCbm9M4f1JdRlZbWp+XHhWyM1EVXFNaGELemZ1+8BgYTFGVUztYUxP4vVmZvxZdWOfWUFC5P9DSI91QWZhe1VYxuRSak5UZE0yQWV1kMBzcxdfQnDoSmJk/OVkSO1ed1KTfm5JwMNvWIlrQnJ8fmhw7edodmZnU0opQVpNMNtyS9F6YkG5ekdm8PlzZYdaclheWUt0bM1yQkxSbFnvYHpnvfl2VupmRkGxXWtjxfRHd7peemN6d0Nr8fltRkFwUVCrXEtzlflxRLt6bkNua013D+RpREV7R3NmXm9YaO54eFBkeGotZFZL+/JgaQlCa3CPfEpaMeZzTLBbR1i+bEtXwf9JRq5fUGGeZlFT1/NDc6BgRUZrZUdJ/dlzWXd0dmhaeEhlzvtYY1FEelTtc2FkStNGZuh6RGSxTHVr8u9rRJ5cT1dgUkVByddsUEJSWXcZcWNYAOJ1VgNVSWnUX2pP2/hmUf95dWrWXUVkX+N3RdNrd3g+aVdMHNN2aRVJbHQjeE9shs5VVzxNYlh8anpK/vVQUHJIakvhOFNViNFRR9MsSHePAUNpbtFUWogIQkFSF2J18cxxY0UHdlEIN1pSyPlHZjkiR3TJBHVl28ZWdPYddGavB0JiMMZHTY0mZFKvFlNLiNxbSawEa3ofC09L1PJAYic6cmKKPU1UPshXZqMgYUHpBWVsiO9wUNQlbGIrH3pGqv9MehQoQ0dNBGRpoONiSdMPZGyhCmpS6tpLc6Qib0cFB1lZS+tGVDMramgXB3Rm3f1qQRQlY1N6CUh0TelqbmAcUkIgBHhp8vNEbBA2T2UhL3Rh4ORoVfswS1BkD3lz9ttwVgQ1eHqiA21p/f52TJI5aml2E2RSA8hLV0krTW60GGNR9eNVSlUeS3BJDXVaHdpuQWM4bXSYDVlp0/17YmwEcGfMNXRwivlOZRQEZ2VCJnpMkfpFY1kGRHgTGGhE7vR5bgsJY3KgDm16Y/B4aIYPUVovMHBLId9OVDsGeUouCWRKIfxzYg4pamfaDEljFO1yZc8LZUKvPXN57fJpd4wBUWKaN0RZycNsZ7UCUmR0KnN1AsN2ZDUXcHr2D29sDfZjdN0lYUaFFmttFcBgbow8TFN3K1FGK99tbG8mUE8wMklBjPlsbAwjem5TOENj9P5gWS8RYQBTAXdHzu5HVE0tWHJbJlJP+dF3c2U4dmwXBmVC4OxJWCUYSmuJJkVP4eBoSEkdbHgBA1ht6dxXRiYFVE/KIWdIzeRgbtsZQXKuK2xkU9FSdEcCSEh4KmpEidxzVUodb2T0JlV63MBnRNUybFWfB1JR/u5TT409U09yKkdDMMhXdFUvd0k2FVhS1vFVSCs6SVRqA3Z1J9R2bE8tQ3ppNW5nG/BWZVcjQlAaOmJTVfRMefEFYVeEKHduVNNiZF4ydGh2NU9J+/Fsdms/SmVcOFRV+u5wUHcgZ2ISFklH6MRvRu81QVa5HnFCyPVCZYkxa25xNkx60v1MQnsVaEskEG9C9dRwUx4JWFLeIXJm+PlTeNg9TUmkEnRk3/NTU7kgS24YGkNH29poTQ8XWloLN0pstfVjeSwYQVDJPmtquvVqeP8bSFqzAHZGuuxESb4DaGkAOnJq4NxDaQ8SdneSMW9Fc9NMTGkfQWP0JlJIGs92auYnRkaPIk1hU89MVao1VWFFEUNrx85KY0o8REEpN2p6avRWSygbb3fFHUVW8u5VU+McQVWzA2VTOshRdpU6dmkIIlp4IsRKdToZQ1lUJ1dESdhmUEU+SEdxO2ZGZ95jRnkYSFZDDFpqed9RRXcsSVrwF0RjHsFQUc4cUXYIIXNC2tJ0TDE+WHZhEUhV58ZkbX4RSHKKHHJp2vJQa7sLZFjpIXVo//VQQf8CZ2GkImVQ6NlQdrctdXC9IUd5999vT5gZVHgyOGpvgN5wTyIdV3XEDElH/d1CSdUkek1VFXVq3c9vQlMJRW/KJEFZoNBRbMwYWFjMBlF6jd1KSsMscWz0CWd02fhZd9QJRWORNUtp/cFDUEHDdlYD701a1dtSTRPNaGHt4kFi4MVnWuzkSkLm2nZR88VqUPvMbleGymRY1dlJYpjKYWcG7m1z+8ZjdjD0b2aExk1WLctZdaPOQ1I31kdoSd9ZZyPCUlPQxFlMdu11WeDCRHFR8G5RX/hKbUr4bEjt5HJuJvBwSP/uR21i4Wtp8+JEWGPNaWoqxlRTycRmcz7ZY2grzFFGB9xiQh7hUGZ/xGZhcM9UaHXbS0nJ03BNgspMRtb9Q0Ut02ZCIuZUbh/mcENu1W1TccdUYVvcbnDM+khXodVZQ+DyZVkd5FJqjO1vWhXRSGSH93JB8/hoRYXubmeTwUFk9+NLVoffaHro6Fd6x95sRuPaWUpf3XNRHNR5Q3zXV20d9mFu+t9ZdYvfa0jO+k1XK9hiU7TMcGuNy0R5TtdYboPbWm1z+kFJwsFQcGDZY3kO7Uxn+N5kQ9HMcVWG7mZXwMBbVY/xb0r5z3ZpsOdoUf/EZVqSz1lQN/VvaY3Sd2X1xU1mEPVwVZvpY0zE6ExGfPZjS9XtcFZo51R60PlralrCd0Z06HFukddEdU3mZUVBzFZ4cM1mV1HSQ1Ux1UtsyOlCVybsZ3fCyXZyHu1pY9rEWGnY5WZ6ps5Da8nGYlBCyGJXb+ZqQ2zJSkMh7npzIOBOZgvSQ1ICzllniOhwYxHKSFCi80t0uexjdADMcnqpzXRVlsV3a0PFVmcI/lJPVshoZBj4VW51x1VayuZEeE3uaFjL3E1hT9NRY97MQU2f2WdFIOZIZYDbanTbyEt2psV1Y8f+cWpo/3Vk4OV2d2DvYkIuxkRS3NxJcyXGc2KA5W5R+/95baH2WmmT41NNAN5sVqznUURb+npFMdRwZEvpc2cP5UpROM1pRyLgQ1Ht9WND39BrWMPEa2VO5EF0tM9mbVD1SEIt4HNI8dBnSy79ZUeV3Wlry+B
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFE102314B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00007FFE102314B0
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguageJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V flyutopianobedient ""C:\Users\user\\mindtrembleopen.bat"" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode astonishinglewdselective muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" muddledfreedesert.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe10230000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 6372, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe10230000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 6372, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information221
