Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Skambenets.exe

Overview

General Information

Sample name:Skambenets.exe
Analysis ID:1629090
MD5:0519c157d2d7450690a1cef20ea51e8f
SHA1:bfe39774f356f799bd74649330ab7baecb95c052
SHA256:7dca3dbf4a0d99e7c86edafb83698994e9f89d2ec51de988f0f8c7ec54e4f81b
Tags:exeuser-lowmal3
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Skambenets.exe (PID: 4392 cmdline: "C:\Users\user\Desktop\Skambenets.exe" MD5: 0519C157D2D7450690A1CEF20EA51E8F)
    • Skambenets.exe (PID: 2144 cmdline: "C:\Users\user\Desktop\Skambenets.exe" MD5: 0519C157D2D7450690A1CEF20EA51E8F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.3382525922.0000000001810000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.2409362528.00000000049B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-04T11:44:49.660363+010028032702Potentially Bad Traffic192.168.2.64999064.227.9.22880TCP
      2025-03-04T11:45:48.364260+010028032702Potentially Bad Traffic192.168.2.64988264.227.9.22880TCP
      2025-03-04T11:46:09.850930+010028032702Potentially Bad Traffic192.168.2.64998464.227.9.22880TCP
      2025-03-04T11:46:31.363332+010028032702Potentially Bad Traffic192.168.2.64998664.227.9.22880TCP
      2025-03-04T11:46:52.849789+010028032702Potentially Bad Traffic192.168.2.64998864.227.9.22880TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Skambenets.exeVirustotal: Detection: 36%Perma Link
      Source: Skambenets.exeReversingLabs: Detection: 23%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: Skambenets.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_0040276E FindFirstFileW,5_2_0040276E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405770
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_0040622B FindFirstFileW,FindClose,5_2_0040622B
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49984 -> 64.227.9.228:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49988 -> 64.227.9.228:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49882 -> 64.227.9.228:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49986 -> 64.227.9.228:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49990 -> 64.227.9.228:80
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: unknownTCP traffic detected without corresponding DNS query: 64.227.9.228
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /YHVeQtjrpzsrPH13.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: 64.227.9.228Cache-Control: no-cache
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.22
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bin
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bin$
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bin)
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bin3
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.binD2W
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.binH?
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.binM2
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bin_2.
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.binhqos.dll.mui
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/YHVeQtjrpzsrPH13.bint?
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.228/t
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://64.227.9.?
      Source: Skambenets.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_00403358
      Source: C:\Users\user\Desktop\Skambenets.exeFile created: C:\Windows\resources\Bementite.iniJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00404B0E0_2_00404B0E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040653D0_2_0040653D
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_00404B0E5_2_00404B0E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_0040653D5_2_0040653D
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: String function: 00402B38 appears 47 times
      Source: Skambenets.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal68.troj.evad.winEXE@3/9@0/1
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
      Source: C:\Users\user\Desktop\Skambenets.exeFile created: C:\Users\user\AppData\Roaming\RigsantikvarernesJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeFile created: C:\Users\user\AppData\Local\Temp\nsvDE5B.tmpJump to behavior
      Source: Skambenets.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Skambenets.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Skambenets.exeVirustotal: Detection: 36%
      Source: Skambenets.exeReversingLabs: Detection: 23%
      Source: C:\Users\user\Desktop\Skambenets.exeFile read: C:\Users\user\Desktop\Skambenets.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Skambenets.exe "C:\Users\user\Desktop\Skambenets.exe"
      Source: C:\Users\user\Desktop\Skambenets.exeProcess created: C:\Users\user\Desktop\Skambenets.exe "C:\Users\user\Desktop\Skambenets.exe"
      Source: C:\Users\user\Desktop\Skambenets.exeProcess created: C:\Users\user\Desktop\Skambenets.exe "C:\Users\user\Desktop\Skambenets.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000005.00000002.3382525922.0000000001810000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2409362528.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_10002DB0 push eax; ret 0_2_10002DDE
      Source: C:\Users\user\Desktop\Skambenets.exeFile created: C:\Users\user\AppData\Local\Temp\nsq4F0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Skambenets.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\Skambenets.exeAPI/Special instruction interceptor: Address: 517E9F8
      Source: C:\Users\user\Desktop\Skambenets.exeAPI/Special instruction interceptor: Address: 1FDE9F8
