Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SajWKdHxdF.exe

Overview

General Information

Sample name:SajWKdHxdF.exe
renamed because original name is a hash value
Original sample name:d72b925c4abaf97c5eb47514ee82f7f2.exe
Analysis ID:1429096
MD5:d72b925c4abaf97c5eb47514ee82f7f2
SHA1:5768f62f599d2682b205f6beec17064f14e0646b
SHA256:7729b2ed03cca1153854c35ac85fd23c1e0d34347be0e29a8a6aecbba088a95f
Tags:32exetrojan
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • SajWKdHxdF.exe (PID: 1424 cmdline: "C:\Users\user\Desktop\SajWKdHxdF.exe" MD5: D72B925C4ABAF97C5EB47514EE82F7F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SajWKdHxdF.exe PID: 1424JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    1.2.SajWKdHxdF.exe.400000.0.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      No Sigma rule has matched
      Timestamp:04/20/24-21:20:26.757895
      SID:2049060
      Source Port:49738
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:04/20/24-21:23:04.222005
      SID:2046269
      Source Port:49738
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:04/20/24-21:21:43.683511
      SID:2046268
      Source Port:49738
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:04/20/24-21:20:26.979618
      SID:2046266
      Source Port:50500
      Destination Port:49738
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:04/20/24-21:21:42.303911
      SID:2046267
      Source Port:50500
      Destination Port:49738
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: SajWKdHxdF.exeReversingLabs: Detection: 26%
      Source: SajWKdHxdF.exeVirustotal: Detection: 28%Perma Link
      Source: SajWKdHxdF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E1C000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdbP@n@ `@_CorExeMainmscoree.dll source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E11000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E11000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb,ANA @A_CorExeMainmscoree.dll source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E1C000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049028223.00000000005CB000.00000040.00000001.01000000.00000003.sdmp

      Networking

      barindex
      Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49738 -> 193.233.132.226:50500
      Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 193.233.132.226:50500 -> 192.168.2.4:49738
      Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49738 -> 193.233.132.226:50500
      Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 193.233.132.226:50500 -> 192.168.2.4:49738
      Source: TrafficSnort IDS: 2046268 ET TROJAN [ANY.RUN] RisePro TCP v.0.x (Get_settings) 192.168.2.4:49738 -> 193.233.132.226:50500
      Source: global trafficTCP traffic: 192.168.2.6:49732 -> 193.233.132.226:50500
      Source: Joe Sandbox ViewIP Address: 193.233.132.226 193.233.132.226
      Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.226
      Source: SajWKdHxdF.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
      Source: SajWKdHxdF.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
      Source: SajWKdHxdF.exeString found in binary or memory: http://ocsp.sectigo.com0
      Source: SajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
      Source: SajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDllDpRTpR
      Source: SajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
      Source: SajWKdHxdF.exeString found in binary or memory: https://sectigo.com/CPS0
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000E98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
      Source: SajWKdHxdF.exeStatic PE information: invalid certificate
      Source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E11000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetupAfterRebootService.exeP vs SajWKdHxdF.exe
      Source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetupAfterRebootService.exeP vs SajWKdHxdF.exe
      Source: SajWKdHxdF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeFile created: C:\Users\user\AppData\Local\Temp\adobe_WCOljeGXatRJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: SajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
      Source: SajWKdHxdF.exeReversingLabs: Detection: 26%
      Source: SajWKdHxdF.exeVirustotal: Detection: 28%
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeFile read: C:\Users\user\Desktop\SajWKdHxdF.exeJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: d3d10warp.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: dxcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSection loaded: devobj.dllJump to behavior
      Source: SajWKdHxdF.exeStatic file information: File size 4156656 > 1048576
      Source: SajWKdHxdF.exeStatic PE information: Raw size of .MPRESS1 is bigger than: 0x100000 < 0x3d0000
      Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E1C000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdbP@n@ `@_CorExeMainmscoree.dll source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E11000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E11000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb,ANA @A_CorExeMainmscoree.dll source: SajWKdHxdF.exe, 00000001.00000002.4049697794.0000000000E1C000.00000002.00000001.01000000.00000003.sdmp
      Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: SajWKdHxdF.exe, 00000001.00000002.4049028223.00000000005CB000.00000040.00000001.01000000.00000003.sdmp

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeUnpacked PE file: 1.2.SajWKdHxdF.exe.400000.0.unpack .MPRESS1:EW;.MPRESS2:EW;.rsrc:W; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
      Source: initial sampleStatic PE information: section where entry point is pointing to: .MPRESS2
