Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1430821
MD5:2019322ea56c5b80294770f6018bddc1
SHA1:19285ecd68a4d9b957f87502c555dad437cfeb8f
SHA256:0823c2f58d094e1c096ae9184acf0b930df6dff97d0cd77728dc3ff07f9c0096
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 2508 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
    • schtasks.exe (PID: 5556 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7164 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • WinTrackerSP.exe (PID: 5732 cmdline: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe MD5: 2019322EA56C5B80294770F6018BDDC1)
  • WinTrackerSP.exe (PID: 3524 cmdline: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe MD5: 2019322EA56C5B80294770F6018BDDC1)
  • ExtreamFanV5.exe (PID: 3752 cmdline: "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • ExtreamFanV5.exe (PID: 6404 cmdline: "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • ExtreamFanV5.exe (PID: 3288 cmdline: "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • ExtreamFanV5.exe (PID: 4112 cmdline: "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • PowerExpertNT.exe (PID: 5516 cmdline: "C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • PowerExpertNT.exe (PID: 5480 cmdline: "C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe" MD5: 2019322EA56C5B80294770F6018BDDC1)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\file.exe, ProcessId: 2508, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 2508, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk
Timestamp:04/24/24-09:04:58.222569
SID:2046266
Source Port:50505
Destination Port:49704
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/24/24-09:04:58.912086
SID:2049060
Source Port:49704
Destination Port:50505
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/24/24-09:05:03.048335
SID:2046269
Source Port:49704
Destination Port:50505
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeAvira: detection malicious, Label: TR/Redcap.nszjr
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeAvira: detection malicious, Label: TR/Redcap.nszjr
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeAvira: detection malicious, Label: TR/Redcap.nszjr
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeReversingLabs: Detection: 63%
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeVirustotal: Detection: 73%Perma Link
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeVirustotal: Detection: 73%Perma Link
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeVirustotal: Detection: 73%Perma Link
Source: file.exeReversingLabs: Detection: 63%
Source: file.exeVirustotal: Detection: 73%Perma Link
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeJoe Sandbox ML: detected
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeJoe Sandbox ML: detected
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.66.10:50505 -> 192.168.2.5:49704
Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.5:49704 -> 5.42.66.10:50505
Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49704 -> 5.42.66.10:50505
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 5.42.66.10:50505
Source: Joe Sandbox ViewIP Address: 5.42.66.10 5.42.66.10
Source: Joe Sandbox ViewIP Address: 5.42.66.10 5.42.66.10
Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: unknownTCP traffic detected without corresponding DNS query: 5.42.66.10
Source: file.exe, 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070340536.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071240449.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207185054.000000000020F000.00000002.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268199142.000000000020F000.00000002.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343560739.000000000052F000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
Source: file.exe, 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070340536.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071240449.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207185054.000000000020F000.00000002.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268199142.000000000020F000.00000002.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343560739.000000000052F000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.winimage.com/zLibDllm_object
Source: Joe Sandbox ViewDropped File: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe 0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe 0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe 0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal100.evad.winEXE@15/8@0/1
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\ExtreamFanV5Jump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\IntelPowerExpert
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:652:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_03
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\tmpSTLpopstartJump to behavior
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 63%
Source: file.exeVirustotal: Detection: 73%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
Source: unknownProcess created: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
Source: unknownProcess created: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe "C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe "C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe "C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHESTJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHESTJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeSection loaded: apphelp.dllJump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: PowerExpertNT.lnk.0.drLNK file: ..\..\..\..\..\..\Local\Temp\PowerExpertNT\PowerExpertNT.exe
Source: file.exeStatic file information: File size 5857792 > 1048576
Source: file.exeStatic PE information: Raw size of .vmp1024 is bigger than: 0x100000 < 0x593400
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1024
Source: file.exeStatic PE information: section name: .vmp1024
Source: file.exeStatic PE information: section name: .vmp1024
Source: ExtreamFanV5.exe.0.drStatic PE information: section name: .vmp1024
Source: ExtreamFanV5.exe.0.drStatic PE information: section name: .vmp1024
Source: PowerExpertNT.exe.0.drStatic PE information: section name: .vmp1024
Source: PowerExpertNT.exe.0.drStatic PE information: section name: .vmp1024
Source: WinTrackerSP.exe.0.drStatic PE information: section name: .vmp1024
Source: WinTrackerSP.exe.0.drStatic PE information: section name: .vmp1024
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ExtreamFanV5Jump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ExtreamFanV5Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\file.exeMemory written: PID: 2508 base: 1940005 value: E9 8B 2F 5B 75 Jump to behavior
