Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
reset.exe

Overview

General Information

Sample name:reset.exe
Analysis ID:1628819
MD5:6a5f3230a1256c3a71744caedf7d92c8
SHA1:66a090d8f54df6a877e08d9b7a3e4c8fad840dd9
SHA256:0af17fce3bccc8c202b23b3b3e6275ea1d23678e0a615ee566a496f909f1e819
Tags:exegithubuser-skocherhan
Infos:

Detection

AveMaria, Clipboard Hijacker, StormKitty
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AveMaria stealer
Yara detected Clipboard Hijacker
Yara detected StormKitty Stealer
Check if machine is in data center or colocation facility
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • reset.exe (PID: 3868 cmdline: "C:\Users\user\Desktop\reset.exe" MD5: 6A5F3230A1256C3A71744CAEDF7D92C8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
reset.exeMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
  • 0x45a28:$x2: https://github.com/LimerBoy/StormKitty
  • 0x44875:$x3: StormKitty
  • 0x453c1:$x3: StormKitty
  • 0x45a18:$x3: StormKitty
  • 0x45a44:$x3: StormKitty
SourceRuleDescriptionAuthorStrings
00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
  • 0x671f9:$x2: https://github.com/LimerBoy/StormKitty
  • 0x23ac:$x3: StormKitty
  • 0x65338:$x3: StormKitty
  • 0x671e9:$x3: StormKitty
  • 0x67215:$x3: StormKitty
00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
    00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Clipboard_Hijacker_4Yara detected Clipboard HijackerJoe Security
        00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
          Click to see the 6 entries
          SourceRuleDescriptionAuthorStrings
          4.2.reset.exe.3bf0000.1.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
          • 0x671f9:$x2: https://github.com/LimerBoy/StormKitty
          • 0x23ac:$x3: StormKitty
          • 0x65338:$x3: StormKitty
          • 0x671e9:$x3: StormKitty
          • 0x67215:$x3: StormKitty
          4.2.reset.exe.3bf0000.1.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
          • 0x643f9:$x2: https://github.com/LimerBoy/StormKitty
          • 0x5ac:$x3: StormKitty
          • 0x62538:$x3: StormKitty
          • 0x643e9:$x3: StormKitty
          • 0x64415:$x3: StormKitty
          4.0.reset.exe.d20000.0.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
          • 0x45a28:$x2: https://github.com/LimerBoy/StormKitty
          • 0x44875:$x3: StormKitty
          • 0x453c1:$x3: StormKitty
          • 0x45a18:$x3: StormKitty
          • 0x45a44:$x3: StormKitty
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-04T06:36:31.932315+010020449651A Network Trojan was detected192.168.2.749720185.199.111.133443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-04T06:36:31.932315+010028033053Unknown Traffic192.168.2.749720185.199.111.133443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: reset.exeAvira: detected
          Source: reset.exeReversingLabs: Detection: 71%
          Source: reset.exeVirustotal: Detection: 41%Perma Link
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
          Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.7:49703 version: TLS 1.2
          Source: reset.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2044965 - Severity 1 - ET MALWARE StormKitty Download Request With Minimal Headers : 192.168.2.7:49720 -> 185.199.111.133:443
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
          Source: Joe Sandbox ViewIP Address: 185.199.111.133 185.199.111.133
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: ip-api.com
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49720 -> 185.199.111.133:443
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com
          Source: global trafficHTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: ip-api.com
          Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 6BCD:277C4A:105DC62:14E74B7:67C6915CAccept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:29 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740038-EWRX-Cache: MISSX-Cache-Hits: 0X-Timer: S1741066589.042105,VS0,VE35Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: d1a75b155f60981db1539cfdb3ccd4dd71195e0bExpires: Tue, 04 Mar 2025 05:41:29 GMTSource-Age: 0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 6BCD:277C4A:105DC62:14E74B7:67C6915CAccept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:31 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740066-EWRX-Cache: HITX-Cache-Hits: 1X-Timer: S1741066592.884539,VS0,VE1Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: d42d2c2d001e44aa219c35540b552f5bc68000a1Expires: Tue, 04 Mar 2025 05:41:31 GMTSource-Age: 3
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 79A4:1E905F:CBE4C0:100D8DD:67C69160Accept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:34 GMTVia: 1.1 varnishX-Served-By: cache-nyc-kteb1890028-NYCX-Cache: MISSX-Cache-Hits: 0X-Timer: S1741066595.730012,VS0,VE11Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: e2d3020ccd9622e2210fff2d654f7df3933c0eebExpires: Tue, 04 Mar 2025 05:41:34 GMTSource-Age: 0
          Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
          Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=h
          Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
          Source: reset.exe, 00000004.00000002.3760159304.0000000004514000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004536000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004587000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com
          Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: reset.exeString found in binary or memory: https://github.com/LimerBoy/StormKitty
          Source: reset.exe, 00000004.00000002.3760159304.0000000004501000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004536000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004587000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/AnonFileApi.1.
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.7:49703 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR

          System Summary

          barindex
          Source: reset.exe, type: SAMPLEMatched rule: Detects StormKitty infostealer Author: ditekSHen
          Source: 4.2.reset.exe.3bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
          Source: 4.2.reset.exe.3bf0000.1.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
          Source: 4.0.reset.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
          Source: 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects StormKitty infostealer Author: ditekSHen
          Source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
          Source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
          Source: C:\Users\user\Desktop\reset.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C05684_2_00007FFAAC7C0568
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C76F84_2_00007FFAAC7C76F8
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C089D4_2_00007FFAAC7C089D
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C78E54_2_00007FFAAC7C78E5
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C05004_2_00007FFAAC7C0500
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7CB6614_2_00007FFAAC7CB661
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C7AB34_2_00007FFAAC7C7AB3
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C77894_2_00007FFAAC7C7789
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C7C8F4_2_00007FFAAC7C7C8F
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7CB4B54_2_00007FFAAC7CB4B5
          Source: C:\Users\user\Desktop\reset.exeCode function: 4_2_00007FFAAC7C8CAE4_2_00007FFAAC7C8CAE
          Source: reset.exeStatic PE information: No import functions for PE file found
          Source: reset.exe, 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameStormKitty.exe* vs reset.exe
          Source: reset.exeBinary or memory string: OriginalFilenameStormKitty.exe* vs reset.exe
          Source: reset.exe, type: SAMPLEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
          Source: 4.2.reset.exe.3bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
          Source: 4.2.reset.exe.3bf0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
          Source: 4.0.reset.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
          Source: 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
          Source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
          Source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
          Source: reset.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@2/2
          Source: C:\Users\user\Desktop\reset.exeFile created: C:\Users\user\AppData\Local\4e1609b1a476f5f88480b1697eb8b336Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeMutant created: NULL
          Source: C:\Users\user\Desktop\reset.exeMutant created: \Sessions\1\BaseNamedObjects\09B668B429A4BF3829B4833B450D1584
          Source: C:\Users\user\Desktop\reset.exeFile created: C:\Users\user\AppData\Local\Temp\StormKitty-Latest.logJump to behavior
          Source: reset.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: reset.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: reset.exeReversingLabs: Detection: 71%
          Source: reset.exeVirustotal: Detection: 41%
          Source: C:\Users\user\Desktop\reset.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\reset.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: reset.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: reset.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: reset.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: reset.exeStatic PE information: section name: .text entropy: 7.986615672208267
          Source: C:\Users\user\Desktop\reset.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\reset.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: reset.exe, 00000004.00000002.3760159304.00000000044F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\reset.exeMemory allocated: 1690000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\reset.exeMemory allocated: 1C070000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599859Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599738Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599616Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599500Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599400Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599284Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599153Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599030Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598914Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598798Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598682Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598566Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598428Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598297Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598181Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598065Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597927Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597795Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597679Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597563Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597448Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597297Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597089Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596726Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596334Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596197Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596072Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595958Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595824Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595702Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595586Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595470Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595343Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595238Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595100Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594992Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594884Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594768Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594648Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594536Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594398Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594282Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594166Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594050Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593919Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593796Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593680Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593564Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593448Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593332Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593194Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593078Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeWindow / User API: threadDelayed 2858Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeWindow / User API: threadDelayed 6934Jump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -28592453314249787s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599859s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599738s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599616s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599400s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599284s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599153s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -599030s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598914s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598798s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598682s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598566s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598428s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598297s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598181s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -598065s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597927s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597795s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597679s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597563s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597448s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597297s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -597089s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -596726s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -596334s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -596197s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -596072s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595958s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595824s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595702s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595586s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595470s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595343s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595238s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -595100s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594992s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594884s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594768s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594648s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594536s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594398s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594282s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594166s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -594050s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593919s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593796s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593680s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593564s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593448s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593332s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593194s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exe TID: 7456Thread sleep time: -593078s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599859Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599738Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599616Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599500Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599400Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599284Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599153Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 599030Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598914Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598798Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598682Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598566Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598428Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598297Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598181Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 598065Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597927Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597795Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597679Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597563Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597448Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597297Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 597089Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596726Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596334Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596197Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 596072Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595958Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595824Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595702Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595586Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595470Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595343Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595238Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 595100Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594992Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594884Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594768Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594648Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594536Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594398Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594282Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594166Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 594050Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593919Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593796Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593680Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593564Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593448Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593332Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593194Jump to behavior
          Source: C:\Users\user\Desktop\reset.exeThread delayed: delay time: 593078Jump to behavior
          Source: reset.exe, 00000004.00000002.3760159304.00000000044F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: reset.exe, 00000004.00000002.3760159304.00000000044F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachine:
          Source: reset.exe, 00000004.00000002.3765243949.000000001EE90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\reset.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\reset.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\reset.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\reset.exeQueries volume information: C:\Users\user\Desktop\reset.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\reset.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx5
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\keystore
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Coinomi\Coinomi\wallets
          Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\keystore
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          Source: Yara matchFile source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Masquerading
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory331
          Security Software Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)161
          Virtualization/Sandbox Evasion
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS161
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture4
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Software Packing
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials1
          System Network Configuration Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync23
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.