      Source: SajWKdHxdF.exeStatic PE information: section name: .MPRESS1
      Source: SajWKdHxdF.exeStatic PE information: section name: .MPRESS2

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeWindow searched: window name: FilemonClassJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeWindow searched: window name: RegmonClassJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSpecial instruction interceptor: First address: 6CCCA0 instructions caused by: Self-modifying code
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeWindow / User API: threadDelayed 3211Jump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeWindow / User API: threadDelayed 6642Jump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exe TID: 3212Thread sleep count: 3211 > 30Jump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exe TID: 3212Thread sleep time: -324311s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exe TID: 3212Thread sleep count: 6642 > 30Jump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exe TID: 3212Thread sleep time: -670842s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeLast function: Thread delayed
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: SajWKdHxdF.exe, 00000001.00000003.2214578242.0000000000E80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnmp.exeSDT\VBOX__=l{TW
      Source: SajWKdHxdF.exe, 00000001.00000002.4048821640.0000000000193000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: SajWKdHxdF.exe, 00000001.00000003.2214462223.0000000000E80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlmp.exeST\VBOX__=l{TW
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000E90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: SajWKdHxdF.exe, 00000001.00000003.2215301089.0000000000E80000.00000004.00001000.00020000.00000000.sdmp, SajWKdHxdF.exe, 00000001.00000003.2215187926.0000000000E80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlmp.exeSDT\VBOX__=l{TW
      Source: SajWKdHxdF.exe, 00000001.00000003.2214731973.0000000000E80000.00000004.00001000.00020000.00000000.sdmp, SajWKdHxdF.exe, 00000001.00000003.2214843586.0000000000E80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlp.exeSDT\VBOX__=l{TW
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll+
      Source: SajWKdHxdF.exe, 00000001.00000003.2215415343.0000000000E80000.00000004.00001000.00020000.00000000.sdmp, SajWKdHxdF.exe, 00000001.00000003.2215074046.0000000000E80000.00000004.00001000.00020000.00000000.sdmp, SajWKdHxdF.exe, 00000001.00000003.2214959564.0000000000E80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlm.exeSDT\VBOX__=l{TW
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000EEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f5
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000E90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000s
      Source: SajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000EE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeProcess Stats: CPU usage > 42% for more than 60s
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: regmonclass
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: gbdyllo
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: procmon_window_class
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: ollydbg
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: filemonclass
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeProcess queried: DebugPortJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SajWKdHxdF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1.2.SajWKdHxdF.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: SajWKdHxdF.exe PID: 1424, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1.2.SajWKdHxdF.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: SajWKdHxdF.exe PID: 1424, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      431
      Virtualization/Sandbox Evasion
      OS Credential Dumping721
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Software Packing
      LSASS Memory431
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets114
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SajWKdHxdF.exe26%ReversingLabsWin32.Infostealer.Generic
      SajWKdHxdF.exe28%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllSajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSajWKdHxdF.exefalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.winimage.com/zLibDllSajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpfalse
          high
          https://t.me/RiseProSUPPORTSajWKdHxdF.exe, 00000001.00000002.4049846063.0000000000E98000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://sectigo.com/CPS0SajWKdHxdF.exefalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com0SajWKdHxdF.exefalse
            • URL Reputation: safe
            unknown
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SajWKdHxdF.exefalse
            • URL Reputation: safe
            unknown
            http://www.winimage.com/zLibDllDpRTpRSajWKdHxdF.exe, 00000001.00000002.4048938533.0000000000515000.00000002.00000001.01000000.00000003.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              193.233.132.226
              unknownRussian Federation
              2895FREE-NET-ASFREEnetEUtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1429096
              Start date and time:2024-04-20 21:26:27 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 37s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Run name:Run with higher sleep bypass
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SajWKdHxdF.exe
              renamed because original name is a hash value
              Original Sample Name:d72b925c4abaf97c5eb47514ee82f7f2.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@0/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              TimeTypeDescription