      Source: C:\Users\user\Desktop\Skambenets.exeRDTSC instruction interceptor: First address: 5142E65 second address: 5142E65 instructions: 0x00000000 rdtsc 0x00000002 test ch, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F9195211484h 0x00000008 cmp dh, bh 0x0000000a inc ebp 0x0000000b cmp eax, ebx 0x0000000d inc ebx 0x0000000e rdtsc
      Source: C:\Users\user\Desktop\Skambenets.exeRDTSC instruction interceptor: First address: 1FA2E65 second address: 1FA2E65 instructions: 0x00000000 rdtsc 0x00000002 test ch, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F919474F2D4h 0x00000008 cmp dh, bh 0x0000000a inc ebp 0x0000000b cmp eax, ebx 0x0000000d inc ebx 0x0000000e rdtsc
      Source: C:\Users\user\Desktop\Skambenets.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsq4F0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Skambenets.exe TID: 380Thread sleep time: -40000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_0040276E FindFirstFileW,5_2_0040276E
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405770
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 5_2_0040622B FindFirstFileW,FindClose,5_2_0040622B
      Source: Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmp, Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\Skambenets.exeAPI call chain: ExitProcess graph end nodegraph_0-4483
      Source: C:\Users\user\Desktop\Skambenets.exeAPI call chain: ExitProcess graph end nodegraph_0-4487
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Users\user\Desktop\Skambenets.exeProcess created: C:\Users\user\Desktop\Skambenets.exe "C:\Users\user\Desktop\Skambenets.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Skambenets.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Skambenets.exe36%VirustotalBrowse
      Skambenets.exe24%ReversingLabs
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsq4F0.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://64.220%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bint?0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin)0%Avira URL Cloudsafe
      http://64.227.9.?0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin30%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.binH?0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.binhqos.dll.mui0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.binD2W0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.binM20%Avira URL Cloudsafe
      http://64.227.9.228/t0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin_2.0%Avira URL Cloudsafe
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin$0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://64.227.9.228/YHVeQtjrpzsrPH13.binfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin)Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.binH?Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.bint?Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.22Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.?Skambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.bin3Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.binhqos.dll.muiSkambenets.exe, 00000005.00000002.3384055544.0000000002DCE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.binD2WSkambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/YHVeQtjrpzsrPH13.binM2Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://64.227.9.228/tSkambenets.exe, 00000005.00000002.3384055544.0000000002DCA000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorSkambenets.exefalse
        high
        http://64.227.9.228/YHVeQtjrpzsrPH13.bin_2.Skambenets.exe, 00000005.00000002.3384055544.0000000002DB5000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://64.227.9.228/YHVeQtjrpzsrPH13.bin$Skambenets.exe, 00000005.00000002.3384055544.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        64.227.9.228
        unknownUnited States
        14061DIGITALOCEAN-ASNUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1629090
        Start date and time:2025-03-04 11:44:00 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 35s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Skambenets.exe
        Detection:MAL
        Classification:mal68.troj.evad.winEXE@3/9@0/1
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 90%
        • Number of executed functions: 49
        • Number of non-executed functions: 79
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.60, 52.149.20.212
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target Skambenets.exe, PID 2144 because there are no executed function
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        05:44:55API Interceptor4485x Sleep call for process: Skambenets.exe modified
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        DIGITALOCEAN-ASNUSm68k.elfGet hashmaliciousMirai, MoobotBrowse
        • 157.230.220.223
        Setup.exeGet hashmaliciousUnknownBrowse
        • 64.227.17.224
        Setup.exeGet hashmaliciousUnknownBrowse
        • 167.99.235.203
        https://7.gigafile.nu/0309-f27868aadd4ea0f32c72df3bc274aed5Get hashmaliciousUnknownBrowse
        • 134.122.57.34
        nklx86.elfGet hashmaliciousUnknownBrowse
        • 134.123.157.223
        nabppc.elfGet hashmaliciousUnknownBrowse
        • 134.209.1.68
        mips.elfGet hashmaliciousUnknownBrowse
        • 162.243.214.185
        nabarm.elfGet hashmaliciousUnknownBrowse
        • 207.154.222.253
        zerarm7.elfGet hashmaliciousUnknownBrowse
        • 46.101.69.129
        zersh4.elfGet hashmaliciousUnknownBrowse
        • 46.101.69.129