Source: C:\Users\user\Desktop\file.exeMemory written: PID: 2508 base: 76EF2F90 value: E9 7A D0 A4 8A Jump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeMemory written: PID: 5732 base: 1CA0005 value: E9 8B 2F 25 75 Jump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeMemory written: PID: 5732 base: 76EF2F90 value: E9 7A D0 DA 8A Jump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeMemory written: PID: 3524 base: A60005 value: E9 8B 2F 49 76 Jump to behavior
Source: C:\ProgramData\WinTrackerSP\WinTrackerSP.exeMemory written: PID: 3524 base: 76EF2F90 value: E9 7A D0 B6 89 Jump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeMemory written: PID: 6404 base: 10B0005 value: E9 8B 2F E4 75 Jump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeMemory written: PID: 6404 base: 76EF2F90 value: E9 7A D0 1B 8A Jump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeMemory written: PID: 4112 base: 12A0005 value: E9 8B 2F C5 75 Jump to behavior
Source: C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exeMemory written: PID: 4112 base: 76EF2F90 value: E9 7A D0 3A 8A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeMemory written: PID: 5480 base: 440005 value: E9 8B 2F AB 76 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exeMemory written: PID: 5480 base: 76EF2F90 value: E9 7A D0 54 89 Jump to behavior

Malware Analysis System Evasion

barindex
Source: file.exe, 00000000.00000002.3271713510.0000000000F2A000.00000020.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070389474.0000000000DFA000.00000020.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071295908.0000000000DFA000.00000020.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207221346.000000000022A000.00000020.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268272008.000000000022A000.00000020.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343606376.000000000054A000.00000020.00000001.01000000.00000009.sdmpBinary or memory string: R.SBIEDLL.DLL>3
Source: file.exe, 00000000.00000002.3271713510.0000000000F2A000.00000020.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070389474.0000000000DFA000.00000020.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071295908.0000000000DFA000.00000020.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207221346.000000000022A000.00000020.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268272008.000000000022A000.00000020.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343606376.000000000054A000.00000020.00000001.01000000.00000009.sdmpBinary or memory string: R.SBIEDLL.DLL
Source: C:\Users\user\Desktop\file.exe TID: 1672Thread sleep count: 41 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 1672Thread sleep count: 39 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: file.exe, 00000000.00000002.3272728136.0000000001A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
Process Injection
1
Masquerading
1
Credential API Hooking
21
Security Software Discovery
Remote Services1
Credential API Hooking
1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Scheduled Task/Job
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt21
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Registry Run Keys / Startup Folder
1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1430821 Sample: file.exe Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 34 Snort IDS alert for network traffic 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Machine Learning detection for sample 2->40 7 file.exe 1 13 2->7         started        12 WinTrackerSP.exe 2->12         started        14 ExtreamFanV5.exe 2->14         started        16 6 other processes 2->16 process3 dnsIp4 32 5.42.66.10, 49704, 50505 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 7->32 26 C:\Users\user\AppData\...\PowerExpertNT.exe, PE32 7->26 dropped 28 C:\Users\user\AppData\...xtreamFanV5.exe, PE32 7->28 dropped 30 C:\ProgramData\...\WinTrackerSP.exe, PE32 7->30 dropped 42 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->42 44 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->44 46 Uses schtasks.exe or at.exe to add and modify task schedules 7->46 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        48 Antivirus detection for dropped file 12->48 50 Multi AV Scanner detection for dropped file 12->50 52 Machine Learning detection for dropped file 12->52 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe63%ReversingLabsWin32.Trojan.Privateloader
file.exe74%VirustotalBrowse
file.exe100%AviraTR/Redcap.nszjr
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe100%AviraTR/Redcap.nszjr
C:\ProgramData\WinTrackerSP\WinTrackerSP.exe100%AviraTR/Redcap.nszjr
C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe100%AviraTR/Redcap.nszjr
C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe100%Joe Sandbox ML
C:\ProgramData\WinTrackerSP\WinTrackerSP.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe100%Joe Sandbox ML
C:\ProgramData\WinTrackerSP\WinTrackerSP.exe63%ReversingLabsWin32.Trojan.Privateloader
C:\ProgramData\WinTrackerSP\WinTrackerSP.exe74%VirustotalBrowse
C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe63%ReversingLabsWin32.Trojan.Privateloader
C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe74%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe63%ReversingLabsWin32.Trojan.Privateloader
C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe74%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.winimage.com/zLibDllfile.exe, 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070340536.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071240449.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207185054.000000000020F000.00000002.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268199142.000000000020F000.00000002.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343560739.000000000052F000.00000002.00000001.01000000.00000009.sdmpfalse
    high
    http://www.winimage.com/zLibDllm_objectfile.exe, 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmp, WinTrackerSP.exe, 00000006.00000002.2070340536.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, WinTrackerSP.exe, 00000007.00000002.2071240449.0000000000DDF000.00000002.00000001.01000000.00000006.sdmp, ExtreamFanV5.exe, 0000000B.00000002.2207185054.000000000020F000.00000002.00000001.01000000.00000007.sdmp, ExtreamFanV5.exe, 0000000F.00000002.2268199142.000000000020F000.00000002.00000001.01000000.00000007.sdmp, PowerExpertNT.exe, 00000012.00000002.2343560739.000000000052F000.00000002.00000001.01000000.00000009.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      5.42.66.10