              21:29:41API Interceptor16828x Sleep call for process: SajWKdHxdF.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              193.233.132.226qk9TaBBxh8.exeGet hashmaliciousLummaC, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                SecuriteInfo.com.Win64.Evo-gen.32634.31069.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                    80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                        file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                          SecuriteInfo.com.FileRepMalware.17769.21135.exeGet hashmaliciousRisePro StealerBrowse
                            SecuriteInfo.com.FileRepMalware.17769.21135.exeGet hashmaliciousRisePro StealerBrowse
                              PlcTuM1NlF.exeGet hashmaliciousRisePro StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousRisePro StealerBrowse
                                • 147.45.47.93
                                jNeaezBuo8.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                • 193.233.132.175
                                74fa486WVX.exeGet hashmaliciousMars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                • 193.233.132.234
                                qk9TaBBxh8.exeGet hashmaliciousLummaC, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                • 193.233.132.226
                                s2dwlCsA95.exeGet hashmaliciousRisePro StealerBrowse
                                • 147.45.47.93
                                SecuriteInfo.com.Win32.Evo-gen.29833.28353.exeGet hashmaliciousAmadeyBrowse
                                • 193.233.132.56
                                SecuriteInfo.com.Win32.Evo-gen.15237.11182.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
                                • 193.233.132.167
                                SecuriteInfo.com.Win64.Evo-gen.32634.31069.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                • 193.233.132.226
                                UeW2b6mU6Z.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                • 193.233.132.167
                                No context
                                No context
                                No created / dropped files found
                                File type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                Entropy (8bit):7.990203109901368
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:SajWKdHxdF.exe
                                File size:4'156'656 bytes
                                MD5:d72b925c4abaf97c5eb47514ee82f7f2
                                SHA1:5768f62f599d2682b205f6beec17064f14e0646b
                                SHA256:7729b2ed03cca1153854c35ac85fd23c1e0d34347be0e29a8a6aecbba088a95f
                                SHA512:47c9a10df6edf8036e49c925bf13bdb2ede32a879428c29a6ace0cfd3d38323e2da7bd1c2382b4bf9a7342073244662e46ef558c9eeb57cc8e889c5edac6ef45
                                SSDEEP:98304:PtjsJ7v/yR+fIH9vM2s8xULTssu5mysVOBKGf3GTWFzCJNIAIszo:lAJTyR+fAvMT8xgwXAcFPGiFObIn
                                TLSH:2416331C5771ACF8FA25C9B92137C67D5CA23C4B29C71D4E4EA2BC467642A7F083D4A2
                                File Content Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L......f...............'.4...........c.......P....@...................................?..............................`..L...L`..H....p..d............0?..<.................................
                                Icon Hash:034d51391e446107
                                Entrypoint:0xe26394
                                Entrypoint Section:.MPRESS2
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                Time Stamp:0x660FE6E7 [Fri Apr 5 11:56:23 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2f93cd80e5dfeca07d7e8b0f35545fb5
                                Signature Valid:false
                                Signature Issuer:CN=JetBrains s.r.o. \xef~\ufffd\u2030E\xb0j\xef~\ufffd\u2030E\xb0j\xef~\ufffd\u2030E\xb0j
                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                Error Number:-2146762487
                                Not Before, Not After
                                • 17/04/2024 16:34:05 18/04/2034 16:34:05
                                Subject Chain
                                • CN=JetBrains s.r.o. \xef~\ufffd\u2030E\xb0j\xef~\ufffd\u2030E\xb0j\xef~\ufffd\u2030E\xb0j
                                Version:3
                                Thumbprint MD5:A96F06B6F24AD5AC1F53F9E5FDC0816B
                                Thumbprint SHA-1:1D5DFDA0FA0BA343BFD2968DF6A15E25F35D6528
                                Thumbprint SHA-256:7FFEEEB0D9CA132A77BA827622D3E460C6720D7036CE7D88F80DC97C059696E4
                                Serial:5E264BB6F748A1A54136979D5C99F11C
                                Instruction
                                pushad
                                call 00007FA2F07D7825h
                                pop eax
                                add eax, 00000B5Ah
                                mov esi, dword ptr [eax]
                                add esi, eax
                                sub eax, eax
                                mov edi, esi
                                lodsw
                                shl eax, 0Ch
                                mov ecx, eax
                                push eax
                                lodsd
                                sub ecx, eax
                                add esi, ecx
                                mov ecx, eax
                                push edi
                                push ecx
                                dec ecx