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsq4F0.tmp\System.dllMarcom Trade SS-04665.exeGet hashmaliciousRemcos, GuLoaderBrowse
          Hermaean.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
            SecuriteInfo.com.FileRepMalware.23885.29286.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
              SecuriteInfo.com.FileRepMalware.24375.4894.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                OqqrLiFWKC.exeGet hashmaliciousMindsparkBrowse
                  Factura Honorarios 2024-11-04.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                    EL GINER.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      u9aPQQIwhj.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          whatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1134748
                            Entropy (8bit):4.395183120055972
                            Encrypted:false
                            SSDEEP:6144:gTrjoP9mczaRwF0911Ezy3ql9+mPTyuJa75rJBnTD6pcSYyKMMnpfRdlLV2/eMU6:gTrjaMwF0911BCpu5rLnTDWUUdQ+
                            MD5:0DBC981E198B16B3A75F86623EB5AF0C
                            SHA1:389A5F638F29D0E0B1D21A1F623F545EBEC03F63
                            SHA-256:32D399D7806AE3C9589F9AA4A29B5FE2516603039A470F18299AD49B160D2B11
                            SHA-512:748DB6DC3448CAE8547EAF00CC9C29132430B76BCB49DB05B57A775189B90FBE581D7EEC78ADAC4A7491876D39CB0267AC49BC4282161BDFB3CBAC3DDF297DE4
                            Malicious:false
                            Reputation:low
                            Preview:.7......,.......,.......D...n...L........6.......7..........................n...............................................................................................................................................................................................................G...\...........%...j...............................................................................................................................g...............................................................h...........................................................................6...)...>...................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.813979271513012
                            Encrypted:false
                            SSDEEP:192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
                            MD5:7399323923E3946FE9140132AC388132
                            SHA1:728257D06C452449B1241769B459F091AABCFFC5
                            SHA-256:5A1C20A3E2E2EB182976977669F2C5D9F3104477E98F74D69D2434E79B92FDC3
                            SHA-512:D6F28BA761351F374AE007C780BE27758AEA7B9F998E2A88A542EEDE459D18700ADFFE71ABCB52B8A8C00695EFB7CCC280175B5EEB57CA9A645542EDFABB64F1
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Marcom Trade SS-04665.exe, Detection: malicious, Browse
                            • Filename: Hermaean.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.FileRepMalware.23885.29286.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.FileRepMalware.24375.4894.exe, Detection: malicious, Browse
                            • Filename: OqqrLiFWKC.exe, Detection: malicious, Browse
                            • Filename: Factura Honorarios 2024-11-04.exe, Detection: malicious, Browse
                            • Filename: EL GINER.exe, Detection: malicious, Browse
                            • Filename: u9aPQQIwhj.exe, Detection: malicious, Browse
                            • Filename: Shipping documents 000293994900.exe, Detection: malicious, Browse
                            • Filename: whatsappjpg.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....f.R...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..B....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):279146
                            Entropy (8bit):7.747371055879157
                            Encrypted:false
                            SSDEEP:6144:iP9mczaRwF0911Ezy3ql9+mPTyuJa75rJBnTD6pcSYyKH:YMwF0911BCpu5rLnTDWY
                            MD5:565B011B012ABCE64B9261C634C9569E
                            SHA1:3F790B36E2F297E02E0A5652C4A92F4FE103317C
                            SHA-256:02DAFF0D6BAFDA6D3E7DC5A156F7DC3CF8B9E1FD8739DDA0975B2E279D09A805
                            SHA-512:33DFE3D84E9DFC2401A09C4F05FAC2AF1CE578962949453CB49B19C38520B1341033A90E47CFCDDA1AE1EE01E5E2A9F59DEAE6A4144B6FBA344B92CB910106D4
                            Malicious:false
                            Reputation:low
                            Preview:.....................iiii.....V.............H.............?.......].2....II................~~~~.............VVVV......Q..`..........y.....>...bb.>.......iii.......2.................s.............................llll...I......77..........44...................HHH.....(.....W.....pp.....................A...!!..........rrrrr.x.......5.t.lll............5...................:..9........................jjjjj.;.444...........*.....o....C.........NN................YY...................RR............................R.......v.......JJ.................6........................0.S................................................===.....................5555555555...._____.ZZZZ........_..$.}....UUUUU..............++.m...........R...7..../..............$.....SS................yy............d...........(.......................mmmm....hh...................@.;;.v...........||...^......c...I...jj..................../.8..................x........x.......~..6.....!......XX....mmmm.....vv..v......C..._........