      unknownRussian Federation
      39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1430821
      Start date and time:2024-04-24 09:04:06 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 37s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:19
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:1
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal100.evad.winEXE@15/8@0/1
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target ExtreamFanV5.exe, PID 6404 because there are no executed function
      • Execution Graph export aborted for target PowerExpertNT.exe, PID 5480 because there are no executed function
      • Execution Graph export aborted for target WinTrackerSP.exe, PID 5732 because there are no executed function
      • Execution Graph export aborted for target file.exe, PID 2508 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      09:04:58Task SchedulerRun new task: WinTrackerSP HR path: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
      09:04:58Task SchedulerRun new task: WinTrackerSP LG path: C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
      09:05:01AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ExtreamFanV5 C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
      09:05:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ExtreamFanV5 C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
      09:05:17AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      5.42.66.10SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
      • 5.42.66.10/api/flash.php
      80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
      • 5.42.66.10/api/flash.php
      SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
      • 5.42.66.10/download/th/Retailer_prog.exe
      5NlNJIHhTf.exeGet hashmaliciousUnknownBrowse
      • 5.42.66.10/download/th/getimage15.php
      file.exeGet hashmaliciousUnknownBrowse
      • 5.42.66.10/api/flash.php
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfile.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
      • 5.42.66.10
      file.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Vidar, zgRATBrowse
      • 5.42.66.10
      file.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.96
      c3nBx2HQG2.exeGet hashmaliciousGlupteba, Mars Stealer, Phorpiex, PureLog Stealer, Stealc, Vidar, zgRATBrowse
      • 5.42.66.10
      file.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.96
      file.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.50
      HwJWf67Y5h.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.50
      8xFzJWrEIa.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, RedLine, SmokeLoader, VidarBrowse
      • 5.42.65.50
      file.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.50
      file.exeGet hashmaliciousRedLineBrowse
      • 5.42.65.50
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe7qAKRRMho6.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
        8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exeGet hashmaliciousGCleaner, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
          e8iuAWz9pB.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
            5zq2Yob8xh.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
              C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe7qAKRRMho6.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exeGet hashmaliciousGCleaner, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                  e8iuAWz9pB.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                    5zq2Yob8xh.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      C:\ProgramData\WinTrackerSP\WinTrackerSP.exe7qAKRRMho6.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                        8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exeGet hashmaliciousGCleaner, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                          e8iuAWz9pB.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                            5zq2Yob8xh.exeGet hashmaliciousGCleaner, Glupteba, Mars Stealer, Meduza Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):5857792
                              Entropy (8bit):7.958973990519404
                              Encrypted:false
                              SSDEEP:98304:L74FEGugF8FjiE4KUte+1gk7SmxXR3QQbP8PNY8N+EO90ZK:H5Gu86d4xl1gqxfQYA5I7
                              MD5:2019322EA56C5B80294770F6018BDDC1
                              SHA1:19285ECD68A4D9B957F87502C555DAD437CFEB8F
                              SHA-256:0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
                              SHA-512:092B6A5E503DA5057FB569BA439DFF8DEA9C79CE6A036F460543EBBC7EB5DE9BC206F5283C26F9F38E4ED027FB9B99336C199C7446E9E1BB3B973E71E11683E0
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 63%
                              • Antivirus: Virustotal, Detection: 74%, Browse
                              Joe Sandbox View:
                              • Filename: 7qAKRRMho6.exe, Detection: malicious, Browse
                              • Filename: 8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exe, Detection: malicious, Browse
                              • Filename: e8iuAWz9pB.exe, Detection: malicious, Browse
                              • Filename: 5zq2Yob8xh.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...............'.....x.......e............@...................................Z...@..................................................................................................o. ......@............................................text...{........................... ..`.rdata...r..........................@..@.data....&...p......................@....vmp1024F.3.........................`..`.vmp1024.3Y...;..4Y.................`..`.reloc..............8Y.............@..@.rsrc............"...@Y.............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:false
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):5857792
                              Entropy (8bit):7.958973990519404
                              Encrypted:false
                              SSDEEP:98304:L74FEGugF8FjiE4KUte+1gk7SmxXR3QQbP8PNY8N+EO90ZK:H5Gu86d4xl1gqxfQYA5I7
                              MD5:2019322EA56C5B80294770F6018BDDC1
                              SHA1:19285ECD68A4D9B957F87502C555DAD437CFEB8F
                              SHA-256:0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
                              SHA-512:092B6A5E503DA5057FB569BA439DFF8DEA9C79CE6A036F460543EBBC7EB5DE9BC206F5283C26F9F38E4ED027FB9B99336C199C7446E9E1BB3B973E71E11683E0
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 63%
                              • Antivirus: Virustotal, Detection: 74%, Browse
                              Joe Sandbox View:
                              • Filename: 7qAKRRMho6.exe, Detection: malicious, Browse
                              • Filename: 8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exe, Detection: malicious, Browse
                              • Filename: e8iuAWz9pB.exe, Detection: malicious, Browse
                              • Filename: 5zq2Yob8xh.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...............'.....x.......e............@...................................Z...@..................................................................................................o. ......@............................................text...{........................... ..`.rdata...r..........................@..@.data....&...p......................@....vmp1024F.3.........................`..`.vmp1024.3Y...;..4Y.................`..`.reloc..............8Y.............@..@.rsrc............"...@Y.............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:false
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):5857792
                              Entropy (8bit):7.958973990519404
                              Encrypted:false
                              SSDEEP:98304:L74FEGugF8FjiE4KUte+1gk7SmxXR3QQbP8PNY8N+EO90ZK:H5Gu86d4xl1gqxfQYA5I7
                              MD5:2019322EA56C5B80294770F6018BDDC1
                              SHA1:19285ECD68A4D9B957F87502C555DAD437CFEB8F
                              SHA-256:0823C2F58D094E1C096AE9184ACF0B930DF6DFF97D0CD77728DC3FF07F9C0096
                              SHA-512:092B6A5E503DA5057FB569BA439DFF8DEA9C79CE6A036F460543EBBC7EB5DE9BC206F5283C26F9F38E4ED027FB9B99336C199C7446E9E1BB3B973E71E11683E0
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 63%
                              • Antivirus: Virustotal, Detection: 74%, Browse
                              Joe Sandbox View:
                              • Filename: 7qAKRRMho6.exe, Detection: malicious, Browse
                              • Filename: 8b3ee970a1b172952a665247aa5ff590d12d8f4b33c07.exe, Detection: malicious, Browse
                              • Filename: e8iuAWz9pB.exe, Detection: malicious, Browse
                              • Filename: 5zq2Yob8xh.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...............'.....x.......e............@...................................Z...@..................................................................................................o. ......@............................................text...{........................... ..`.rdata...r..........................@..@.data....&...p......................@....vmp1024F.3.........................`..`.vmp1024.3Y...;..4Y.................`..`.reloc..............8Y.............@..@.rsrc............"...@Y.............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:false
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:data
                              Category:modified
                              Size (bytes):77
                              Entropy (8bit):4.778431229862073
                              Encrypted:false
                              SSDEEP:3:7OoQGlha3FqbYoQGlzVouu+m:rQoGFqJQoZo1
                              MD5:A2F48548E95FD7DEFDDEEE2C3954AE4F
                              SHA1:42A6CE0B4F93142B900B6D131400AD328E1A91E6
                              SHA-256:2EFF8E0A97F135F84D767E79B61A1BD34AEBE5A5B5C26801286287E621B125A0
                              SHA-512:E49699DBA070DCABFA638B216201F52354EF1FEB48D3DAE5B0E56B2D7289EDBE642806AEEAFEC7618651937E27109F56439FE9A348C1604B646BF83CD6130398
                              Malicious:false
                              Preview:.sYYYY[....5.......0)[CY[HLMWHOWHILWJO[.sYYYY[....5.......-...[CYHNHJ@MKK@As.
                              Process:C:\Users\user\Desktop\file.exe
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Wed Apr 24 06:04:57 2024, mtime=Wed Apr 24 06:04:57 2024, atime=Wed Apr 24 06:04:54 2024, length=5857792, window=hide
                              Category:dropped
                              Size (bytes):1239
                              Entropy (8bit):4.911150372803357
                              Encrypted:false
                              SSDEEP:24:8slfb8qJRNgKhCM/IT9NDAkmnYjAW4H4mAd1Xqygm:84QQR+MQT9SX6T1ayg
                              MD5:3DE9D906466BDC6278D6F3D1F7650C7C
                              SHA1:136E840E2A180FD3C1074A37C15BEABFEA7C8280
                              SHA-256:8CDDA29B4FB1FB4F9622ABA101653F78A1F6E590D5B4442BDDC9EBD73DE20993
                              SHA-512:1CF87CCE4A14F1DCD1995B9A6B603A01AEFC8A4CB1C155E3A352C7F87ED15E7A9D4F77B7AB2CE7A30D5DC8D8CF341D754CFEE329826B9600987812C430D0AC16
                              Malicious:false
                              Preview:L..................F.... ...........s.......{.......bY.....................0.:..DG..Yr?.D..U..k0.&...&...... M.....@F.......N.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.X.8....B.....................Bdg.A.p.p.D.a.t.a...B.P.1......X.8..Local.<......DWSl.X.8....V........................L.o.c.a.l.....N.1......X.8..Temp..:......DWSl.X.8....\........................T.e.m.p.....d.1......X.8..POWERE~1..L......X.8.X.8....8.....................H...P.o.w.e.r.E.x.p.e.r.t.N.T.....p.2..bY..X.8 .POWERE~1.EXE..T......X.8.X.8....;......................>..P.o.w.e.r.E.x.p.e.r.t.N.T...e.x.e.......q...............-.......p............'!<.....C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe....P.o.w.e.r.E.x.p.e.r.t.N.T.<.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.P.o.w.e.r.E.x.p.e.r.t.N.T.\.P.o.w.e.r.E.x.p.e.r.t.N.T...e.x.e.........|....I.J.H..K..:...`.......X.......468325...........hT..CrF.f4... .y2=.b...,...W..hT..Cr
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.958973990519404
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:file.exe
                              File size:5'857'792 bytes
                              MD5:2019322ea56c5b80294770f6018bddc1
                              SHA1:19285ecd68a4d9b957f87502c555dad437cfeb8f
                              SHA256:0823c2f58d094e1c096ae9184acf0b930df6dff97d0cd77728dc3ff07f9c0096
                              SHA512:092b6a5e503da5057fb569ba439dff8dea9c79ce6a036f460543ebbc7eb5de9bc206f5283c26f9f38e4ed027fb9b99336c199c7446e9e1bb3b973e71e11683e0
                              SSDEEP:98304:L74FEGugF8FjiE4KUte+1gk7SmxXR3QQbP8PNY8N+EO90ZK:H5Gu86d4xl1gqxfQYA5I7
                              TLSH:F046237353710081D1E5883A56377EE872FB037E8F51B5382AE72DC436A66E8E623953
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...............'.....x.......e............@...................................Z...@................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0xc965d6
                              Entrypoint Section:.vmp1024
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x660C03D4 [Tue Apr 2 13:10:44 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:b92af7920132d9c164f3fefd70cac1d7
                              Instruction
                              push BAA6E76Ah
                              call 00007F16B4AE727Eh
                              jmp 00007F16B4AEA5D5h
                              jmp 00007F16B4C7BEDCh
                              inc ecx
                              clc
                              cmp ebx, 04h
                              jmp 00007F16B4A75FADh
                              test esp, edx
                              not eax
                              jmp 00007F16B4B0C377h
                              mov dx, word ptr [ebp+00h]
                              jmp 00007F16B474A2F2h
                              dec ecx
                              jmp 00007F16B4B8B91Eh
                              add esi, edx
                              jmp 00007F16B4C63112h
                              push edi
                              ret
                              jmp edi
                              jc 00007F16B4AE4207h
                              movzx edx, cl
                              dec al
                              shld ax, ax, 00000077h
                              bts ax, cx
                              mov eax, 38E38E39h
                              test ecx, 08BA2312h
                              cmp cx, 1CEBh
                              stc
                              mul edx
                              shr edx, 1
                              mov ax, dx
                              ror eax, 45h
                              movzx eax, dl
                              bsr dx, dx
                              btr edx, FFFFFFA7h
                              mov edx, eax
                              lea ecx, dword ptr [ecx+00h]
                              cmc
                              test sp, 67F5h
                              add cl, FFFFFFF7h
                              clc
                              cmc
                              sub eax, 01h
                              jmp 00007F16B4AE41ACh
                              mov eax, dword ptr [ebp+08h]
                              pop edi
                              jmp 00007F16B4AA79B7h
                              inc ecx
                              inc ebx
                              inc ecx
                              neg ebx
                              jmp 00007F16B4AAE3B5h
                              push edi
                              ret
                              jmp 00007F16B476087Fh
                              inc edx
                              jmp 00007F16B4B5CE71h
                              jmp edi
                              mov word ptr [esi+04h], dx
                              cmovnle dx, dx
                              mov dx, bp
                              bswap dx
                              pushfd
                              pop dword ptr [esi]
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x83aef80xdc.vmp1024
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x9500000x49bb5.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x94f0000x618.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x6ffd880x20.vmp1024
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x94def00x40.vmp1024
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x88b0000x80.vmp1024
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x6da7b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x6f0000x172000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x870000x26980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .vmp10240x8a0000x330e460x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .vmp10240x3bb0000x5933f00x593400ba6b512b8eafe58512a8ca98144253e1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .reloc0x94f0000x6180x80013badda7649731b81d32422fb18b4a27False0.4130859375data3.54613520452289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x9500000x49bb50x2200b1fb8a707a41cb257d4be4a268724e75False0.2672334558823529data3.1598133691010966IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_CURSOR0x9521780x134dataEnglishUnited States0.08823529411764706
                              RT_CURSOR0x9522ac0x134emptyEnglishUnited States0
                              RT_CURSOR0x9523e00x134emptyEnglishUnited States0
                              RT_CURSOR0x9525140x134emptyEnglishUnited States0
                              RT_CURSOR0x9526480x134emptyEnglishUnited States0
                              RT_CURSOR0x95277c0x134emptyEnglishUnited States0
                              RT_CURSOR0x9528b00x134emptyEnglishUnited States0
                              RT_CURSOR0x9529e40x134emptyEnglishUnited States0
                              RT_CURSOR0x952b180x134emptyEnglishUnited States0
                              RT_CURSOR0x952c4c0x134emptyEnglishUnited States0
                              RT_CURSOR0x952d800x134emptyEnglishUnited States0
                              RT_CURSOR0x952eb40x134emptyEnglishUnited States0
                              RT_CURSOR0x952fe80x134emptyEnglishUnited States0
                              RT_CURSOR0x95311c0xb4emptyEnglishUnited States0
                              RT_CURSOR0x9531d00x134emptyEnglishUnited States0
                              RT_CURSOR0x9533040x134emptyEnglishUnited States0
                              RT_CURSOR0x9534380x134emptyEnglishUnited States0
                              RT_CURSOR0x95356c0x134emptyEnglishUnited States0
                              RT_CURSOR0x9536a00x134emptyEnglishUnited States0
                              RT_CURSOR0x9537d40x134emptyEnglishUnited States0
                              RT_CURSOR0x9539080x134emptyEnglishUnited States0
                              RT_CURSOR0x953a3c0x134emptyEnglishUnited States0
                              RT_CURSOR0x953b700x134emptyEnglishUnited States0
                              RT_CURSOR0x953ca40x134emptyEnglishUnited States0
                              RT_CURSOR0x953dd80x134emptyEnglishUnited States0
                              RT_CURSOR0x953f0c0x134emptyEnglishUnited States0
                              RT_CURSOR0x9540400x134emptyEnglishUnited States0
                              RT_CURSOR0x9541740x134emptyEnglishUnited States0
                              RT_BITMAP0x9542a80x189eaemptyEnglishUnited States0
                              RT_BITMAP0x96cc940x62cemptyEnglishUnited States0
                              RT_BITMAP0x96d2c00xe8emptyEnglishUnited States0
                              RT_BITMAP0x96d3a80x4a0emptyEnglishUnited States0
                              RT_BITMAP0x96d8480x197aemptyEnglishUnited States0
                              RT_BITMAP0x96f1c40xc8emptyEnglishUnited States0
                              RT_BITMAP0x96f28c0xc8emptyEnglishUnited States0
                              RT_BITMAP0x96f3540xc8emptyEnglishUnited States0
                              RT_BITMAP0x96f41c0xc8emptyEnglishUnited States0
                              RT_BITMAP0x96f4e40x182aemptyEnglishUnited States0
                              RT_BITMAP0x970d100x468emptyEnglishUnited States0
                              RT_BITMAP0x9711780x528emptyEnglishUnited States0
                              RT_BITMAP0x9716a00x528emptyEnglishUnited States0
                              RT_BITMAP0x971bc80x158emptyEnglishUnited States0
                              RT_BITMAP0x971d200x188emptyEnglishUnited States0
                              RT_BITMAP0x971ea80x1e8emptyEnglishUnited States0
                              RT_BITMAP0x9720900xad2emptyEnglishUnited States0
                              RT_BITMAP0x972b640xad2emptyEnglishUnited States0
                              RT_BITMAP0x9736380xb0aemptyEnglishUnited States0
                              RT_BITMAP0x9741440x7e2emptyEnglishUnited States0
                              RT_BITMAP0x9749280xb0aemptyEnglishUnited States0
                              RT_BITMAP0x9754340x134emptyEnglishUnited States0
                              RT_BITMAP0x9755680x928emptyEnglishUnited States0
                              RT_BITMAP0x975e900x32aemptyEnglishUnited States0
                              RT_BITMAP0x9761bc0x32aemptyEnglishUnited States0
                              RT_BITMAP0x9764e80xc2aemptyEnglishUnited States0
                              RT_BITMAP0x9771140x20aemptyEnglishUnited States0
                              RT_BITMAP0x9773200x20aemptyEnglishUnited States0
                              RT_BITMAP0x97752c0x20aemptyEnglishUnited States0
                              RT_BITMAP0x9777380x20aemptyEnglishUnited States0
                              RT_BITMAP0x9779440x32aemptyEnglishUnited States0
                              RT_BITMAP0x977c700x2256emptyEnglishUnited States0
                              RT_BITMAP0x979ec80x602aemptyEnglishUnited States0
                              RT_BITMAP0x97fef40x2028emptyEnglishUnited States0
                              RT_BITMAP0x981f1c0x13daemptyEnglishUnited States0
                              RT_BITMAP0x9832f80x13daemptyEnglishUnited States0
                              RT_BITMAP0x9846d40x13daemptyEnglishUnited States0
                              RT_BITMAP0x985ab00xeb2emptyEnglishUnited States0
                              RT_BITMAP0x9869640x13daemptyEnglishUnited States0
                              RT_BITMAP0x987d400x13daemptyEnglishUnited States0
                              RT_BITMAP0x98911c0x13daemptyEnglishUnited States0
                              RT_BITMAP0x98a4f80x13daemptyEnglishUnited States0
                              RT_BITMAP0x98b8d40xeb2emptyEnglishUnited States0
                              RT_BITMAP0x98c7880x13daemptyEnglishUnited States0
                              RT_BITMAP0x98db640x5a66emptyEnglishUnited States0
                              RT_BITMAP0x9935cc0xb8emptyEnglishUnited States0
                              RT_BITMAP0x9936840x144emptyEnglishUnited States0
                              RT_MENU0x9937c80x11cemptyEnglishUnited States0
                              RT_DIALOG0x9938e40x144emptyEnglishUnited States0
                              RT_DIALOG0x993a280x1f6emptyEnglishUnited States0
                              RT_DIALOG0x993c200x13cemptyEnglishUnited States0
                              RT_DIALOG0x993d5c0x1a4emptyEnglishUnited States0
                              RT_DIALOG0x993f000xe6emptyEnglishUnited States0
                              RT_DIALOG0x993fe80x390emptyEnglishUnited States0
                              RT_DIALOG0x9943780x21cemptyEnglishUnited States0
                              RT_DIALOG0x9945940x390emptyEnglishUnited States0
                              RT_DIALOG0x9949240x1dcemptyEnglishUnited States0
                              RT_DIALOG0x994b000x346emptyEnglishUnited States0
                              RT_DIALOG0x994e480x334emptyEnglishUnited States0
                              RT_DIALOG0x99517c0x58emptyEnglishUnited States0
                              RT_DIALOG0x9951d40x23cemptyEnglishUnited States0
                              RT_DIALOG0x9954100x1c2emptyEnglishUnited States0
                              RT_DIALOG0x9955d40x160emptyEnglishUnited States0
                              RT_DIALOG0x9957340xb2emptyEnglishUnited States0
                              RT_DIALOG0x9957e80x3d4emptyEnglishUnited States0
                              RT_DIALOG0x995bbc0x19eemptyEnglishUnited States0
                              RT_DIALOG0x995d5c0x1a2emptyEnglishUnited States0
                              RT_DIALOG0x995f000x34emptyEnglishUnited States0
                              RT_DIALOG0x995f340x2a8emptyEnglishUnited States0
                              RT_DIALOG0x9961dc0x382emptyEnglishUnited States0
                              RT_DIALOG0x9965600xe8emptyEnglishUnited States0
                              RT_DIALOG0x9966480x34emptyEnglishUnited States0
                              RT_STRING0x99667c0x4cemptyEnglishUnited States0
                              RT_STRING0x9966c80x32cemptyEnglishUnited States0
                              RT_STRING0x9969f40x248emptyEnglishUnited States0
                              RT_STRING0x996c3c0x84emptyEnglishUnited States0
                              RT_STRING0x996cc00x2a8emptyEnglishUnited States0
                              RT_STRING0x996f680x20eemptyEnglishUnited States0
                              RT_STRING0x9971780x24cemptyEnglishUnited States0
                              RT_STRING0x9973c40x3cemptyEnglishUnited States0
                              RT_STRING0x9974000x16eemptyEnglishUnited States0
                              RT_STRING0x9975700xa6emptyEnglishUnited States0
                              RT_STRING0x9976180x184emptyEnglishUnited States0
                              RT_STRING0x99779c0x66emptyEnglishUnited States0
                              RT_STRING0x9978040x1d6emptyEnglishUnited States0
                              RT_STRING0x9979dc0x186emptyEnglishUnited States0
                              RT_STRING0x997b640xb2emptyEnglishUnited States0
                              RT_STRING0x997c180x48emptyEnglishUnited States0
                              RT_STRING0x997c600x18cemptyEnglishUnited States0
                              RT_STRING0x997dec0x82emptyEnglishUnited States0
                              RT_STRING0x997e700x2aemptyEnglishUnited States0
                              RT_STRING0x997e9c0x184emptyEnglishUnited States0
                              RT_STRING0x9980200x4eeemptyEnglishUnited States0
                              RT_STRING0x9985100x264emptyEnglishUnited States0
                              RT_STRING0x9987740x2daemptyEnglishUnited States0
                              RT_STRING0x998a500x8aemptyEnglishUnited States0
                              RT_STRING0x998adc0xacemptyEnglishUnited States0
                              RT_STRING0x998b880xdeemptyEnglishUnited States0
                              RT_STRING0x998c680x4a8emptyEnglishUnited States0
                              RT_STRING0x9991100x228emptyEnglishUnited States0
                              RT_STRING0x9993380x2cemptyEnglishUnited States0
                              RT_STRING0x9993640x53eemptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9998a40x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9998b80x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9998cc0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9998e00x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9998f40x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999080x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x99991c0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999300x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999440x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999580x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x99996c0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999800x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999940x22emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999b80x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999cc0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999e00x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x9999f40x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a080x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a1c0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a300x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a440x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a580x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a6c0x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a800x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999a940x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999aa80x14emptyEnglishUnited States0
                              RT_GROUP_CURSOR0x999abc0x14emptyEnglishUnited States0
                              RT_MANIFEST0x951ea00x2d5XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5020689655172413
                              None0x999ad00xe5emptyEnglishUnited States0
                              DLLImport
                              KERNEL32.dllSleep
                              ADVAPI32.dllGetUserNameA
                              SHELL32.dllShellExecuteA
                              ole32.dllCoCreateInstance
                              WS2_32.dllsend
                              WTSAPI32.dllWTSSendMessageW
                              KERNEL32.dllVirtualQuery
                              USER32.dllGetProcessWindowStation
                              KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                              USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              04/24/24-09:04:58.222569TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)50505497045.42.66.10192.168.2.5
                              04/24/24-09:04:58.912086TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4970450505192.168.2.55.42.66.10
                              04/24/24-09:05:03.048335TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970450505192.168.2.55.42.66.10
                              TimestampSource PortDest PortSource IPDest IP
                              Apr 24, 2024 09:04:57.560302973 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:57.891004086 CEST50505497045.42.66.10192.168.2.5
                              Apr 24, 2024 09:04:57.891220093 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:58.222568989 CEST50505497045.42.66.10192.168.2.5
                              Apr 24, 2024 09:04:58.266952038 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:58.912086010 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:59.286880016 CEST50505497045.42.66.10192.168.2.5
                              Apr 24, 2024 09:04:59.329447031 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:59.584568977 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:04:59.915158987 CEST50505497045.42.66.10192.168.2.5
                              Apr 24, 2024 09:04:59.970065117 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:05:03.048335075 CEST4970450505192.168.2.55.42.66.10
                              Apr 24, 2024 09:05:03.379144907 CEST50505497045.42.66.10192.168.2.5
                              Apr 24, 2024 09:05:03.423161983 CEST4970450505192.168.2.55.42.66.10

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:04:55
                              Start date:24/04/2024
                              Path:C:\Users\user\Desktop\file.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\file.exe"
                              Imagebase:0xea0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:false

                              Target ID:2
                              Start time:09:04:57
                              Start date:24/04/2024
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
                              Imagebase:0xd30000
                              File size:187'904 bytes
                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:09:04:57
                              Start date:24/04/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:09:04:57
                              Start date:24/04/2024
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST
                              Imagebase:0xd30000
                              File size:187'904 bytes
                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:09:04:57
