Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RtU8kXPnKr.exe

Overview

General Information

Sample name:RtU8kXPnKr.exe
renamed because original name is a hash value
Original sample name:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313.exe
Analysis ID:1582627
MD5:9ea49e8b67bf4eb173682c84c4a4f472
SHA1:7e328600053285468f4dd7c302cdc00d3a75ae89
SHA256:720eea739bd033b804b98c0190b06d864dd61053aab14cb19d1c56d390686313
Tags:exeuser-zhuzhu0009
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Quasar RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • RtU8kXPnKr.exe (PID: 504 cmdline: "C:\Users\user\Desktop\RtU8kXPnKr.exe" MD5: 9EA49E8B67BF4EB173682C84C4A4F472)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.2.0.0", "Host:Port": "180.100.217.219:8092;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "QSR_MUTEX_miqqcB3y3GjXPlDBqC", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs"}
SourceRuleDescriptionAuthorStrings
RtU8kXPnKr.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    RtU8kXPnKr.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      RtU8kXPnKr.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
      • 0x32b36:$a1: GetKeyloggerLogsResponse
      • 0x38eb3:$a2: DoDownloadAndExecute
      • 0x3e66c:$a3: http://api.ipify.org/
      • 0x3d1d3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
      RtU8kXPnKr.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3338a:$s1: DoUploadAndExecute
      • 0x38eb3:$s2: DoDownloadAndExecute
      • 0x33158:$s3: DoShellExecute
      • 0x33582:$s4: set_Processname
      • 0xf65c:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0xf580:$op2: 00 17 03 1F 20 17 19 15 28
      • 0xffed:$op3: 00 04 03 69 91 1B 40
      • 0x1084c:$op3: 00 04 03 69 91 1B 40
      RtU8kXPnKr.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x32b36:$x1: GetKeyloggerLogsResponse
      • 0x32dc7:$s1: DoShellExecuteResponse
      • 0x2cb00:$s2: GetPasswordsResponse
      • 0x32c9a:$s3: GetStartupItemsResponse
      • 0x28e98:$s4: <GetGenReader>b__7
      • 0x3339e:$s5: RunHidden
      • 0x333bc:$s5: RunHidden
      • 0x333ca:$s5: RunHidden
      • 0x333de:$s5: RunHidden
      Click to see the 6 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
          • 0x32936:$a1: GetKeyloggerLogsResponse
          • 0x38cb3:$a2: DoDownloadAndExecute
          • 0x3e46c:$a3: http://api.ipify.org/
          • 0x3cfd3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
          • 0x3318a:$s1: DoUploadAndExecute
          • 0x38cb3:$s2: DoDownloadAndExecute
          • 0x32f58:$s3: DoShellExecute
          • 0x33382:$s4: set_Processname
          • 0xf45c:$op1: 04 1E FE 02 04 16 FE 01 60
          • 0xf380:$op2: 00 17 03 1F 20 17 19 15 28
          • 0xfded:$op3: 00 04 03 69 91 1B 40
          • 0x1064c:$op3: 00 04 03 69 91 1B 40
          00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
          • 0x3c343:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
          • 0x3cf8e:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
          • 0x3107e:$class: Core.MouseKeyHook.WinApi
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.RtU8kXPnKr.exe.fb0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            0.0.RtU8kXPnKr.exe.fb0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
              • 0x32b36:$a1: GetKeyloggerLogsResponse
              • 0x38eb3:$a2: DoDownloadAndExecute
              • 0x3e66c:$a3: http://api.ipify.org/
              • 0x3d1d3:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
              • 0x3338a:$s1: DoUploadAndExecute
              • 0x38eb3:$s2: DoDownloadAndExecute
              • 0x33158:$s3: DoShellExecute
              • 0x33582:$s4: set_Processname
              • 0xf65c:$op1: 04 1E FE 02 04 16 FE 01 60
              • 0xf580:$op2: 00 17 03 1F 20 17 19 15 28
              • 0xffed:$op3: 00 04 03 69 91 1B 40
              • 0x1084c:$op3: 00 04 03 69 91 1B 40
              0.0.RtU8kXPnKr.exe.fb0000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
              • 0x32b36:$x1: GetKeyloggerLogsResponse
              • 0x32dc7:$s1: DoShellExecuteResponse
              • 0x2cb00:$s2: GetPasswordsResponse
              • 0x32c9a:$s3: GetStartupItemsResponse
              • 0x28e98:$s4: <GetGenReader>b__7
              • 0x3339e:$s5: RunHidden
              • 0x333bc:$s5: RunHidden
              • 0x333ca:$s5: RunHidden
              • 0x333de:$s5: RunHidden
              Click to see the 6 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T06:13:54.138624+010028140311A Network Trojan was detected192.168.2.64970888.198.193.21380TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T06:13:56.888680+010028140301A Network Trojan was detected192.168.2.6497123.33.130.19080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: RtU8kXPnKr.exeAvira: detected
              Source: RtU8kXPnKr.exeMalware Configuration Extractor: Quasar {"Version": "1.2.0.0", "Host:Port": "180.100.217.219:8092;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "QSR_MUTEX_miqqcB3y3GjXPlDBqC", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs"}
              Source: RtU8kXPnKr.exeReversingLabs: Detection: 78%
              Source: RtU8kXPnKr.exeVirustotal: Detection: 73%Perma Link
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: RtU8kXPnKr.exeJoe Sandbox ML: detected
              Source: RtU8kXPnKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 88.198.193.213:443 -> 192.168.2.6:49710 version: TLS 1.0
              Source: RtU8kXPnKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2814031 - Severity 1 - ETPRO MALWARE W32/Quasar RAT Connectivity Check : 192.168.2.6:49708 -> 88.198.193.213:80
              Source: Network trafficSuricata IDS: 2814030 - Severity 1 - ETPRO MALWARE W32/Quasar RAT Connectivity Check 2 : 192.168.2.6:49712 -> 3.33.130.190:80
              Source: Malware configuration extractorURLs: 180.100.217.219
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.6:49714 -> 180.100.217.219:8092
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 88.198.193.213 88.198.193.213
              Source: Joe Sandbox ViewASN Name: CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: freegeoip.net
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 88.198.193.213:443 -> 192.168.2.6:49710 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: unknownTCP traffic detected without corresponding DNS query: 180.100.217.219
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: www.telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: telize.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: freegeoip.netConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: telize.com
              Source: global trafficDNS traffic detected: DNS query: www.telize.com
              Source: global trafficDNS traffic detected: DNS query: freegeoip.net
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
              Source: RtU8kXPnKr.exeString found in binary or memory: http://api.ipify.org/3
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.net
              Source: RtU8kXPnKr.exeString found in binary or memory: http://freegeoip.net/xml/
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003354000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://telize.com
              Source: RtU8kXPnKr.exeString found in binary or memory: http://telize.com/geoip
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.0000000003384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.telize.com
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.telize.com
              Source: RtU8kXPnKr.exe, 00000000.00000002.4558083257.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.telize.com/geoip
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\RtU8kXPnKr.exeJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR

              System Summary

              barindex
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317A2880_2_0317A288
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_031799B80_2_031799B8
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_031796700_2_03179670
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06E4E2D00_2_06E4E2D0
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF69F80_2_06EF69F8
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF00400_2_06EF0040
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_06EF00060_2_06EF0006
              Source: RtU8kXPnKr.exe, 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe4 vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exe, 00000000.00000002.4559545450.0000000006E19000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exeBinary or memory string: OriginalFilenameClient.exe4 vs RtU8kXPnKr.exe
              Source: RtU8kXPnKr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: RtU8kXPnKr.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: RtU8kXPnKr.exe, ----.csBase64 encoded string: 'OQHreK390wg9S1emghPyaWNxW+rNmoL7DPKLQW+ZoPtaD4ifpl8iq1aqdl7w0X4R'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@4/4
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeFile created: C:\Users\user\AppData\Roaming\LogsJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutant created: NULL
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_miqqcB3y3GjXPlDBqC
              Source: RtU8kXPnKr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: RtU8kXPnKr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RtU8kXPnKr.exeReversingLabs: Detection: 78%
              Source: RtU8kXPnKr.exeVirustotal: Detection: 73%
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: RtU8kXPnKr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: RtU8kXPnKr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317A7BD pushfd ; iretd 0_2_0317A7D2
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_03177068 pushad ; ret 0_2_03177069
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317709B pushad ; ret 0_2_03177069

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeFile opened: C:\Users\user\Desktop\RtU8kXPnKr.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 3130000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: 52E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindow / User API: threadDelayed 7840Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeWindow / User API: threadDelayed 1977Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2264Thread sleep count: 36 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2264Thread sleep time: -33204139332677172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2100Thread sleep count: 7840 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exe TID: 2100Thread sleep count: 1977 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RtU8kXPnKr.exe, 00000000.00000002.4557322515.000000000168E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeCode function: 0_2_0317DF18 LdrInitializeThunk,0_2_0317DF18
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Users\user\Desktop\RtU8kXPnKr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\RtU8kXPnKr.exeMutex created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_miqqcB3y3GjXPlDBqCJump to behavior
              Source: Yara matchFile source: RtU8kXPnKr.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RtU8kXPnKr.exe.fb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4558083257.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2097498649.0000000000FB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RtU8kXPnKr.exe PID: 504, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Masquerading
              11
              Input Capture
              1
              Query Registry
              Remote Services11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory1
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Hidden Files and Directories
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Obfuscated Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials12
              System Information Discovery
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.