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):284577
                            Entropy (8bit):1.255078923587751
                            Encrypted:false
                            SSDEEP:6144:kMnpfRdlLV2/eMUsM3C7WcXAj8iJIRpofbRYAUpOYPJLL8DStXMkO6nsCm:lx
                            MD5:E19CE796159C3BDE707DD283EC175450
                            SHA1:EFC8FA6D949A4939A01D9C380F6946AA311AA584
                            SHA-256:F742C0F0F0B306BBA3C99E7B3CBF13D8197AFA3DC8A26DEBCED77D894103A7A7
                            SHA-512:84D6AA4A917C94CC4E17EBE4DCA6A8D2BC1AEB81D313EB7F07980D3CCBFF6134007CB7ECC3B9ABC00F0510AECD26E92AEE0634A1084813A18ACDD70E3952E9F4
                            Malicious:false
                            Reputation:low
                            Preview:....................&...................b...........Md........!................................................................+........................................................................................(....a................................3......................q.....................................[...................r.........,.........................Q........................................................+...........................................................................................`..Z..........+.......*............y2......................................&............................................Z..........................................+.....................................................S.........J....................................................................z....<..............................................y......................C...........................Y........P...........*..........................
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):667
                            Entropy (8bit):4.5176817284957815
                            Encrypted:false
                            SSDEEP:12:3vOruGoCjuWKfHb8aMt+JX4yESglsw1kKKh6BgOxuFlsFOsSsv:3bCUfnOCIZHGs0e
                            MD5:6C74C3D34F8CC5E305E5085FF917D020
                            SHA1:20773526DBD9495B5E6D11E9B2AF205C81B49CC1
                            SHA-256:1A953DC54649B2E6ED53F12C1B1AED83493E75C2068D3DB8206A87A0D1215E83
                            SHA-512:C7C7A68E64E151FD7AE069AA475CD1E0FC37C4C9251231CC73EA4B9EEFBB0EA3FFC65DC11BE8CF8D5FBCF270CCA12F658C23ABA5682DBAE87051515C080D7DF0
                            Malicious:false
                            Reputation:low
                            Preview:[REOLPLJEDE ENAMELWARE]..ephestian sexologs kabelfejl forflytninger tidsrammen nonrevoltingly heptarchical geochemist lustre inoffensively gasometre.Bordeauxrdt ttheden trainable kautioneringer voksenbillet driftsbidragene ankesag osteriets..motionlessly crewing kluntekroer festrusen obducenten.Tetrabasic tilbagekaldelsesgrundes afskallingen guilds widenesses aquinist..;federaliseringens underskudsforretningerne halvmaskers filmiest,indskuddenes serne beslaas sortskjortens..Telefonautomats jernbaneforbindelse lustless appomattoc hovmestre turio..gemma encyclic ere americanize gaslighterne.Philologists breblger cheroots modtages metallisk constrains yashmaks..
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):530
                            Entropy (8bit):4.431710325153932
                            Encrypted:false
                            SSDEEP:12:4/k2m2UmKg9FKgDq+0G/UerFEJ6T9lfLfWqpTk+Nt7MZ:rdrmP930G/PFEJqrfFO+nIZ
                            MD5:8A7A9974B9C55BF8AC94710B477A662E
                            SHA1:B7D0D00BB0FDFBC172B92C62464768CA630EB0C3
                            SHA-256:7C448A6C8E8DE6460AC05834DE6F9042467ACDA9FFD9923352C42F2904C59782
                            SHA-512:B14074DD2E2255D106F18508649F38B3C30EF20CF5AAB8144A5E7EF22ADF329A3FE18A4B4D136A43F6E9C4ACB4CD0336672B1AC01384EA299C1382B211EFC4B0
                            Malicious:false
                            Preview:atlas eftersmkket skibspapiret uncollectibly alarmsignals.Haematein inddatafelters parapsychologists guide doubleness..[solus anisophyllous]..;invisibly generindret coralene landemrke seringas brahmanhood unbreathable.Pressmanship encephalitic skrkslagent fyrmestres midtpunktsjusteringers swingometer allelopathy..;serges forbundsformnd delikatessehandlerens ascogonia.Atomfysikers incitament gynantherous thumlungur velrenommeret decentralises changements........Rehydrating udhvilede kalkbrnder vedligeholdets knotty besvimer..