                                mov al, byte ptr [ecx+edi+06h]
                                mov byte ptr [ecx+esi], al
                                jne 00007FA2F07D7818h
                                sub eax, eax
                                lodsb
                                mov ecx, eax
                                and cl, FFFFFFF0h
                                and al, 0Fh
                                shl ecx, 0Ch
                                mov ch, al
                                lodsb
                                or ecx, eax
                                push ecx
                                add cl, ch
                                mov ebp, FFFFFD00h
                                shl ebp, cl
                                pop ecx
                                pop eax
                                mov ebx, esp
                                lea esp, dword ptr [esp+ebp*2-00000E70h]
                                push ecx
                                sub ecx, ecx
                                push ecx
                                push ecx
                                mov ecx, esp
                                push ecx
                                mov dx, word ptr [edi]
                                shl edx, 0Ch
                                push edx
                                push edi
                                add ecx, 04h
                                push ecx
                                push eax
                                add ecx, 04h
                                push esi
                                push ecx
                                call 00007FA2F07D7883h
                                mov esp, ebx
                                pop esi
                                pop edx
                                sub eax, eax
                                mov dword ptr [edx+esi], eax
                                mov ah, 10h
                                sub edx, eax
                                sub ecx, ecx
                                cmp ecx, edx
                                jnc 00007FA2F07D7848h
                                mov ebx, ecx
                                lodsb
                                inc ecx
                                and al, FEh
                                cmp al, E8h
                                jne 00007FA2F07D7814h
                                inc ebx
                                add ecx, 04h
                                lodsd
                                or eax, eax
                                js 00007FA2F07D7828h
                                cmp eax, edx
                                jnc 00007FA2F07D7807h
                                jmp 00007FA2F07D7828h
                                add eax, ebx
                                js 00007FA2F07D7801h
                                add eax, edx
                                sub eax, ebx
                                mov dword ptr [esi-04h], eax
                                jmp 00007FA2F07D77F8h
                                call 00007FA2F07D7825h
                                pop edi
                                add edi, FFFFFF4Dh
                                mov al, E9h
                                stosb
                                mov eax, 00000B56h
                                stosd
                                call 00007FA2F07D7825h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0xa260000x4c.MPRESS2
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa2604c0x348.MPRESS2
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa270000x21c64.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x3f30000x3cf0.MPRESS1
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0xa26f000x18.MPRESS2
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0xa261780x68.MPRESS2
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7deb400x40.MPRESS1
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .MPRESS10x10000xa250000x3d00005df8657ceffe89dbbd2e5cc2cb8f9b69unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .MPRESS20xa260000xf200x1000363a8eb7b8f720984410cbf5d90d6c5aFalse0.546875data5.815329468699206IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0xa270000x21c640x21e00a8ff207d7a2f5af5781aebbd8978c20fFalse0.5540244464944649data6.591321755931618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                REGINST0x9cec640x33demptyEnglishUnited States0
                                RTKICON0x9cefa40x4780eemptyEnglishUnited States0
                                SETUPSERVICE_WIN70xa167b40x6000emptyEnglishUnited States0
                                SETUPSERVICE_WIN80xa1c7b40x2a00emptyEnglishUnited States0
                                RT_ICON0xa272200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.6780018761726079
                                RT_ICON0xa282f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.4562470477090222
                                RT_ICON0xa2c5400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.2785993138530699
                                RT_ICON0xa3cd900xb115PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0001985308715504
                                RT_MENU0xa1f1b40x357cempty0
                                RT_MENU0xa227300x8eempty0
                                RT_MENU0xa227c00x1feempty0
                                RT_MENU0xa229c00x190empty0
                                RT_MENU0xa22b500x7a2empty0
                                RT_MENU0xa232f40x25cempty0
                                RT_MENU0xa235500x7ceemptyKoreanNorth Korea0
                                RT_MENU0xa235500x7ceemptyKoreanSouth Korea0
                                RT_MENU0xa23d200x86empty0
                                RT_MENU0xa23da80x88empty0
