Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1776871603.exe

Overview

General Information

Sample name:1776871603.exe
Analysis ID:1635405
MD5:8bede54b9c4860ddcc2363cd2cf561b5
SHA1:feb2808b79d444ff96f1fc29cf119a1c87a543a1
SHA256:450b033145869b6b0dfcf0b1c5dd05044234402957ee9cf76cc56f24487e6b17
Tags:exeuser-aachum
Infos:

Detection

Clipboard Hijacker
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Clipboard Hijacker
Drops PE files with benign system names
Joe Sandbox ML detected suspicious sample
Potentially malicious time measurement code found
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1776871603.exe (PID: 3332 cmdline: "C:\Users\user\Desktop\1776871603.exe" MD5: 8BEDE54B9C4860DDCC2363CD2CF561B5)
    • cmd.exe (PID: 2284 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3536 cmdline: cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 7312 cmdline: ping localhost -n 1 MD5: 2F46799D79D22AC72C241EC0322B011D)
        • explorer.exe (PID: 4176 cmdline: C:\Users\user\AppData\Local\explorer.exe MD5: 8BEDE54B9C4860DDCC2363CD2CF561B5)
  • explorer.exe (PID: 6596 cmdline: "C:\Users\user\AppData\Local\explorer.exe" MD5: 8BEDE54B9C4860DDCC2363CD2CF561B5)
  • explorer.exe (PID: 5064 cmdline: "C:\Users\user\AppData\Local\explorer.exe" MD5: 8BEDE54B9C4860DDCC2363CD2CF561B5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: explorer.exe PID: 4176JoeSecurity_Clipboard_Hijacker_5Yara detected Clipboard HijackerJoe Security

    System Summary

    barindex
    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\1776871603.exe, ProcessId: 3332, TargetFilename: C:\Users\user\AppData\Local\explorer.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Users\user\AppData\Local\explorer.exe, CommandLine: C:\Users\user\AppData\Local\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\explorer.exe, NewProcessName: C:\Users\user\AppData\Local\explorer.exe, OriginalFileName: C:\Users\user\AppData\Local\explorer.exe, ParentCommandLine: cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3536, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\user\AppData\Local\explorer.exe, ProcessId: 4176, ProcessName: explorer.exe
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 185.208.159.226, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\1776871603.exe, Initiated: true, ProcessId: 3332, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49713
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\explorer.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1776871603.exe, ProcessId: 3332, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer
    Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Users\user\AppData\Local\explorer.exe, CommandLine: C:\Users\user\AppData\Local\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\explorer.exe, NewProcessName: C:\Users\user\AppData\Local\explorer.exe, OriginalFileName: C:\Users\user\AppData\Local\explorer.exe, ParentCommandLine: cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3536, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\user\AppData\Local\explorer.exe, ProcessId: 4176, ProcessName: explorer.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1776871603.exeAvira: detected
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/aAvira URL Cloud: Label: malware
    Source: http://93.88.203.34/cl/BatClipT.bat.226/PAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/RAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/YAvira URL Cloud: Label: malware
    Source: http://185.208.159.226/pAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/UAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/NAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/VAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDjAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/MAvira URL Cloud: Label: malware
    Source: http://185.208.159.226/Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/anyAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/;Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3Avira URL Cloud: Label: malware
    Source: http://185.208.159.226/:Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/(Avira URL Cloud: Label: malware
    Source: http://93.88.203.34/cl/BatClipTAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Avira URL Cloud: Label: malware
    Source: http://185.208.159.226/.Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$#Avira URL Cloud: Label: malware
    Source: http://185.208.159.226/6e7660115d80/Avira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/Avira URL Cloud: Label: malware
    Source: http://93.88.203.34/cl/BatClipT.batAvira URL Cloud: Label: malware
    Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/sAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\explorer.exeAvira: detection malicious, Label: TR/Spy.Banker.kdiut
    Source: C:\Users\user\AppData\Local\explorer.exeReversingLabs: Detection: 63%
    Source: 1776871603.exeVirustotal: Detection: 59%Perma Link
    Source: 1776871603.exeReversingLabs: Detection: 63%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49712 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49715 version: TLS 1.2
    Source: 1776871603.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Administrator\Desktop\OneDrive\good\d53f8fa2ef2f4fcabd436e7660115d80\x64\Release\LClipper.pdbq source: 1776871603.exe, explorer.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\OneDrive\good\d53f8fa2ef2f4fcabd436e7660115d80\x64\Release\LClipper.pdb source: 1776871603.exe, explorer.exe.0.dr