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):473258
                            Entropy (8bit):1.248788570764183
                            Encrypted:false
                            SSDEEP:1536:cSG9iToxeAQXFzDmk6As6vQRMWHzm2OhzdipTMhKxPY+oi6ZeJ5Ejq2pYMm1C/i+:QcxsNNd4FOITURiN
                            MD5:336BDDA1E77424F8F50C8FF0AA64D146
                            SHA1:5E475F772C80DDB47E3CEC3F181DC493D2C6D60D
                            SHA-256:E7D5C4A66EAD0A6935C952CB287E6839BB68A44A1C8508C88CC5EC9AE4411D01
                            SHA-512:3FBF475C651B94CCD5E645216864D264E032D6B5122B3759B1E78D606B24163395141DAE76F2362F413E313C4232DD4D2C884D4D6ED1BC3564781191CF125C8C
                            Malicious:false
                            Preview:..........h...........................................B.u........................p...............-.......................................j.........................................I............................0...V............4..........#.................................+.....................9............................................5...................................................................`......................................T....Z..................................................................!...............................................3........K............W.`.....................v...................5....................................................................n.........2..................../......?.....................................................)............p.....................{...........,...................gy.....................g...T.............4................o.............2.........................).......#...........[...
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):70351
                            Entropy (8bit):1.2598388117953725
                            Encrypted:false
                            SSDEEP:384:M37raR0TFnugVoTVnb93oEZw78Ih/izqcxB3S4Y:O3aR0TQgeTlNPwYIUzq6B3Sp
                            MD5:54E646BCD4B09075BE0D4ECE1ED62685
                            SHA1:17A4525BC6FCEEA6B1A92536D23749E11619E96C
                            SHA-256:D34CC96D389EDFAC6047EB41DC22EAA9A5EA26A64A36EB733BC95FC4ED570E72
                            SHA-512:04A0B74320AD2131AE0113D35B5AF2CF3D76A81D560E46A7EB65C7C45FE907103F4B55645585E1632C5D691152DD536D9456FEB5954F26E91ECE11F595605DF1
                            Malicious:false
                            Preview:.................................................................................................A......................................L..................................................e...b......................................._....................................................................f.............0....{................................................P...............................<......t....................................................L........~...e.............................v.............V.........................#...............................@......\.............................@...............................................F..............].........................H..............................................................,..s=.........W.........g..............................................................m...................................................j...................................\.........................................Q........L.........
                            Process:C:\Users\user\Desktop\Skambenets.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):661
                            Entropy (8bit):4.502730296156622
                            Encrypted:false
                            SSDEEP:12:/Hi8sSTbFHPjdTJYQT44hR+ZgM0R3RIkWxz4dX6NOW1m4QwT2TbFTD2MoyEnV:/H+WPBT69rC5Qz+6N9rP2PFPo5
                            MD5:04CE2396C7300E78E16AA6A3E1050BF4
                            SHA1:E0E3BE532ECD63E46C149751EB546752123F68BE
                            SHA-256:1B746C6A7D78152EFC91E1B7107E1EE013249ECC45023FA52D9022446BAF4224
                            SHA-512:B53DB842727156076DEB0345F506260A6A717C81411209B39BB99774D6862508DE95427078975FAC8220396B117469E30077D874B112AE8E8BCC3119B245FBFB
                            Malicious:false
                            Preview:Kurfyrsten tillgsbevillingens rdnet bleakness,achromobacter pseudoparasitism cytherella..redlined nordstjernen htel koorka hovedsalaterne sjlegruppers.Gazette borgerreprsentanten nullify hegelianer unsystemisables preintelligent eklektiker materialprvninger..spillable aktivitetscentret bremsens indflyvningernes interpenetrative.Dull politistyrkers plainclothesmen observantist..[FORGIFTNINGERNE KILOMETRES]..;cartesian legislation havgus zirbanit anmasselses divorceuse.Grnttrrings kontiene lumens paaholdende ondograph stib..Svinemiklernes dumbest prelunch svaleurter allegorisk visitkortets afmagnetiseringernes,knstte assimilationer forgaber differenciel..
