Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe

Overview

General Information

Sample name:1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe
Analysis ID:1547388
MD5:fccff79af62a4c34fdf4afb410fbaf86
SHA1:7fc71ef7fb4aa436b93ec4b6a825fee64501460f
SHA256:a16dfd5a9f62ca6480568f9e3e6a9a0b070cb5a82029dbad87a8df4823f8c371
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["https://pastebin.com/raw/juxAi7cy"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeJoeSecurity_XWormYara detected XWormJoe Security
    1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x79a5:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7a42:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7b57:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x7653:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x77a5:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x7842:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x7957:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x7453:$cnc4: POST / HTTP/1.1
      00000000.00000002.4280447826.0000000002D3B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x79a5:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x7a42:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x7b57:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x7653:$cnc4: POST / HTTP/1.1
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-02T09:46:54.450305+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449734TCP
              2024-11-02T09:47:33.992843+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449801TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-02T09:46:45.468600+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:46:51.281857+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:02.638712+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:14.003593+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:15.483464+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:25.369955+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:36.785553+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:45.500398+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:47.666695+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:48.323022+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:48.489777+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:54.089537+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:05.567856+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:14.388900+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:15.493014+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:16.252399+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:16.432523+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:16.549728+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:21.934566+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:21.977994+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:22.010530+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:22.040185+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:22.102892+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:22.176588+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:24.042641+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:31.152658+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:42.514271+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:43.260658+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:45.503527+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:45.718880+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:47.919811+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.310449+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.415365+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.446689+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.462493+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.477100+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:53.607633+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:02.314755+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:05.854635+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.198985+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.229562+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.243614+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.260537+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.276243+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.290882+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.322051+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.365079+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:09.430185+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:15.515990+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:15.726865+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.605415+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.634300+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.650048+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.681243+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.696860+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:20.772755+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:27.948557+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:32.640255+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:38.363906+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:43.342252+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:45.528451+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:53.498091+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:53.534715+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:53.664794+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:04.886950+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:05.572810+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:11.888327+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:13.963650+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:15.535232+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:19.216722+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:20.370572+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.698788+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.760679+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.837743+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.875874+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.900348+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.962888+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:25.995026+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:26.032092+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:26.058848+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:26.137541+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:27.684890+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:34.784158+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:36.324614+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:36.491264+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:38.933369+010028528701Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-02T09:46:51.283433+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:02.641724+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:14.005339+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:25.425375+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:36.788004+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:47.670016+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:48.325347+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:48.494002+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:47:54.092083+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:05.578766+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:14.391412+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:16.254907+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:16.435674+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:16.551773+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:21.936632+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:21.981742+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:22.012148+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:22.041887+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:22.105117+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:22.178334+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:24.044561+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:31.157300+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:42.519734+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:43.270955+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:47.922380+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.312711+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.417255+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.448328+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.464068+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.478698+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:48:53.609478+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:02.328385+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:05.860386+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.202409+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.231362+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.245207+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.262224+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.277872+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.292599+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.323844+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.367467+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.402373+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.430241+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:09.482984+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.609215+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.636597+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.653513+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.683222+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.698291+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:20.775989+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:27.960537+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:32.642168+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:38.374038+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:43.348440+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:53.500994+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:53.540576+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:49:53.666492+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:04.889010+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:05.574740+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:11.890660+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:13.971102+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:19.218627+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:20.372212+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.762049+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.839652+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.877934+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.901711+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.967125+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:25.997186+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:26.033402+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:26.062402+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:26.139294+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:27.692145+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:34.790455+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:36.328572+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:36.494527+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              2024-11-02T09:50:38.934274+010028529231Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-02T09:46:45.468600+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:15.483464+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:47:45.500398+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:15.493014+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:45.503527+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:48:45.718880+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:15.515990+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:15.726865+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:49:45.528451+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              2024-11-02T09:50:15.535232+010028528741Malware Command and Control Activity Detected45.15.158.1126767192.168.2.449733TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-02T09:48:42.964466+010028531931Malware Command and Control Activity Detected192.168.2.44973345.15.158.1126767TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeAvira: detected
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMalware Configuration Extractor: Xworm {"C2 url": ["https://pastebin.com/raw/juxAi7cy"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeReversingLabs: Detection: 81%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeJoe Sandbox ML: detected
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeString decryptor: https://pastebin.com/raw/juxAi7cy
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeString decryptor: <123456789>
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeString decryptor: <Xwormmm>
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeString decryptor: RAGNOROK54
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeString decryptor: USB.exe
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 45.15.158.112:6767 -> 192.168.2.4:49733
              Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 45.15.158.112:6767 -> 192.168.2.4:49733
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49733 -> 45.15.158.112:6767
              Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49733 -> 45.15.158.112:6767
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49733 -> 45.15.158.112:6767
              Source: Malware configuration extractorURLs: https://pastebin.com/raw/juxAi7cy
              Source: unknownDNS query: name: pastebin.com
              Source: global trafficTCP traffic: 192.168.2.4:49733 -> 45.15.158.112:6767
              Source: global trafficHTTP traffic detected: GET /raw/juxAi7cy HTTP/1.1Host: pastebin.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49734
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49801
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: unknownTCP traffic detected without corresponding DNS query: 45.15.158.112
              Source: global trafficHTTP traffic detected: GET /raw/juxAi7cy HTTP/1.1Host: pastebin.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: pastebin.com
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, 00000000.00000002.4280447826.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, 00000000.00000002.4280447826.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/juxAi7cy
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49732 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, XLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeCode function: 0_2_00007FFD9B5584320_2_00007FFD9B558432
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeCode function: 0_2_00007FFD9B5576860_2_00007FFD9B557686
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeCode function: 0_2_00007FFD9B555E5D0_2_00007FFD9B555E5D
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, 00000000.00000000.1835847139.000000000099C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestevenrag.exe4 vs 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeBinary or memory string: OriginalFilenamestevenrag.exe4 vs 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Settings.csBase64 encoded string: '/qdUqPdORjnt8HpCFOzHxMSZ7Zy1f+mX0VWMer+SWEMyRkbGVDf7RK8t3+F0rh7d'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/2
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMutant created: NULL
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\aq3Fac3Pq9GHgZuk
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeReversingLabs: Detection: 81%
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, Messages.cs.Net Code: Memory

              Boot Survival

              barindex
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMemory allocated: 1ACF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeWindow / User API: threadDelayed 2188Jump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeWindow / User API: threadDelayed 7652Jump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe TID: 7148Thread sleep time: -18446744073709540s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe TID: 4836Thread sleep count: 2188 > 30Jump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe TID: 4836Thread sleep count: 7652 > 30Jump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, 00000000.00000002.4279880982.0000000000E46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR
              Source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, 00000000.00000002.4281796957.000000001B50F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4280447826.0000000002D3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe.990000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1835826411.0000000000992000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4280447826.0000000002D3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exe PID: 6760, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Disable or Modify Tools
              1
              Input Capture
              1
              Query Registry
              Remote Services1
              Input Capture
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              LSASS Memory121
              Security Software Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Obfuscated Files or Information
              NTDS131
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
              Software Packing
              LSA Secrets1
              Application Window Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input Capture13
              Application Layer Protocol
              Data Transfer Size LimitsService Stop

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.