    Networking

    barindex
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 185.208.159.226 8888Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 208.95.112.1 80Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 185.199.109.133 443Jump to behavior
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 8888
    Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49713
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 8888
    Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49716
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
    Source: global trafficTCP traffic: 192.168.2.4:49713 -> 185.208.159.226:8888
    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
    Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
    Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
    Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: unknownDNS query: name: ip-api.com
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownTCP traffic detected without corresponding DNS query: 185.208.159.226
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /VeraImage/MilitarySource/refs/heads/main/Code HTTP/1.1User-Agent: ClpBotHost: raw.githubusercontent.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /VeraImage/MilitarySource/refs/heads/main/Code HTTP/1.1User-Agent: ClpBotHost: raw.githubusercontent.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /line/ HTTP/1.1User-Agent: ClpBotHost: ip-api.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /d53f8fa2ef2f4fcabd436e7660115d80/ HTTP/1.1User-Agent: ClpBotHost: 185.208.159.226:8888Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /line/ HTTP/1.1User-Agent: ClpBotHost: ip-api.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /d53f8fa2ef2f4fcabd436e7660115d80/ HTTP/1.1User-Agent: ClpBotHost: 185.208.159.226:8888Cache-Control: no-cache
    Source: global trafficDNS traffic detected: DNS query: ip-api.com
    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226/
    Source: explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226/.
    Source: explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226/6e7660115d80/
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226/:
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226/p
    Source: explorer.exe, 00000006.00000002.2695142393.000002072714C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/(
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/;
    Source: 1776871603.exe, 00000000.00000003.1474147972.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/M
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/N
    Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OID
    Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDj
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$#
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/R
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/U
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/V
    Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8BB000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Y
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/a
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/any
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/s
    Source: explorer.exe, 00000006.00000002.2694983774.00000014809A8000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://185.208.k
    Source: explorer.exe, 00000006.00000002.2695434254.0000020728F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://93.88.203.34/cl/BatClipT
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://93.88.203.34/cl/BatClipT.bat
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://93.88.203.34/cl/BatClipT.bat.226/P
    Source: 1776871603.exe, explorer.exe.0.drString found in binary or memory: http://ip-api.com/line/
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/-
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474310515.00000294FB88F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?j
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/E
    Source: 1776871603.exe, explorer.exe.0.drString found in binary or memory: http://ip-api.com/line/RUBYUA797739A5A68043409FBEC5CFF63BE680UwwEUQtfIAckUApWAFVXUVsidnZ1UHRwcAYCc3B
    Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/$Nj?
    Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/G
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/JN4?
    Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/KbM
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code#9
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code1
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code1n
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code2
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code89
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeL
    Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeLf
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeM32
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codea9
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codei
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codeindows
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codemn
    Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codev9
    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49712 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49715 version: TLS 1.2
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A5C400_2_00007FF7612A5C40
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A7A400_2_00007FF7612A7A40
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A8E800_2_00007FF7612A8E80
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AB2600_2_00007FF7612AB260
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612ABE600_2_00007FF7612ABE60
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612ABCC00_2_00007FF7612ABCC0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A78A00_2_00007FF7612A78A0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612ACAA00_2_00007FF7612ACAA0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AF0A00_2_00007FF7612AF0A0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AB9000_2_00007FF7612AB900
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A77400_2_00007FF7612A7740
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AE5400_2_00007FF7612AE540
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A37800_2_00007FF7612A3780
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AA1800_2_00007FF7612AA180
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AA1720_2_00007FF7612AA172
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AED700_2_00007FF7612AED70
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AB7600_2_00007FF7612AB760
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AA9B00_2_00007FF7612AA9B0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AB5A00_2_00007FF7612AB5A0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A95A00_2_00007FF7612A95A0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AE4000_2_00007FF7612AE400
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612ABFF00_2_00007FF7612ABFF0
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612AEFE20_2_00007FF7612AEFE2
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEE4006_2_00007FF6E0CEE400
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEBFF06_2_00007FF6E0CEBFF0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEEFE26_2_00007FF6E0CEEFE2
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEA1806_2_00007FF6E0CEA180
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE37806_2_00007FF6E0CE3780
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEA9B06_2_00007FF6E0CEA9B0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEB5A06_2_00007FF6E0CEB5A0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE95A06_2_00007FF6E0CE95A0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEE5406_2_00007FF6E0CEE540
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE77406_2_00007FF6E0CE7740
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEA1726_2_00007FF6E0CEA172
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEED706_2_00007FF6E0CEED70
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEB7606_2_00007FF6E0CEB760
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEB9006_2_00007FF6E0CEB900
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEBCC06_2_00007FF6E0CEBCC0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE8E806_2_00007FF6E0CE8E80
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CECAA06_2_00007FF6E0CECAA0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEF0A06_2_00007FF6E0CEF0A0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE78A06_2_00007FF6E0CE78A0
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE5C406_2_00007FF6E0CE5C40
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE7A406_2_00007FF6E0CE7A40
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEB2606_2_00007FF6E0CEB260
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CEBE606_2_00007FF6E0CEBE60
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/9@2/3
    Source: C:\Users\user\Desktop\1776871603.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\line[1].txtJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3348:120:WilError_03
    Source: C:\Users\user\AppData\Local\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\aUkJ+dUJw
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8132:120:WilError_03
    Source: C:\Users\user\AppData\Local\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\ChromiumDatagram.txtJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\explorer.exe
    Source: unknownProcess created: C:\Users\user\AppData\Local\explorer.exe
    Source: unknownProcess created: C:\Users\user\AppData\Local\explorer.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\explorer.exeJump to behavior
    Source: 1776871603.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\1776871603.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 1776871603.exeVirustotal: Detection: 59%
    Source: 1776871603.exeReversingLabs: Detection: 63%
    Source: 1776871603.exeString found in binary or memory: id-cmc-addExtensions
    Source: 1776871603.exeString found in binary or memory: set-addPolicy
    Source: C:\Users\user\Desktop\1776871603.exeFile read: C:\Users\user\Desktop\1776871603.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\1776871603.exe "C:\Users\user\Desktop\1776871603.exe"
    Source: C:\Users\user\Desktop\1776871603.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\explorer.exe C:\Users\user\AppData\Local\explorer.exe
    Source: unknownProcess created: C:\Users\user\AppData\Local\explorer.exe "C:\Users\user\AppData\Local\explorer.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Local\explorer.exe "C:\Users\user\AppData\Local\explorer.exe"
    Source: C:\Users\user\Desktop\1776871603.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\explorer.exe C:\Users\user\AppData\Local\explorer.exeJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: 1776871603.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: 1776871603.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: 1776871603.exeStatic file information: File size 3648000 > 1048576
    Source: 1776871603.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1be400
    Source: 1776871603.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1a1200
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: 1776871603.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 1776871603.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Administrator\Desktop\OneDrive\good\d53f8fa2ef2f4fcabd436e7660115d80\x64\Release\LClipper.pdbq source: 1776871603.exe, explorer.exe.0.dr
    Source: Binary string: C:\Users\Administrator\Desktop\OneDrive\good\d53f8fa2ef2f4fcabd436e7660115d80\x64\Release\LClipper.pdb source: 1776871603.exe, explorer.exe.0.dr
    Source: 1776871603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: 1776871603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: 1776871603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: 1776871603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: 1776871603.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A82FE push rax; retf 0_2_00007FF7612A8313
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A8317 push rax; retf 0_2_00007FF7612A8313
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE82FE push rax; retf 6_2_00007FF6E0CE8313
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE8317 push rax; retf 6_2_00007FF6E0CE8313
    Source: 1776871603.exeStatic PE information: section name: .text entropy: 6.862718423504815
    Source: explorer.exe.0.drStatic PE information: section name: .text entropy: 6.862718423504815

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\Desktop\1776871603.exeFile created: C:\Users\user\AppData\Local\explorer.exeJump to dropped file
    Source: C:\Users\user\Desktop\1776871603.exeFile created: C:\Users\user\AppData\Local\explorer.exeJump to dropped file
    Source: C:\Users\user\Desktop\1776871603.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorerJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorerJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 8888
    Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49713
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 8888
    Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49716
    Source: C:\Users\user\AppData\Local\explorer.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A1330 rdtsc 0_2_00007FF7612A1330
    Source: C:\Users\user\AppData\Local\explorer.exeWindow / User API: threadDelayed 4896Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exe TID: 2564Thread sleep count: 4896 > 30Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exe TID: 2564Thread sleep time: -97920s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeFile opened: PhysicalDrive0Jump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\explorer.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\explorer.exeLast function: Thread delayed
    Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH\
    Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWR
    Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.000002072714C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A13300_2_00007FF7612A1330
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A13800_2_00007FF7612A1380
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE13806_2_00007FF6E0CE1380
    Source: C:\Users\user\AppData\Local\explorer.exeCode function: 6_2_00007FF6E0CE13306_2_00007FF6E0CE1330
    Source: C:\Users\user\Desktop\1776871603.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF7612A1330 rdtsc 0_2_00007FF7612A1330

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 185.208.159.226 8888Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 208.95.112.1 80Jump to behavior
    Source: C:\Users\user\AppData\Local\explorer.exeNetwork Connect: 185.199.109.133 443Jump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\explorer.exe C:\Users\user\AppData\Local\explorer.exeJump to behavior
    Source: C:\Users\user\Desktop\1776871603.exeCode function: 0_2_00007FF761427374 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF761427374

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4176, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    Registry Run Keys / Startup Folder
    111
    Process Injection
    11
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Registry Run Keys / Startup Folder
    3
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Query Registry
    Remote Desktop ProtocolData from Removable Media11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    111
    Process Injection
    Security Account Manager131
    Security Software Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS3
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging3
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    Remote System Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
    System Network Configuration Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem12
    System Information Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1635405 Sample: 1776871603.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 37 raw.githubusercontent.com 2->37 39 ip-api.com 2->39 51 Antivirus detection for URL or domain 2->51 53 Antivirus / Scanner detection for submitted sample 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 5 other signatures 2->57 9 1776871603.exe 1 17 2->9         started        14 explorer.exe 2->14         started        16 explorer.exe 2->16         started        signatures3 process4 dnsIp5 41 185.208.159.226, 49713, 49716, 8888 SIMPLECARRER2IT Switzerland 9->41 43 ip-api.com 208.95.112.1, 49711, 49714, 80 TUT-ASUS United States 9->43 45 raw.githubusercontent.com 185.199.109.133, 443, 49712, 49715 FASTLYUS Netherlands 9->45 33 C:\Users\user\AppData\Local\explorer.exe, PE32+ 9->33 dropped 35 C:\Users\...\explorer.exe:Zone.Identifier, ASCII 9->35 dropped 69 Drops PE files with benign system names 9->69 71 Potentially malicious time measurement code found 9->71 18 cmd.exe 1 9->18         started        file6 signatures7 process8 signatures9 47 Uses ping.exe to sleep 18->47 49 Uses ping.exe to check the status of other devices and networks 18->49 21 cmd.exe 1 18->21         started        24 conhost.exe 18->24         started        process10 signatures11 59 Uses ping.exe to sleep 21->59 26 explorer.exe 17 21->26         started        29 conhost.exe 21->29         started        31 PING.EXE 1 21->31         started        process12 signatures13 61 Antivirus detection for dropped file 26->61 63 System process connects to network (likely due to code injection or exploit) 26->63 65 Multi AV Scanner detection for dropped file 26->65 67 Potentially malicious time measurement code found 26->67

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1776871603.exe60%VirustotalBrowse
    1776871603.exe63%ReversingLabsWin64.Trojan.Generic
    1776871603.exe100%AviraTR/Spy.Banker.kdiut
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\explorer.exe100%AviraTR/Spy.Banker.kdiut
    C:\Users\user\AppData\Local\explorer.exe63%ReversingLabsWin64.Trojan.Generic
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/a100%Avira URL Cloudmalware
    http://93.88.203.34/cl/BatClipT.bat.226/P100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/R100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Y100%Avira URL Cloudmalware
    http://185.208.159.226/p100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/U100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/N100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/V100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDj100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OID100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/M100%Avira URL Cloudmalware
    http://185.208.159.226/100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/any100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/;100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3100%Avira URL Cloudmalware
    http://185.208.159.226/:100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/(100%Avira URL Cloudmalware
    http://93.88.203.34/cl/BatClipT100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/100%Avira URL Cloudmalware
    http://185.208.159.226/.100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$#100%Avira URL Cloudmalware
    http://185.208.159.226/6e7660115d80/100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/100%Avira URL Cloudmalware
    http://93.88.203.34/cl/BatClipT.bat100%Avira URL Cloudmalware
    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/s100%Avira URL Cloudmalware
    http://185.208.k0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    raw.githubusercontent.com
    185.199.109.133
    truefalse
      high
      ip-api.com
      208.95.112.1
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codefalse
          high
          http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/true
          • Avira URL Cloud: malware
          unknown
          http://ip-api.com/line/false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://93.88.203.34/cl/BatClipT.bat.226/Pexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codemnexplorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://185.208.159.226/pexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDj1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/a1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codeiexplorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeLf1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Y1776871603.exe, 00000000.00000003.1474426819.00000294FB8BB000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/V1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Uexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ip-api.com/line/E1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/R1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Nexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OID1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.208.159.226/1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/M1776871603.exe, 00000000.00000003.1474147972.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/any1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://93.88.203.34/cl/BatClipTexplorer.exe, 00000006.00000002.2695434254.0000020728F44000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codeindowsexplorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeM32explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeL1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/;1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://ip-api.com/line/-explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://185.208.159.226/:explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/(explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code21776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code11776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$#explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://185.208.159.226/.explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://ip-api.com/line/RUBYUA797739A5A68043409FBEC5CFF63BE680UwwEUQtfIAckUApWAFVXUVsidnZ1UHRwcAYCc3B1776871603.exe, explorer.exe.0.drfalse
                                  high
                                  https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code1nexplorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://185.208.159.226/6e7660115d80/explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://raw.githubusercontent.com/$Nj?explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://raw.githubusercontent.com/JN4?explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codea9explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code#9explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://raw.githubusercontent.com/1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://raw.githubusercontent.com/Gexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://raw.githubusercontent.com/KbM1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codev9explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code89explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://93.88.203.34/cl/BatClipT.batexplorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://185.208.kexplorer.exe, 00000006.00000002.2694983774.00000014809A8000.00000004.00000010.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://ip-api.com/line/?j1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474310515.00000294FB88F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/sexplorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        185.208.159.226
                                                        unknownSwitzerland
                                                        34888SIMPLECARRER2ITtrue
                                                        208.95.112.1
                                                        ip-api.comUnited States
                                                        53334TUT-ASUSfalse
                                                        185.199.109.133
                                                        raw.githubusercontent.comNetherlands
                                                        54113FASTLYUSfalse
                                                        Joe Sandbox version:42.0.0 Malachite
                                                        Analysis ID:1635405
                                                        Start date and time:2025-03-11 16:33:20 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 6m 6s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:13
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:1776871603.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@13/9@2/3
                                                        EGA Information:Failed
                                                        HCA Information:Failed
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 172.202.163.200, 4.245.163.56
                                                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target 1776871603.exe, PID 3332 because there are no executed function
                                                        • Execution Graph export aborted for target explorer.exe, PID 4176 because there are no executed function
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.