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.258779514998669
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Skambenets.exe
                            File size:683'327 bytes
                            MD5:0519c157d2d7450690a1cef20ea51e8f
                            SHA1:bfe39774f356f799bd74649330ab7baecb95c052
                            SHA256:7dca3dbf4a0d99e7c86edafb83698994e9f89d2ec51de988f0f8c7ec54e4f81b
                            SHA512:a0632a5bfc725e6e2ac323f58980f1a8889712c9f02381a094d0b64495b5dc9a78563c9e953ce2233e6c11fcf437f79ea8dba4fdf976c24df4e5da59ac771d5f
                            SSDEEP:6144:ttXZXAehlzqxBd9SzzPV04yXmq5N08J4S9jlxWoESbm/NKwu7tblLa/bdiRqg4lj:tt4DeGJIojIVKz7tbBa3AGtmMYSBEo3
                            TLSH:60E412287ED9E877C28118790EB1D6BEE7F67D0809118F27B72D3FAE1D3085269191E0
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                            Icon Hash:0d0e1f1d1b874f0c
                            Entrypoint:0x403358
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                            Instruction
                            sub esp, 000002D4h
                            push ebx
                            push ebp
                            push esi
                            push edi
                            push 00000020h
                            xor ebp, ebp
                            pop esi
                            mov dword ptr [esp+14h], ebp
                            mov dword ptr [esp+10h], 00409230h
                            mov dword ptr [esp+1Ch], ebp
                            call dword ptr [00407034h]
                            push 00008001h
                            call dword ptr [004070BCh]
                            push ebp
                            call dword ptr [004072ACh]
                            push 00000008h
                            mov dword ptr [00429298h], eax
                            call 00007F9194F5EE4Ch
                            mov dword ptr [004291E4h], eax
                            push ebp
                            lea eax, dword ptr [esp+34h]
                            push 000002B4h
                            push eax
                            push ebp
                            push 00420690h
                            call dword ptr [0040717Ch]
                            push 0040937Ch
                            push 004281E0h
                            call 00007F9194F5EAB7h
                            call dword ptr [00407134h]
                            mov ebx, 00434000h
                            push eax
                            push ebx
                            call 00007F9194F5EAA5h
                            push ebp
                            call dword ptr [0040710Ch]
                            cmp word ptr [00434000h], 0022h
                            mov dword ptr [004291E0h], eax
                            mov eax, ebx
                            jne 00007F9194F5BF9Ah
                            push 00000022h
                            mov eax, 00434002h
                            pop esi
                            push esi
                            push eax
                            call 00007F9194F5E4F6h
                            push eax
                            call dword ptr [00407240h]
                            mov dword ptr [esp+18h], eax
                            jmp 00007F9194F5C05Eh
                            push 00000020h
                            pop edx
                            cmp cx, dx
                            jne 00007F9194F5BF99h
                            inc eax
                            inc eax
                            cmp word ptr [eax], dx
                            je 00007F9194F5BF8Bh
                            add word ptr [eax], 0000h
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x3b330.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x2a0000x260000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x500000x3b3300x3b4002d2028b91a53c942835f80f84c194200False0.5409620582805907data5.258649495088397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_BITMAP0x504780x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                            RT_ICON0x507e00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.3344522654678812
                            RT_ICON0x610080x10637PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9980931666840467
                            RT_ICON0x716400x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.3632278747109523
                            RT_ICON0x7aae80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.36206099815157117
                            RT_ICON0x7ff700x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3579357581483231
                            RT_ICON0x841980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3853734439834025
                            RT_ICON0x867400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4080675422138837
                            RT_ICON0x877e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5439765458422174
                            RT_ICON0x886900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4459016393442623
                            RT_ICON0x890180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6583935018050542
                            RT_ICON0x898c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.5743087557603687
                            RT_ICON0x89f880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4046242774566474
                            RT_ICON0x8a4f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.49556737588652483
                            RT_DIALOG0x8a9580x144dataEnglishUnited States0.5216049382716049
                            RT_DIALOG0x8aaa00x13cdataEnglishUnited States0.5506329113924051
                            RT_DIALOG0x8abe00x120dataEnglishUnited States0.5138888888888888
                            RT_DIALOG0x8ad000x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x8ae200x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x8ae800xbcdataEnglishUnited States0.6542553191489362
                            RT_MANIFEST0x8af400x3eaXML 1.0 document, ASCII text, with very long lines (1002), with no line terminatorsEnglishUnited States0.5179640718562875
                            DLLImport
                            KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                            USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                            ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-03-04T11:44:49.660363+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64999064.227.9.22880TCP
                            2025-03-04T11:45:48.364260+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64988264.227.9.22880TCP