                              Start date:24/04/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:09:04:58
                              Start date:24/04/2024
                              Path:C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
                              Wow64 process (32bit):true
                              Commandline:C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
                              Imagebase:0xd70000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 63%, ReversingLabs
                              • Detection: 74%, Virustotal, Browse
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:09:04:59
                              Start date:24/04/2024
                              Path:C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
                              Wow64 process (32bit):true
                              Commandline:C:\ProgramData\WinTrackerSP\WinTrackerSP.exe
                              Imagebase:0xd70000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:09:05:09
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
                              Imagebase:0x1a0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 63%, ReversingLabs
                              • Detection: 74%, Virustotal, Browse
                              Reputation:low
                              Has exited:true

                              Target ID:11
                              Start time:09:05:10
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
                              Imagebase:0x1a0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:13
                              Start time:09:05:17
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
                              Imagebase:0x1a0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:15
                              Start time:09:05:18
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\ExtreamFanV5\ExtreamFanV5.exe"
                              Imagebase:0x1a0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:16
                              Start time:09:05:25
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe"
                              Imagebase:0x4c0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 63%, ReversingLabs
                              • Detection: 74%, Virustotal, Browse
                              Reputation:low
                              Has exited:true

                              Target ID:18
                              Start time:09:05:26
                              Start date:24/04/2024
                              Path:C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\PowerExpertNT\PowerExpertNT.exe"
                              Imagebase:0x4c0000
                              File size:5'857'792 bytes
                              MD5 hash:2019322EA56C5B80294770F6018BDDC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Reset < >
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3271616619.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                                • Associated: 00000000.00000002.3271597881.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271699313.0000000000F27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271713510.0000000000F2A000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271744604.0000000000F4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271768108.0000000000F55000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.00000000017EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.000000000181A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                                Similarity
                                • API ID:
                                • String ID: 5.42.66.10$50505
                                • API String ID: 0-2257907482
                                • Opcode ID: 2a644ad97705dcb2cceb00db5b180263c7b57c3b3b5d181857f793e6d7612f79
                                • Instruction ID: c1ff9c11ff08e4f1988a9005b2c6ef4280e5dc918646fcd0a2f2793e43bb2716
                                • Opcode Fuzzy Hash: 2a644ad97705dcb2cceb00db5b180263c7b57c3b3b5d181857f793e6d7612f79
                                • Instruction Fuzzy Hash: C8F0B474A002089BCB01EFB8D812A9E7BF5DF45324F205258E5186F3D1DB715E019FD1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.3271616619.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                                • Associated: 00000000.00000002.3271597881.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271699313.0000000000F27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271713510.0000000000F2A000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271744604.0000000000F4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271768108.0000000000F55000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.00000000017EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.000000000181A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 12af8222340682843f12a61e727801c54e83ce9a6374af53a67abca88ee753a4
                                • Instruction ID: a686e82c18e19ed9a7f2905067d490ae738cee56e9588accf9b158beda2a09f6
                                • Opcode Fuzzy Hash: 12af8222340682843f12a61e727801c54e83ce9a6374af53a67abca88ee753a4
                                • Instruction Fuzzy Hash: 1D012670904345AAD630ABA89C47F593268E70AB34F240314B1307A6F0D3FE6442DB53
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.3271616619.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                                • Associated: 00000000.00000002.3271597881.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271675372.0000000000F0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271699313.0000000000F27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271713510.0000000000F2A000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271744604.0000000000F4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3271768108.0000000000F55000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.00000000017EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3272486169.000000000181A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 001132032f36c2a1ceb2f91d7c48a9e30744c8488491816b5ca42b1a89ec3d8f
                                • Instruction ID: 982d3b9fcc24e01afb76d3835d3d37555ec0bf6f244793c8ff6216eff2758fd4
                                • Opcode Fuzzy Hash: 001132032f36c2a1ceb2f91d7c48a9e30744c8488491816b5ca42b1a89ec3d8f
                                • Instruction Fuzzy Hash: 35E04F70D40308BFDB54EF94C886BEDBBB8AB09700F10C1A9F909AB2C0D7B057448B95
                                Uniqueness

                                Uniqueness Score: -1.00%