                                RT_MENU0xa23e300x64empty0
                                RT_MENU0xa23e940xbaempty0
                                RT_MENU0xa23f500x126empty0
                                RT_MENU0xa240780xa4empty0
                                RT_MENU0xa2411c0x28empty0
                                RT_MENU0xa241440x9cempty0
                                RT_MENU0xa241e00x74empty0
                                RT_MENU0xa242540xceempty0
                                RT_MENU0xa243240xd6empty0
                                RT_MENU0xa243fc0x80empty0
                                RT_MENU0xa2447c0x24empty0
                                RT_MENU0xa244a00x26empty0
                                RT_MENU0xa244c80x11cempty0
                                RT_MENU0xa245e40x76empty0
                                RT_MENU0xa2465c0xe6empty0
                                RT_MENU0xa247440x142empty0
                                RT_MENU0xa248880x18aempty0
                                RT_MENU0xa24a140xc6empty0
                                RT_MENU0xa24adc0x19cempty0
                                RT_MENU0xa24c780x142empty0
                                RT_MENU0xa24dbc0x18aempty0
                                RT_MENU0xa24f480xb4empty0
                                RT_MENU0xa24ffc0x122empty0
                                RT_GROUP_ICON0xa484f80x3edata0.8225806451612904
                                RT_MANIFEST0xa485780x6eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.41694915254237286
                                DLLImport
                                KERNEL32.DLLGetModuleHandleA, GetProcAddress
                                USER32.dllwsprintfA
                                GDI32.dllCreateCompatibleBitmap
                                ADVAPI32.dllRegQueryValueExA
                                SHELL32.dllShellExecuteA
                                ole32.dllCoInitialize
                                WS2_32.dllWSAStartup
                                CRYPT32.dllCryptUnprotectData
                                SHLWAPI.dllPathFindExtensionA
                                gdiplus.dllGdipGetImageEncoders
                                SETUPAPI.dllSetupDiEnumDeviceInfo
                                ntdll.dllRtlUnicodeStringToAnsiString
                                RstrtMgr.DLLRmStartSession
                                NameOrdinalAddress
                                Start10x461330
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                KoreanNorth Korea
                                KoreanSouth Korea
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                04/20/24-21:20:26.757895TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973850500192.168.2.4193.233.132.226
                                04/20/24-21:23:04.222005TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973850500192.168.2.4193.233.132.226
                                04/20/24-21:21:43.683511TCP2046268ET TROJAN [ANY.RUN] RisePro TCP v.0.x (Get_settings)4973850500192.168.2.4193.233.132.226
                                04/20/24-21:20:26.979618TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5050049738193.233.132.226192.168.2.4
                                04/20/24-21:21:42.303911TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5050049738193.233.132.226192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 20, 2024 21:29:05.676909924 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:05.924253941 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:29:05.924348116 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:05.945267916 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:06.169004917 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:29:06.214432955 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:06.238286018 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:29:09.292675018 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:09.738260031 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:29:41.105191946 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:29:41.439918041 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:01.589741945 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:01.945236921 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:14.121323109 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:14.441531897 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:20.417625904 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:20.740684986 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:23.558334112 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:23.946151972 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:26.683383942 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:27.041312933 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:29.808362007 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:30.142987013 CEST5050049732193.233.132.226192.168.2.6
                                Apr 20, 2024 21:30:32.949035883 CEST4973250500192.168.2.6193.233.132.226
                                Apr 20, 2024 21:30:33.241700888 CEST5050049732193.233.132.226192.168.2.6

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:1
                                Start time:21:27:28
                                Start date:20/04/2024
                                Path:C:\Users\user\Desktop\SajWKdHxdF.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SajWKdHxdF.exe"
                                Imagebase:0x400000
                                File size:4'156'656 bytes
                                MD5 hash:D72B925C4ABAF97C5EB47514EE82F7F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                No disassembly