                            2025-03-04T11:46:09.850930+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998464.227.9.22880TCP
                            2025-03-04T11:46:31.363332+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998664.227.9.22880TCP
                            2025-03-04T11:46:52.849789+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998864.227.9.22880TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 4, 2025 11:45:26.969952106 CET4988280192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:26.975018978 CET804988264.227.9.228192.168.2.6
                            Mar 4, 2025 11:45:26.975107908 CET4988280192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:26.975678921 CET4988280192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:26.980690956 CET804988264.227.9.228192.168.2.6
                            Mar 4, 2025 11:45:48.364136934 CET804988264.227.9.228192.168.2.6
                            Mar 4, 2025 11:45:48.364259958 CET4988280192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:48.364892006 CET4988280192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:48.369956970 CET804988264.227.9.228192.168.2.6
                            Mar 4, 2025 11:45:48.475228071 CET4998480192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:48.480293989 CET804998464.227.9.228192.168.2.6
                            Mar 4, 2025 11:45:48.480619907 CET4998480192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:48.480619907 CET4998480192.168.2.664.227.9.228
                            Mar 4, 2025 11:45:48.485666037 CET804998464.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:09.850795984 CET804998464.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:09.850929976 CET4998480192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:09.851022959 CET4998480192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:09.855974913 CET804998464.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:09.959285021 CET4998680192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:09.964378119 CET804998664.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:09.964539051 CET4998680192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:09.964755058 CET4998680192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:09.969702959 CET804998664.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:31.363156080 CET804998664.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:31.363332033 CET4998680192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:31.363360882 CET4998680192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:31.368427992 CET804998664.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:31.476591110 CET4998880192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:31.481708050 CET804998864.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:31.481815100 CET4998880192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:31.481950045 CET4998880192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:31.486912012 CET804998864.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:52.849718094 CET804998864.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:52.849788904 CET4998880192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:52.849878073 CET4998880192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:52.854909897 CET804998864.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:52.959268093 CET4999080192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:52.964539051 CET804999064.227.9.228192.168.2.6
                            Mar 4, 2025 11:46:52.964709997 CET4999080192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:52.964848042 CET4999080192.168.2.664.227.9.228
                            Mar 4, 2025 11:46:52.969899893 CET804999064.227.9.228192.168.2.6
                            • 64.227.9.228
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.64988264.227.9.228802144C:\Users\user\Desktop\Skambenets.exe
                            TimestampBytes transferredDirectionData
                            Mar 4, 2025 11:45:26.975678921 CET177OUTGET /YHVeQtjrpzsrPH13.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                            Host: 64.227.9.228
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.64998464.227.9.228802144C:\Users\user\Desktop\Skambenets.exe
                            TimestampBytes transferredDirectionData
                            Mar 4, 2025 11:45:48.480619907 CET177OUTGET /YHVeQtjrpzsrPH13.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                            Host: 64.227.9.228
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.64998664.227.9.228802144C:\Users\user\Desktop\Skambenets.exe
                            TimestampBytes transferredDirectionData
                            Mar 4, 2025 11:46:09.964755058 CET177OUTGET /YHVeQtjrpzsrPH13.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                            Host: 64.227.9.228
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.64998864.227.9.228802144C:\Users\user\Desktop\Skambenets.exe
                            TimestampBytes transferredDirectionData
                            Mar 4, 2025 11:46:31.481950045 CET177OUTGET /YHVeQtjrpzsrPH13.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                            Host: 64.227.9.228
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.64999064.227.9.228802144C:\Users\user\Desktop\Skambenets.exe
                            TimestampBytes transferredDirectionData
                            Mar 4, 2025 11:46:52.964848042 CET177OUTGET /YHVeQtjrpzsrPH13.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                            Host: 64.227.9.228
                            Cache-Control: no-cache


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:05:44:53
                            Start date:04/03/2025
                            Path:C:\Users\user\Desktop\Skambenets.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Skambenets.exe"
                            Imagebase:0x400000
                            File size:683'327 bytes
                            MD5 hash:0519C157D2D7450690A1CEF20EA51E8F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2409362528.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:5
                            Start time:05:45:20
                            Start date:04/03/2025
                            Path:C:\Users\user\Desktop\Skambenets.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Skambenets.exe"
                            Imagebase:0x400000
                            File size:683'327 bytes
                            MD5 hash:0519C157D2D7450690A1CEF20EA51E8F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.3382525922.0000000001810000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >