Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ohtie89k.exe

Overview

General Information

Sample name:ohtie89k.exe
Analysis ID:1629913
MD5:ba57c75d6c4e2936f6cad4a1ba4c29d1
SHA1:8299498803759fbb63a323b0ad64694d72d0c352
SHA256:c54714fec4a8cab57d0f0304210fc2f4f50f6fbcee80fc2d3db9cf30a31853d2
Tags:185-215-113-209exeuser-JAMESWT_MHT
Infos:

Detection

RedLine, XWorm
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Yara detected XWorm
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Drops PE files to the startup folder
Joe Sandbox ML detected suspicious sample
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ohtie89k.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\ohtie89k.exe" MD5: BA57C75D6C4E2936F6CAD4A1BA4C29D1)
    • windows.exe (PID: 7352 cmdline: "C:\ProgramData\windows.exe" MD5: 93D6BDF913CAB64FEC58C765AFDBA3D4)
      • conhost.exe (PID: 7360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • service.exe (PID: 7380 cmdline: "C:\ProgramData\service.exe" MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
      • schtasks.exe (PID: 7540 cmdline: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • service.exe (PID: 7600 cmdline: C:\Users\user\AppData\Roaming\service.exe MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 7712 cmdline: "C:\Users\user\AppData\Roaming\service.exe" MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 7852 cmdline: "C:\Users\user\AppData\Roaming\service.exe" MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 8156 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe" MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 5244 cmdline: C:\Users\user\AppData\Roaming\service.exe MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 3520 cmdline: C:\Users\user\AppData\Roaming\service.exe MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • service.exe (PID: 6256 cmdline: C:\Users\user\AppData\Roaming\service.exe MD5: 4281B5461BA14BD8D120B72D4C7E12AA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["mylogsprvt.zapto.org"], "Port": 8899, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V2.1"}
{"C2 url": ["mylogsprvt.zapto.org"], "Bot Id": "8899"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\service.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\ProgramData\service.exerat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
    • 0x779a:$str02: ngrok
    • 0x96c0:$str02: ngrok
    • 0x970a:$str02: ngrok
    • 0x7535:$str03: Mutexx
    • 0x97d4:$str04: FileManagerSplitFileManagerSplit
    • 0x96de:$str05: InstallngC
    • 0x9480:$str06: downloadedfile
    • 0x9452:$str07: creatfile
    • 0x942e:$str08: creatnewfolder
    • 0x9410:$str09: showfolderfile
    • 0x93f2:$str10: hidefolderfile
    • 0x93c4:$str11: txtttt
    • 0x990c:$str12: \root\SecurityCenter2
    • 0x985a:$str13: [USB]
    • 0x9840:$str14: [Drive]
    • 0x97c2:$str15: [Folder]
    • 0x96b6:$str16: HVNC
    • 0x8d1e:$str17: http://exmple.com/Uploader.php
    • 0x8f2c:$str18: XKlog.txt
    • 0x9938:$str19: Select * from AntivirusProduct
    • 0x9242:$str20: runnnnnn
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exerat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
      • 0x779a:$str02: ngrok
      • 0x96c0:$str02: ngrok
      • 0x970a:$str02: ngrok
      • 0x7535:$str03: Mutexx
      • 0x97d4:$str04: FileManagerSplitFileManagerSplit
      • 0x96de:$str05: InstallngC
      • 0x9480:$str06: downloadedfile
      • 0x9452:$str07: creatfile
      • 0x942e:$str08: creatnewfolder
      • 0x9410:$str09: showfolderfile
      • 0x93f2:$str10: hidefolderfile
      • 0x93c4:$str11: txtttt
      • 0x990c:$str12: \root\SecurityCenter2
      • 0x985a:$str13: [USB]
      • 0x9840:$str14: [Drive]
      • 0x97c2:$str15: [Folder]
      • 0x96b6:$str16: HVNC
      • 0x8d1e:$str17: http://exmple.com/Uploader.php
      • 0x8f2c:$str18: XKlog.txt
      • 0x9938:$str19: Select * from AntivirusProduct
      • 0x9242:$str20: runnnnnn
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exerat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
      • 0x779a:$str02: ngrok
      • 0x96c0:$str02: ngrok
      • 0x970a:$str02: ngrok
      • 0x7535:$str03: Mutexx
      • 0x97d4:$str04: FileManagerSplitFileManagerSplit
      • 0x96de:$str05: InstallngC
      • 0x9480:$str06: downloadedfile
      • 0x9452:$str07: creatfile
      • 0x942e:$str08: creatnewfolder
      • 0x9410:$str09: showfolderfile
      • 0x93f2:$str10: hidefolderfile
      • 0x93c4:$str11: txtttt
      • 0x990c:$str12: \root\SecurityCenter2
      • 0x985a:$str13: [USB]
      • 0x9840:$str14: [Drive]
      • 0x97c2:$str15: [Folder]
      • 0x96b6:$str16: HVNC
      • 0x8d1e:$str17: http://exmple.com/Uploader.php
      • 0x8f2c:$str18: XKlog.txt
      • 0x9938:$str19: Select * from AntivirusProduct
      • 0x9242:$str20: runnnnnn
      Click to see the 6 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x2ced2:$a4: get_ScannedWallets
          • 0x44d1a:$a4: get_ScannedWallets
          • 0x2bd30:$a5: get_ScanTelegram
          • 0x43b78:$a5: get_ScanTelegram
          • 0x2cb56:$a6: get_ScanGeckoBrowsersPaths
          • 0x4499e:$a6: get_ScanGeckoBrowsersPaths
          • 0x2a972:$a7: <Processes>k__BackingField
          • 0x427ba:$a7: <Processes>k__BackingField
          • 0x28884:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x406cc:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x2a2a6:$a9: <ScanFTP>k__BackingField
          • 0x420ee:$a9: <ScanFTP>k__BackingField
          00000000.00000002.1665323502.0000000002671000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 11 entries
              SourceRuleDescriptionAuthorStrings
              0.2.ohtie89k.exe.268f3b8.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                0.2.ohtie89k.exe.268f3b8.1.unpackrat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
                • 0x599a:$str02: ngrok
                • 0x78c0:$str02: ngrok
                • 0x790a:$str02: ngrok
                • 0x5735:$str03: Mutexx
                • 0x79d4:$str04: FileManagerSplitFileManagerSplit
                • 0x78de:$str05: InstallngC
                • 0x7680:$str06: downloadedfile
                • 0x7652:$str07: creatfile
                • 0x762e:$str08: creatnewfolder
                • 0x7610:$str09: showfolderfile
                • 0x75f2:$str10: hidefolderfile
                • 0x75c4:$str11: txtttt
                • 0x7b0c:$str12: \root\SecurityCenter2
                • 0x7a5a:$str13: [USB]
                • 0x7a40:$str14: [Drive]
                • 0x79c2:$str15: [Folder]
                • 0x78b6:$str16: HVNC
                • 0x6f1e:$str17: http://exmple.com/Uploader.php
                • 0x712c:$str18: XKlog.txt
                • 0x7b38:$str19: Select * from AntivirusProduct
                • 0x7442:$str20: runnnnnn
                3.0.service.exe.360000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  3.0.service.exe.360000.0.unpackrat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
                  • 0x779a:$str02: ngrok
                  • 0x96c0:$str02: ngrok
                  • 0x970a:$str02: ngrok
                  • 0x7535:$str03: Mutexx
                  • 0x97d4:$str04: FileManagerSplitFileManagerSplit
                  • 0x96de:$str05: InstallngC
                  • 0x9480:$str06: downloadedfile
                  • 0x9452:$str07: creatfile
                  • 0x942e:$str08: creatnewfolder
                  • 0x9410:$str09: showfolderfile
                  • 0x93f2:$str10: hidefolderfile
                  • 0x93c4:$str11: txtttt
                  • 0x990c:$str12: \root\SecurityCenter2
                  • 0x985a:$str13: [USB]
                  • 0x9840:$str14: [Drive]
                  • 0x97c2:$str15: [Folder]
                  • 0x96b6:$str16: HVNC
                  • 0x8d1e:$str17: http://exmple.com/Uploader.php
                  • 0x8f2c:$str18: XKlog.txt
                  • 0x9938:$str19: Select * from AntivirusProduct
                  • 0x9242:$str20: runnnnnn
                  0.2.ohtie89k.exe.269a3f8.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    Click to see the 30 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\service.exe, EventID: 13, EventType: SetValue, Image: C:\ProgramData\service.exe, ProcessId: 7380, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\service
                    Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\ProgramData\service.exe, ProcessId: 7380, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\ProgramData\service.exe" , ParentImage: C:\ProgramData\service.exe, ParentProcessId: 7380, ParentProcessName: service.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe", ProcessId: 7540, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: ohtie89k.exeAvira: detected
                    Source: C:\ProgramData\windows.exeAvira: detection malicious, Label: HEUR/AGEN.1305500
                    Source: C:\ProgramData\service.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: 00000000.00000002.1665323502.0000000002671000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["mylogsprvt.zapto.org"], "Port": 8899, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V2.1"}
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["mylogsprvt.zapto.org"], "Bot Id": "8899"}
                    Source: C:\ProgramData\service.exeReversingLabs: Detection: 95%
                    Source: C:\ProgramData\windows.exeReversingLabs: Detection: 95%
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeReversingLabs: Detection: 95%
                    Source: C:\Users\user\AppData\Roaming\service.exeReversingLabs: Detection: 95%
                    Source: ohtie89k.exeVirustotal: Detection: 80%Perma Link
                    Source: ohtie89k.exeReversingLabs: Detection: 78%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: ohtie89k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: ohtie89k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Xm source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbqC source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: mylogsprvt.zapto.org
                    Source: Malware configuration extractorURLs: mylogsprvt.zapto.org
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: mylogsprvt.zapto.org
                    Source: service.exe, 00000003.00000002.4134114301.0000000002751000.00000004.00000800.00020000.00000000.sdmp, service.exe, 00000006.00000002.1699132877.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, service.exe, 00000007.00000002.1803026820.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, service.exe, 00000009.00000002.1890310813.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, service.exe, 0000000E.00000002.1965461395.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, service.exe, 0000000F.00000002.2156773663.0000000003031000.00000004.00000800.00020000.00000000.sdmp, service.exe, 00000019.00000002.2750609543.0000000003101000.00000004.00000800.00020000.00000000.sdmp, service.exe, 0000001B.00000002.3346457627.00000000023B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exmple.com/Uploader.php
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A9F000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mylogsprvt.zapto.org:45630
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mylogsprvt.zapto.org:45630/
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AAC000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AAC000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002AAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002A9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectT
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR
                    Source: windows.exe, 00000001.00000002.4134655834.0000000002BC5000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002ADE000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000002.4134655834.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                    Source: ohtie89k.exe, 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, windows.exe.0.drString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                    Source: ohtie89k.exe, 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, windows.exe.0.drString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                    Source: ohtie89k.exe, 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, windows.exe, 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, windows.exe.0.drString found in binary or memory: https://ipinfo.io/ip%appdata%

                    System Summary

                    barindex
                    Source: 0.2.ohtie89k.exe.268f3b8.1.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: 3.0.service.exe.360000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.269a3f8.2.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: windows.exe PID: 7352, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: C:\ProgramData\service.exe, type: DROPPEDMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: C:\ProgramData\windows.exeCode function: 1_2_00E3E7B01_2_00E3E7B0
                    Source: C:\ProgramData\windows.exeCode function: 1_2_00E3DC901_2_00E3DC90
                    Source: C:\ProgramData\windows.exeCode function: 1_2_00E3BF371_2_00E3BF37
                    Source: C:\ProgramData\service.exeCode function: 3_2_00007FFD9BAC18E53_2_00007FFD9BAC18E5
                    Source: ohtie89k.exe, 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs ohtie89k.exe
                    Source: ohtie89k.exe, 00000000.00000002.1665323502.0000000002671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameservice.exe4 vs ohtie89k.exe
                    Source: ohtie89k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.ohtie89k.exe.268f3b8.1.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: 3.0.service.exe.360000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: 0.2.ohtie89k.exe.269a3f8.2.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: windows.exe PID: 7352, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: C:\ProgramData\service.exe, type: DROPPEDMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPEDMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                    Source: C:\ProgramData\windows.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: ohtie89k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ohtie89k.exe, code.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe.3.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe.3.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe0.3.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe0.3.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: service.exe0.3.dr, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: service.exe.3.dr, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: service.exe.0.dr, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@16/6@1/0
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ohtie89k.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMutant created: NULL
                    Source: C:\ProgramData\service.exeMutant created: \Sessions\1\BaseNamedObjects\SmH2L0949LC6zVSS
                    Source: C:\Users\user\Desktop\ohtie89k.exeMutant created: \Sessions\1\BaseNamedObjects\AQmZxALPsSikdRXvI
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7360:120:WilError_03
                    Source: ohtie89k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ohtie89k.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ohtie89k.exeVirustotal: Detection: 80%
                    Source: ohtie89k.exeReversingLabs: Detection: 78%
                    Source: unknownProcess created: C:\Users\user\Desktop\ohtie89k.exe "C:\Users\user\Desktop\ohtie89k.exe"
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\windows.exe "C:\ProgramData\windows.exe"
                    Source: C:\ProgramData\windows.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\service.exe "C:\ProgramData\service.exe"
                    Source: C:\ProgramData\service.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe"
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe C:\Users\user\AppData\Roaming\service.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe "C:\Users\user\AppData\Roaming\service.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe "C:\Users\user\AppData\Roaming\service.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe C:\Users\user\AppData\Roaming\service.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe C:\Users\user\AppData\Roaming\service.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\service.exe C:\Users\user\AppData\Roaming\service.exe
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\windows.exe "C:\ProgramData\windows.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\service.exe "C:\ProgramData\service.exe" Jump to behavior
                    Source: C:\ProgramData\service.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: version.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\ProgramData\windows.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: slc.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\ProgramData\service.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: ohtie89k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: ohtie89k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Xm source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbqC source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: windows.exe, 00000001.00000002.4133671544.0000000000EBC000.00000004.00000020.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: service.exe.0.dr, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                    Source: service.exe.3.dr, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                    Source: service.exe0.3.dr, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                    Source: windows.exe.0.drStatic PE information: 0xF00CA9A2 [Wed Aug 14 23:34:58 2097 UTC]
                    Source: ohtie89k.exeStatic PE information: section name: .text entropy: 7.973555812253727
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile created: C:\ProgramData\windows.exeJump to dropped file
                    Source: C:\ProgramData\service.exeFile created: C:\Users\user\AppData\Roaming\service.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile created: C:\ProgramData\service.exeJump to dropped file
                    Source: C:\ProgramData\service.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile created: C:\ProgramData\windows.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ohtie89k.exeFile created: C:\ProgramData\service.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\ProgramData\service.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeJump to dropped file
                    Source: C:\ProgramData\service.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe"
                    Source: C:\ProgramData\service.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeJump to behavior
                    Source: C:\ProgramData\service.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeJump to behavior
                    Source: C:\ProgramData\service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run serviceJump to behavior
                    Source: C:\ProgramData\service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run serviceJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\windows.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\service.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\ohtie89k.exeMemory allocated: 7D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeMemory allocated: 1A670000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\windows.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\windows.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\windows.exeMemory allocated: 4A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\service.exeMemory allocated: 8A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\service.exeMemory allocated: 1A750000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1AEC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 13F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1B0E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 10E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1AC00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeMemory allocated: CB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeMemory allocated: 1A6A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1B030000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1B100000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 860000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\service.exeMemory allocated: 1A3B0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\ohtie89k.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477
                    Source: C:\ProgramData\service.exeWindow / User API: threadDelayed 2237Jump to behavior
                    Source: C:\ProgramData\service.exeWindow / User API: threadDelayed 7676Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exe TID: 7324Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\ProgramData\windows.exe TID: 7356Thread sleep time: -175000s >= -30000sJump to behavior
                    Source: C:\ProgramData\service.exe TID: 7592Thread sleep count: 2237 > 30Jump to behavior
                    Source: C:\ProgramData\service.exe TID: 7592Thread sleep time: -67110000s >= -30000sJump to behavior
                    Source: C:\ProgramData\service.exe TID: 7592Thread sleep count: 7676 > 30Jump to behavior
                    Source: C:\ProgramData\service.exe TID: 7592Thread sleep time: -230280000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 7620Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 7736Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe TID: 8176Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 2484Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 3636Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exe TID: 6316Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\ohtie89k.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\service.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\ProgramData\service.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: service.exe, 00000003.00000002.4135021835.000000001B65D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWor%SystemRoot%\system32\mswsock.dll <workflowInstanceQueries>
                    Source: windows.exe, 00000001.00000002.4133671544.0000000000F22000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\ProgramData\windows.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: windows.exe.0.dr, NativeHelper.csReference to suspicious API methods: LoadLibrary("kernel32")
                    Source: windows.exe.0.dr, NativeHelper.csReference to suspicious API methods: GetProcAddress(hModule, "GetConsoleWindow")
                    Source: service.exe.0.dr, Messages.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\windows.exe "C:\ProgramData\windows.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeProcess created: C:\ProgramData\service.exe "C:\ProgramData\service.exe" Jump to behavior
                    Source: C:\ProgramData\service.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\user\AppData\Roaming\service.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ohtie89k.exeQueries volume information: C:\Users\user\Desktop\ohtie89k.exe VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\ProgramData\windows.exe VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\windows.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\service.exeQueries volume information: C:\ProgramData\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: C:\Users\user\AppData\Roaming\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: C:\Users\user\AppData\Roaming\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: C:\Users\user\AppData\Roaming\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: C:\Users\user\AppData\Roaming\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: C:\Users\user\AppData\Roaming\service.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\service.exeQueries volume information: unknown VolumeInformation
                    Source: C:\Users\user\Desktop\ohtie89k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: windows.exe PID: 7352, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\windows.exe, type: DROPPED
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.268f3b8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.service.exe.360000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.269a3f8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1665323502.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1663742599.0000000000362000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: service.exe PID: 7380, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\service.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPED
                    Source: Yara matchFile source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: windows.exe PID: 7352, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\windows.exe, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.0.windows.exe.6e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.126a9750.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.12691908.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1665364379.0000000012678000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.1663240346.00000000006E2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: windows.exe PID: 7352, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\windows.exe, type: DROPPED
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.268f3b8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.service.exe.360000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.269a3f8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.269a3f8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ohtie89k.exe.268f3b8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1665323502.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.1663742599.0000000000362000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ohtie89k.exe PID: 7300, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: service.exe PID: 7380, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\service.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe, type: DROPPED
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping11
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    121
                    Registry Run Keys / Startup Folder
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory31
                    Virtualization/Sandbox Evasion
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    DLL Side-Loading
                    121
                    Registry Run Keys / Startup Folder
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Application Window Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    DLL Side-Loading
                    11
                    Process Injection
                    NTDS2
                    File and Directory Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets12
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Timestomp
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629913 Sample: ohtie89k.exe Startdate: 05/03/2025 Architecture: WINDOWS Score: 100 41 mylogsprvt.zapto.org 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for dropped file 2->47 49 9 other signatures 2->49 9 ohtie89k.exe 4 2->9         started        12 service.exe 1 2->12         started        15 service.exe 2->15         started        17 5 other processes 2->17 signatures3 process4 file5 35 C:\ProgramData\windows.exe, PE32 9->35 dropped 37 C:\ProgramData\service.exe, PE32 9->37 dropped 39 C:\Users\user\AppData\...\ohtie89k.exe.log, CSV 9->39 dropped 19 service.exe 1 5 9->19         started        23 windows.exe 15 3 9->23         started        59 Multi AV Scanner detection for dropped file 12->59 signatures6 process7 file8 31 C:\Users\user\AppData\Roaming\service.exe, PE32 19->31 dropped 33 C:\Users\user\AppData\Roaming\...\service.exe, PE32 19->33 dropped 51 Antivirus detection for dropped file 19->51 53 Multi AV Scanner detection for dropped file 19->53 55 Drops PE files to the startup folder 19->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 19->57 25 schtasks.exe 1 19->25         started        27 conhost.exe 23->27         started        signatures9 process10 process11 29 conhost.exe 25->29         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.