                  Scripting
                  Valid Accounts1
                  Native API
                  221
                  Scripting
                  11
                  Process Injection
                  121
                  Masquerading
                  OS Credential Dumping1
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  PowerShell
                  Logon Script (Windows)Logon Script (Windows)11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                  Obfuscated Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1417023 Sample: 1239840531439025921.js Startdate: 28/03/2024 Architecture: WINDOWS Score: 100 33 Multi AV Scanner detection for domain / URL 2->33 35 Found malware configuration 2->35 37 Antivirus detection for URL or domain 2->37 39 7 other signatures 2->39 8 wscript.exe 1 1 2->8         started        process3 signatures4 41 JScript performs obfuscated calls to suspicious functions 8->41 43 Wscript starts Powershell (via cmd or directly) 8->43 45 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->45 47 Suspicious execution chain found 8->47 11 cmd.exe 4 8->11         started        process5 file6 27 C:\Users\user\mindtrembleopen.bat, ASCII 11->27 dropped 49 Wscript starts Powershell (via cmd or directly) 11->49 15 certutil.exe 2 11->15         started        19 powershell.exe 7 11->19         started        21 WMIC.exe 1 11->21         started        23 3 other processes 11->23 signatures7 process8 file9 29 C:\Users\user\muddledfreedesert.ico, PE32+ 15->29 dropped 31 Drops PE files to the user root directory 15->31 25 regsvr32.exe 19->25         started        signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  1239840531439025921.js35%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  45.9.74.12/server.php100%Avira URL Cloudmalware
                  45.9.74.12/server.php12%VirustotalBrowse
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  45.9.74.12/server.phptrue
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  low
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1417023
                  Start date and time:2024-03-28 14:24:36 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 26s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Without Instrumentation
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:1239840531439025921.js
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winJS@16/7@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .js
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  14:25:23API Interceptor1x Sleep call for process: WMIC.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):0.7307872139132228
                  Encrypted:false
                  SSDEEP:3:Nlllul4/X:NllU4/
                  MD5:3C34689C4BD27F7A51A67BBD54FA65C2
                  SHA1:E444E6B6E24D2FE2ACE5A5A7D96A6142C2368735
                  SHA-256:4B7DAB4629E6B8CC1CD6E404CB5FC110296C3D0F4E3FDBBDB0C1CE48B5B8A546
                  SHA-512:02827A36A507539C617DFE05EDF5367EB295EB80172794D83F3E9AF612125B7CA88218C2601DFA8E0E98888061A0C7B0E78428188523FA915F39B23F148F8766
                  Malicious:false
                  Reputation:low
                  Preview:@...e.................................,.........................
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with very long lines (3027), with CRLF line terminators
                  Category:modified
                  Size (bytes):290664
                  Entropy (8bit):5.637755217120682
                  Encrypted:false
                  SSDEEP:6144:zBHEsQEhu1bTtA/ZilnqbLJGpjEmWjuFx:z99dSbTIiY/JGGC
                  MD5:02A91D04B7C12212CEF7181F6AD25C82
                  SHA1:E598C56B78EA8F4A80B30833458F172050372CE0
                  SHA-256:6D6DD14E9293134892EB0179CAAF0F8FDF6B6D4A4655959A462D8222CDB9EB6A
                  SHA-512:9206857018E71B325F4DF979683899F223F3F7EACDF369315639EB8075E259E8BDAE54B247F4468D7F7B6E1675014395A2A366AA2E4FB6781A0DDB57CF3CEB68
                  Malicious:false
                  Preview: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
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with very long lines (3027), with CRLF line terminators
                  Category:dropped
                  Size (bytes):318926
                  Entropy (8bit):5.7782767634703776
                  Encrypted:false
                  SSDEEP:6144:eBHEsQEhu1bTtA/ZilnqbLJGpjEmWjuFnrPU+r:e99dSbTIiY/JGGuPt
                  MD5:F06BB1A7DF51DF32D783B34F92D9B66A
                  SHA1:B687119329CE2407964F5230BAF368D76073A8E1
                  SHA-256:84E1EDD28A73544499787540829363608648E12C3F3F2955AB2FB3B1AF1D1E05
                  SHA-512:A43A1C6B1EF84E1A833DC065D787D8482DFB8539A504752DE71386AADF788E936943E1A4D37AD24C8EF1A57791AAF99E252928C1BB7C32CC41836AF419286003
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_EXEembeddedinBATfile, Description: Yara detected EXE embedded in BAT file, Source: C:\Users\user\mindtrembleopen.bat, Author: Joe Security
                  Preview:/* flyutopianobedient..set flyutopianobedientadditionamusednation=q..set flyutopianobedientbeliefstageleft=m..set flyutopianobedientchubbyabackcrash=c..set flyutopianobedientgruesomegrandfatherpossible=j..set flyutopianobedientrainbasketexist=x..set flyutopianobedientbroadstimulatingcredit=r..set flyutopianobedienteyessilverexpansion=n..set flyutopianobedientsuperblampadorable=i..set flyutopianobedientblinkbravefuel=b..set flyutopianobedientplayamuckcoast=a..set flyutopianobedientbabyupbeatresponsible=l..set flyutopianobedientgapingenchantedtorpid=o..set flyutopianobedientpipehandleplate=h..set flyutopianobedientangleafraidflippant=t..set flyutopianobedientlakewordunequal=k..set flyutopianobedientcontinuefunnypie=g..set flyutopianobedientnoisyseedmess up=p..set flyutopianobedientradiatereportfog=s..set flyutopianobedientsquealleancrook=y..set flyutopianobedientphysicalabackfact=u..set flyutopianobedientbusysizelearned=e..set flyutopianobedientseashoresurprisecamp=w..set flyutopianobedi
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:false
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Windows\System32\certutil.exe
                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):217854
                  Entropy (8bit):7.117967343876302
                  Encrypted:false
                  SSDEEP:3072:Eq+5FU/HC+Y7zpLD2vV127JED676p2uUJTsYz+TPp/8WfAsz1jUB:Eq+5FUKRpv2H27J7HuuTs8+rGWAM1UB
                  MD5:E3BD27AFD67F0319066823D6F4A97C33
                  SHA1:92C8D3919AE6E8B74B89532FD66913230EACEBB4
                  SHA-256:0C601FD2F457576FFA7ADAB61732BA9E9FB969B8060C750A5F6123BD42D17D4C
                  SHA-512:50677CBCD559A1AE165C18353C60FE76CFD517A03E88624AF72E02083FE3CC1E42C0871D574A67306B9C1ED663D61BBE4321AE3F2E8A5C72FAD05865F6C548F7
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..."..f..........& ...)......................L......................................3....`... .........................................L....................................@..x...........................`...(...................X................................text...............................`..`.data...`...........................@....rdata..............................@..@/4..................................@....pdata..............................@..@.xdata..............................@..@.bss....`................................edata..L...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..x....@......................@..B/14.....P....P......................@..B/29..........`......................@..B/41..........p......................@..B/55.....
                  File type:ASCII text, with very long lines (3027), with CRLF line terminators
                  Entropy (8bit):5.7782767634703776
                  TrID:
                  • Java Script (8502/1) 100.00%
                  File name:1239840531439025921.js
                  File size:318'926 bytes
                  MD5:f06bb1a7df51df32d783b34f92d9b66a
                  SHA1:b687119329ce2407964f5230baf368d76073a8e1
                  SHA256:84e1edd28a73544499787540829363608648e12c3f3f2955ab2fb3b1af1d1e05
                  SHA512:a43a1c6b1ef84e1a833dc065d787d8482dfb8539a504752de71386aadf788e936943e1a4d37ad24c8ef1a57791aaf99e252928c1bb7c32cc41836af419286003
                  SSDEEP:6144:eBHEsQEhu1bTtA/ZilnqbLJGpjEmWjuFnrPU+r:e99dSbTIiY/JGGuPt
                  TLSH:7464AEB7146BFEC97B660F8C91C5BA024E5C7DB72229D30CAD8D2A9E23F94518C14DE4
                  File Content Preview:/* flyutopianobedient..set flyutopianobedientadditionamusednation=q..set flyutopianobedientbeliefstageleft=m..set flyutopianobedientchubbyabackcrash=c..set flyutopianobedientgruesomegrandfatherpossible=j..set flyutopianobedientrainbasketexist=x..set flyut
                  Icon Hash:68d69b8bb6aa9a86
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:14:25:22
                  Start date:28/03/2024
                  Path:C:\Windows\System32\wscript.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\1239840531439025921.js"
                  Imagebase:0x7ff67d5b0000
                  File size:170'496 bytes
                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\1239840531439025921.js" "C:\Users\user\\mindtrembleopen.bat" && "C:\Users\user\\mindtrembleopen.bat"
                  Imagebase:0x7ff6312d0000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:2
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:3
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\wbem\WMIC.exe
                  Wow64 process (32bit):false
                  Commandline:wmic path win32_operatingsystem get oslanguage
                  Imagebase:0x7ff782fb0000
                  File size:576'000 bytes
                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:4
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\find.exe
                  Wow64 process (32bit):false
                  Commandline:find /i "1033"
                  Imagebase:0x7ff6022c0000
                  File size:17'920 bytes
                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:5
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\findstr.exe
                  Wow64 process (32bit):false
                  Commandline:findstr /V flyutopianobedient ""C:\Users\user\\mindtrembleopen.bat""
                  Imagebase:0x7ff795c50000
                  File size:36'352 bytes
                  MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:6
                  Start time:14:25:23
                  Start date:28/03/2024
                  Path:C:\Windows\System32\certutil.exe
                  Wow64 process (32bit):false
                  Commandline:certutil -f -decode astonishinglewdselective muddledfreedesert.ico
                  Imagebase:0x7ff6e04c0000
                  File size:1'651'712 bytes
                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:7
                  Start time:14:25:24
                  Start date:28/03/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:powershell regsvr32 muddledfreedesert.ico
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:14:25:25
                  Start date:28/03/2024
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\regsvr32.exe" muddledfreedesert.ico
                  Imagebase:0x7ff60bfa0000
                  File size:25'088 bytes
                  MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:0.6%
                    Dynamic/Decrypted Code Coverage:15.9%
                    Signature Coverage:3.7%
                    Total number of Nodes:82
                    Total number of Limit Nodes:2
                    execution_graph 6262 7ffe102314b0 GetModuleHandleA 6263 7ffe10231513 6262->6263 6264 7ffe102314d5 LoadLibraryA GetProcAddress GetProcAddress 6262->6264 6264->6263 6332 7ffe1023b1e1 6333 7ffe1023b1f6 6332->6333 6334 7ffe1023b200 6332->6334 6334->6333 6335 7ffe1023b25b free 6334->6335 6335->6333 6246 2486839 6250 248683e 6246->6250 6247 24868f2 6250->6247 6251 2486908 6250->6251 6252 2486915 6251->6252 6253 2486931 ExitProcess 6252->6253 6327 7ffe1023b9b0 6328 7ffe1023b9cd 6327->6328 6329 7ffe1023b9df _configure_narrow_argv __p___argc __p___argv __p__environ 6328->6329 6330 7ffe1023ba25 6329->6330 6331 7ffe1023ba18 _set_new_mode 6329->6331 6331->6330 6336 7ffe1023ba30 6337 7ffe1023ba4d 6336->6337 6338 7ffe1023ba5f _configure_wide_argv __p___argc __p___wargv __p__wenviron 6337->6338 6339 7ffe1023baa5 6338->6339 6340 7ffe1023ba98 _set_new_mode 6338->6340 6340->6339 6265 7ffe10231292 6268 7ffe102312ce 6265->6268 6269 7ffe102312fa 6268->6269 6271 7ffe102312c8 6269->6271 6281 7ffe1023b098 6269->6281 6272 7ffe10231315 6279 7ffe1023138a 6272->6279 6285 7ffe1023101d 6272->6285 6274 7ffe10231337 6274->6271 6275 7ffe10231363 6274->6275 6274->6279 6275->6271 6277 7ffe1023101d 4 API calls 6275->6277 6276 7ffe10231402 6276->6271 6278 7ffe1023101d 4 API calls 6276->6278 6277->6271 6278->6271 6279->6276 6280 7ffe1023101d 4 API calls 6279->6280 6280->6276 6282 7ffe1023b0ae 6281->6282 6284 7ffe1023b12f 6281->6284 6297 7ffe1023ad0e 6282->6297 6284->6272 6286 7ffe10231039 6285->6286 6287 7ffe10231054 6286->6287 6288 7ffe10231068 6286->6288 6291 7ffe102311d7 6286->6291 6287->6274 6289 7ffe10231109 6288->6289 6290 7ffe102310fd 6288->6290 6293 7ffe10231116 _initterm 6289->6293 6294 7ffe10231107 6289->6294 6323 7ffe1023bb10 __acrt_iob_func 6290->6323 6291->6287 6295 7ffe1023bb10 2 API calls 6291->6295 6293->6294 6294->6287 6296 7ffe1023114a _initterm 6294->6296 6295->6287 6296->6287 6298 7ffe1023add6 6297->6298 6299 7ffe1023ad41 6297->6299 6298->6284 6300 7ffe1023ad82 6299->6300 6301 7ffe1023addb 6299->6301 6300->6298 6307 7ffe1023acc7 6300->6307 6305 7ffe1023adff 6301->6305 6311 7ffe1023a8a0 6301->6311 6304 7ffe1023a8a0 __acrt_iob_func 6304->6305 6305->6298 6305->6304 6306 7ffe1023acc7 __acrt_iob_func 6305->6306 6306->6305 6308 7ffe1023ace2 6307->6308 6310 7ffe1023acee 6307->6310 6315 7ffe1023a910 6308->6315 6310->6300 6312 7ffe1023a8cd 6311->6312 6313 7ffe1023a8ea __acrt_iob_func 6312->6313 6314 7ffe1023a90a 6313->6314 6314->6305 6316 7ffe1023a928 6315->6316 6317 7ffe1023abd7 6316->6317 6318 7ffe1023a8a0 __acrt_iob_func 6316->6318 6319 7ffe1023a9e6 6316->6319 6317->6310 6318->6319 6320 7ffe1023a8a0 __acrt_iob_func 6319->6320 6321 7ffe1023aae3 6319->6321 6320->6321 6321->6317 6322 7ffe1023a8a0 __acrt_iob_func 6321->6322 6322->6317 6326 7ffe1023bd10 __stdio_common_vfprintf 6323->6326 6325 7ffe1023bb3d 6325->6294 6326->6325 6254 2481d20 6258 2481ee4 6254->6258 6256 2481d7f 6257 2481d34 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 6257->6254 6257->6256 6259 2481eec 6258->6259 6260 2481ef8 __scrt_dllmain_crt_thread_attach 6259->6260 6261 2481f01 6260->6261 6261->6257

                    Control-flow Graph

                    APIs
                    • ExitProcess.KERNEL32(?,?,?,?,?,?,?,02486904), ref: 02486933
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 6f2daaeeca48df6809e1ef62a5907e3c123bc7a7416cb568dceb1a8a4d26e80d
                    • Instruction ID: 6ed55bd4aafc14af196648c06beffe062bc845c0ffc9d759a629a2cb8f8667ac
                    • Opcode Fuzzy Hash: 6f2daaeeca48df6809e1ef62a5907e3c123bc7a7416cb568dceb1a8a4d26e80d
                    • Instruction Fuzzy Hash: 31D05E203103084FEB5C7BB55A8822E265ACB45205F01183D5513CB7D6DD38D8048702
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707215142.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1707204334.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707226981.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707238787.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707267302.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707280816.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707293452.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$HandleLibraryLoadModule
                    • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                    • API String ID: 384173800-1835852900
                    • Opcode ID: eac4c94454c1683f2d1643de50e5298fc4e81923689dd3558cc9618993412369
                    • Instruction ID: 6244525d03add14c1aff11abf6b0fedf68933ef7e5f44f2a8bf370e0af9f5ecc
                    • Opcode Fuzzy Hash: eac4c94454c1683f2d1643de50e5298fc4e81923689dd3558cc9618993412369
                    • Instruction Fuzzy Hash: C2010961E09E1B98EA159B07B8101B52B64BFC87B4BA801B1CE1D573B6FF2CE50AC304
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: _clrfp
                    • String ID:
                    • API String ID: 3618594692-0
                    • Opcode ID: bf11b2a348dd1cebbe3407e039c1e158691c8c076b119f432e33d7f46d24fa38
                    • Instruction ID: f2704cf1350ffb45bf7fa550384e73bf9778bc3d456753cbf1f3dbdcaf0bc0a4
                    • Opcode Fuzzy Hash: bf11b2a348dd1cebbe3407e039c1e158691c8c076b119f432e33d7f46d24fa38
                    • Instruction Fuzzy Hash: 83B19E30620A4D8FDB59DF1CC88AB6A77E0FF59308F59859AE859CB261C335D896CF01
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c5a872e6d0ce145e63e4b493c0a28ebaad772e9be0e78487281bcf853c86d47e
                    • Instruction ID: a5808454595c65987f8abc2832c53ca97bb3395eed17122516463f5bdfac8bb1
                    • Opcode Fuzzy Hash: c5a872e6d0ce145e63e4b493c0a28ebaad772e9be0e78487281bcf853c86d47e
                    • Instruction Fuzzy Hash: 8FE15E70528B488FDB25EF18D895AEEB7E1FB94304F00062FE48ED3620DB749645CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15cc186248de5ca8b7905a83fea9e7948ffbd5913fd68f4cba90bb8ca2c85fa2
                    • Instruction ID: 0436821638d0004f97d77a9fc442cbad7c87500955633a604ddc3439aaecd829
                    • Opcode Fuzzy Hash: 15cc186248de5ca8b7905a83fea9e7948ffbd5913fd68f4cba90bb8ca2c85fa2
                    • Instruction Fuzzy Hash: 89B14D31218A498FDB29AF28DC986FE73E1FB94305F55422ED45FC3690DF349A068B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7755fe846fb63fdab89a2c0b004d9a83724ebd39b55f4d955bef4c225e210f78
                    • Instruction ID: dd33894508cd5af7213f0279958d9d10449acb20ae939c56b69981b9658c704d
                    • Opcode Fuzzy Hash: 7755fe846fb63fdab89a2c0b004d9a83724ebd39b55f4d955bef4c225e210f78
                    • Instruction Fuzzy Hash: 92512532328E0C4F8B5CEF6CD89867A73D2F7AC310315822FE40AC7265DA74D8468785
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 31 2483a50-2483ab7 call 24849f4 34 2483f18-2483f1f call 24871f4 31->34 35 2483abd-2483ac0 31->35 35->34 36 2483ac6-2483acc 35->36 38 2483b9b-2483bad 36->38 39 2483ad2-2483ad6 36->39 41 2483e68-2483e6c 38->41 42 2483bb3-2483bb7 38->42 39->38 43 2483adc-2483ae7 39->43 44 2483e6e-2483e75 41->44 45 2483ea5-2483eaf call 2482b3c 41->45 42->41 46 2483bbd-2483bc8 42->46 43->38 47 2483aed-2483af2 43->47 44->34 49 2483e7b-2483ea0 call 2483f20 44->49 45->34 59 2483eb1-2483ed0 call 248f420 45->59 46->41 51 2483bce-2483bd5 46->51 47->38 48 2483af8-2483b02 call 2482b3c 47->48 48->59 62 2483b08-2483b33 call 2482b3c * 2 call 2483504 48->62 49->45 52 2483d99-2483da5 51->52 53 2483bdb-2483c16 call 24831fc 51->53 52->45 60 2483dab-2483daf 52->60 53->52 67 2483c1c-2483c26 53->67 64 2483dbf-2483dc7 60->64 65 2483db1-2483dbd call 24834c4 60->65 100 2483b53-2483b5d call 2482b3c 62->100 101 2483b35-2483b39 62->101 64->45 66 2483dcd-2483dda call 248309c 64->66 65->64 79 2483de0-2483de8 65->79 66->45 66->79 72 2483c2a-2483c5c 67->72 76 2483d88-2483d8f 72->76 77 2483c62-2483c6e 72->77 76->72 84 2483d95-2483d96 76->84 77->76 82 2483c74-2483c8d 77->82 80 2483efb-2483f17 call 2482b3c * 2 call 2487168 79->80 81 2483dee-2483df2 79->81 80->34 85 2483df4-2483e03 call 24834c4 81->85 86 2483e05-2483e06 81->86 88 2483c93-2483cd8 call 24834d8 * 2 82->88 89 2483d85-2483d86 82->89 84->52 94 2483e08-2483e12 call 2484a8c 85->94 86->94 114 2483cda-2483d00 call 24834d8 call 2484190 88->114 115 2483d16-2483d1c 88->115 89->76 94->45 109 2483e18-2483e66 call 248312c call 2483330 94->109 100->38 112 2483b5f-2483b7f call 2482b3c * 2 call 2484a8c 100->112 101->100 105 2483b3b-2483b46 101->105 105->100 110 2483b48-2483b4d 105->110 109->45 110->34 110->100 135 2483b81-2483b8b call 2484b7c 112->135 136 2483b96-2483b97 112->136 130 2483d02-2483d14 114->130 131 2483d27-2483d7b call 248397c 114->131 118 2483d1e-2483d22 115->118 119 2483d80-2483d81 115->119 118->88 119->89 130->114 130->115 131->119 139 2483b91-2483ef4 call 2482914 call 248454c call 2484d78 135->139 140 2483ef5-2483efa call 2487168 135->140 136->38 139->140 140->80
                    APIs
                    • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02483AAC
                      • Part of subcall function 024849F4: __GetUnwindTryBlock.LIBCMT ref: 02484A37
                      • Part of subcall function 024849F4: __SetUnwindTryBlock.LIBVCRUNTIME ref: 02484A5C
                    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02483B84
                    • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02483DD3
                    • std::bad_alloc::bad_alloc.LIBCMT ref: 02483EDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                    • String ID: csm$csm$csm
                    • API String ID: 849930591-393685449
                    • Opcode ID: 8e496da07347f5ca4c0083d8cca6809d31876793616045b4dee25a5dda52bfd8
                    • Instruction ID: 91f7fc2a6a3bcaa9a456e11a9291a041d9386cad41a98af26746a162abceb734
                    • Opcode Fuzzy Hash: 8e496da07347f5ca4c0083d8cca6809d31876793616045b4dee25a5dda52bfd8
                    • Instruction Fuzzy Hash: 09E16F31528B488FDB25FF68C4856AEBBE1FB58714F50069EE849C7351DB34E881CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00007FFE1023ABD7), ref: 00007FFE1023A8F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707215142.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1707204334.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707226981.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707238787.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707267302.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707280816.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707293452.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __acrt_iob_func
                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                    • API String ID: 711238415-1534286854
                    • Opcode ID: 7459aefd1802b1c5b4a3facf7298682d75401bea95dcfde2e06b05e2c2245f94
                    • Instruction ID: afbeb1b4d873615d75137d57ec49fee0b7a7d5f609efb2d10ffec368df62f905
                    • Opcode Fuzzy Hash: 7459aefd1802b1c5b4a3facf7298682d75401bea95dcfde2e06b05e2c2245f94
                    • Instruction Fuzzy Hash: 45713FA2F04B498EEB54CB56D8816A937A1EB98BD8F544075DF0D8776AEF3CE641C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707215142.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1707204334.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707226981.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707238787.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707267302.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707280816.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707293452.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __p___argc__p___argv__p__environ_configure_narrow_argv_set_new_mode
                    • String ID:
                    • API String ID: 556796188-0
                    • Opcode ID: d713d1ab00fc09b2163b8151d51110b22cf4d64260805eb9c7e1ae8cb6c399b9
                    • Instruction ID: cd2f132ae90d2f278a7ee95ccc3f1f5f86f07c1f244c7205cc7e03da58280f9b
                    • Opcode Fuzzy Hash: d713d1ab00fc09b2163b8151d51110b22cf4d64260805eb9c7e1ae8cb6c399b9
                    • Instruction Fuzzy Hash: E8012976A04F098EE7159F2AD4813AC37A0FB88B98F409576E70D4B7A6CE38E490C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707215142.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1707204334.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707226981.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707238787.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707250298.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707267302.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707280816.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707293452.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1707305551.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __p___argc__p___wargv__p__wenviron_configure_wide_argv_set_new_mode
                    • String ID:
                    • API String ID: 3305919566-0
                    • Opcode ID: c3cd763eb9e9f8b7c9556cb38ece850fa7336141f25a0961490245c00d1de611
                    • Instruction ID: 0ad979a569376b1b678598a9b1c3d03795248cdfab3ba02e88759895004f5656
                    • Opcode Fuzzy Hash: c3cd763eb9e9f8b7c9556cb38ece850fa7336141f25a0961490245c00d1de611
                    • Instruction Fuzzy Hash: 8201E976A04F098EE7159F26D4853AC3BA4EB88B98F449572E74D4B7A6CE38D490C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 211 24842d0-2484318 call 2482ae4 call 2482b3c 216 248431a-2484320 211->216 217 2484352-2484356 211->217 216->217 220 2484322-2484324 216->220 218 24843ea-24843ee 217->218 219 248435c-2484360 217->219 223 24843f0-24843fc 218->223 224 2484432-2484438 218->224 221 24844e1 219->221 222 2484366-248436e 219->222 225 2484336-2484338 220->225 226 2484326-248432a 220->226 230 24844e6-2484500 221->230 222->221 227 2484374-2484378 222->227 228 24843fe-2484402 223->228 229 2484412-248441e 223->229 233 24844a8-24844dc call 2483a50 224->233 234 248443a-248443e 224->234 225->217 231 248433a-2484346 225->231 226->231 232 248432c-2484334 226->232 235 248437a-248437c 227->235 236 24843d7-24843e5 call 24830c8 227->236 228->229 237 2484404-2484410 call 24834c4 228->237 229->221 239 2484424-248442c 229->239 231->217 241 2484348-248434c 231->241 232->217 232->225 233->221 234->233 240 2484440-2484447 234->240 243 248437e-2484390 call 2483654 235->243 244 24843b5-24843b7 235->244 236->221 237->224 237->229 239->221 239->224 240->233 246 2484449-2484451 240->246 241->217 241->221 254 2484501-2484507 call 24871f4 243->254 257 2484396-2484399 243->257 244->236 250 24843b9-24843c1 244->250 246->233 251 2484453-2484466 call 24834d8 246->251 250->254 255 24843c7-24843cb 250->255 251->233 261 2484468-24844a6 251->261 255->254 259 24843d1-24843d5 255->259 257->254 262 248439f-24843a3 257->262 260 24843a5-24843b0 call 2484868 259->260 260->221 261->230 262->260
                    APIs
                    • __except_validate_context_record.LIBVCRUNTIME ref: 024842F8
                    • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 024843E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                    • String ID: csm$csm
                    • API String ID: 3896166516-3733052814
                    • Opcode ID: 0aa7a5c376eeb5ae11e699671e149143c489387923b3f49e9a28d806dabbf491
                    • Instruction ID: 770038f9631b93b2a74a83fce7c1b6a244297f8edc4cb043e06e3df120280251
                    • Opcode Fuzzy Hash: 0aa7a5c376eeb5ae11e699671e149143c489387923b3f49e9a28d806dabbf491
                    • Instruction Fuzzy Hash: 85618E30628B4A8FCB68EF29908472EB7D1FB98715F54466FD499C7791CB70D881CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 267 2482690-24826d6 call 2482ae4 270 24826dc-24826e6 267->270 271 24827cd-24827d4 267->271 272 24827b9-24827bb 270->272 273 2482878-248287e 271->273 274 24826eb-24826f9 272->274 275 24827c1 272->275 276 24827d9-24827e7 273->276 277 2482884 273->277 278 24826ff-2482706 274->278 279 24827b7 274->279 275->277 280 24827ed-24827f5 276->280 281 2482876 276->281 282 2482889-24828a6 277->282 278->279 283 248270c-2482711 278->283 279->272 280->281 284 24827f7-24827fb 280->284 281->273 283->279 285 2482717-248271c 283->285 286 248283c-248284d 284->286 287 24827fd-2482802 284->287 288 2482739-248273f 285->288 289 248271e-2482731 285->289 290 248285f-2482873 286->290 291 248284f-2482855 286->291 292 2482838-248283a 287->292 293 2482804-2482810 287->293 297 2482769-24827b2 call 2482ab0 call 2482ae0 288->297 298 2482741-2482749 288->298 306 24827c6-24827c8 289->306 307 2482737 289->307 290->281 291->281 296 2482857-248285b 291->296 292->277 292->286 294 2482831-2482836 293->294 295 2482812-2482819 293->295 294->292 294->293 295->294 299 248281b-2482824 295->299 296->277 302 248285d 296->302 297->279 298->297 303 248274b-2482759 call 248f2e0 298->303 299->294 304 2482826-248282f 299->304 302->281 303->297 311 248275b-2482761 303->311 304->292 304->294 306->282 307->279 307->288 311->297
                    APIs
                    • __except_validate_context_record.LIBVCRUNTIME ref: 024826BB
                    • _IsNonwritableInCurrentImage.LIBCMT ref: 02482752
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentImageNonwritable__except_validate_context_record
                    • String ID: csm
                    • API String ID: 3242871069-1018135373
                    • Opcode ID: e32cc06ee6daa03ae3f3bc1a8189994b09bd6cfa9f32bc22b13863d2a7eee494
                    • Instruction ID: 542e47b252b0d6528cdc20670797b8225c6b7e5a8f47e30cf65a4edc1c8f996c
                    • Opcode Fuzzy Hash: e32cc06ee6daa03ae3f3bc1a8189994b09bd6cfa9f32bc22b13863d2a7eee494
                    • Instruction Fuzzy Hash: 72619330628E498BDF28FE5DD885A7D73D1FB54354B10426FEC86C3256EBB0E852CA85
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 313 2483f20-2483f53 314 2483f59-2483f7b call 2482b3c 313->314 315 248416c-2484186 313->315 318 2483fd8-2483fea 314->318 319 2483f7d-2483f91 call 2482b3c 314->319 320 2483ff0-2484034 call 24831fc 318->320 321 2484187-248418f call 24871f4 318->321 319->318 331 2483f93-2483f99 319->331 320->315 328 248403a-2484045 320->328 330 248404c-2484087 328->330 332 248414b-2484166 330->332 333 248408d-2484099 330->333 331->318 334 2483f9b-2483fa1 331->334 332->315 332->330 333->332 335 248409f-24840c4 333->335 334->318 336 2483fa3-2483fd2 call 2482fe4 334->336 337 24840c6-24840d2 call 24834c4 335->337 338 24840f7-24840fa 335->338 336->315 336->318 345 24840ef-24840f0 337->345 346 24840d4-24840d7 337->346 338->332 340 24840fc-2484146 call 248397c 338->340 340->332 345->338 347 24840d9-24840e5 call 24834c4 346->347 348 24840e7 346->348 350 24840e9-24840ed 347->350 348->350 350->332 350->345
                    APIs
                    • _CallSETranslator.LIBVCRUNTIME ref: 02483FCB
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1707173156.0000000002481000.00000040.00001000.00020000.00000000.sdmp, Offset: 02481000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2481000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: CallTranslator
                    • String ID: MOC$RCC
                    • API String ID: 3163161869-2084237596
                    • Opcode ID: 07c68a8826f396dc2633518cec89643c6e24fd7e0188cafc8116b23aa0883d7f
                    • Instruction ID: c9600fd5f3504e3687a56c840c4881fc9c923c53028caf114a5678340ada3ae5
                    • Opcode Fuzzy Hash: 07c68a8826f396dc2633518cec89643c6e24fd7e0188cafc8116b23aa0883d7f
                    • Instruction Fuzzy Hash: E571C430528B488FD769EF28C446BAAB7E0FB99704F044A5ED889C3251DB74E581CB83
                    Uniqueness

                    Uniqueness Score: -1.00%