Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jtijhkasdjrhg.exe

Overview

General Information

Sample name:jtijhkasdjrhg.exe
Analysis ID:1635469
MD5:a0c0ee4d7de0c9cac81661a23530bafb
SHA1:b2027c880471cfc27de4465c0f008b8cb6038a84
SHA256:077364482914188a642ea8de919005104d1609840ac543f6479bf63fc3c54d67
Tags:exeuser-aachum
Infos:

Detection

RedLine
Score:88
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Reads the System eventlog
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
Enables debug privileges
Enables security privileges
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • jtijhkasdjrhg.exe (PID: 8048 cmdline: "C:\Users\user\Desktop\jtijhkasdjrhg.exe" MD5: A0C0EE4D7DE0C9CAC81661A23530BAFB)
    • conhost.exe (PID: 8072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["89.23.98.216:81"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: jtijhkasdjrhg.exe PID: 8048JoeSecurity_RedLineYara detected RedLine StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: jtijhkasdjrhg.exeAvira: detected
    Source: jtijhkasdjrhg.exeMalware Configuration Extractor: RedLine {"C2 url": ["89.23.98.216:81"], "Bot Id": "button1"}
    Source: jtijhkasdjrhg.exeReversingLabs: Detection: 68%
    Source: jtijhkasdjrhg.exeVirustotal: Detection: 75%Perma Link
    Source: jtijhkasdjrhg.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: jtijhkasdjrhg.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: 89.23.98.216:81
    Source: global trafficTCP traffic: 192.168.2.5:59204 -> 162.159.36.2:53
    Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: #www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ippai
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.000000000280D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002920000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_7257947e-5

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

    System Summary

    barindex
    Source: jtijhkasdjrhg.exe, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess token adjusted: SecurityJump to behavior
    Source: jtijhkasdjrhg.exe, 00000003.00000000.1271247652.00000000001AE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSpulebane.exe" vs jtijhkasdjrhg.exe
    Source: jtijhkasdjrhg.exeBinary or memory string: OriginalFilenameSpulebane.exe" vs jtijhkasdjrhg.exe
    Source: jtijhkasdjrhg.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: jtijhkasdjrhg.exe, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: jtijhkasdjrhg.exe, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: classification engineClassification label: mal88.troj.evad.winEXE@2/1@1/0
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jtijhkasdjrhg.exe.logJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8072:120:WilError_03
    Source: jtijhkasdjrhg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: jtijhkasdjrhg.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: jtijhkasdjrhg.exeReversingLabs: Detection: 68%
    Source: jtijhkasdjrhg.exeVirustotal: Detection: 75%
    Source: unknownProcess created: C:\Users\user\Desktop\jtijhkasdjrhg.exe "C:\Users\user\Desktop\jtijhkasdjrhg.exe"
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeSection loaded: textshaping.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: jtijhkasdjrhg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: jtijhkasdjrhg.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: jtijhkasdjrhg.exeStatic PE information: 0xB86EFD41 [Fri Jan 20 10:38:57 2068 UTC]
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeCode function: 3_2_00007FF7C817715D push E962C8DAh; ret 3_2_00007FF7C8177199
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeCode function: 3_2_00007FF7C817456C push cs; retf 3_2_00007FF7C817456F
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.000000000280D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeMemory allocated: 670000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeMemory allocated: 1A6E0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exe TID: 6724Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.000000000280D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeMemory allocated: page read and write | page guardJump to behavior
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002920000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: jtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002920000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeQueries volume information: C:\Users\user\Desktop\jtijhkasdjrhg.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\jtijhkasdjrhg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: jtijhkasdjrhg.exe PID: 8048, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: jtijhkasdjrhg.exe PID: 8048, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    2
    Process Injection
    1
    Masquerading
    11
    Input Capture
    11
    Security Software Discovery
    Remote Services11
    Input Capture
    1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Process Injection
    NTDS12
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Timestomp
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    jtijhkasdjrhg.exe68%ReversingLabsByteCode-MSIL.Ransomware.RedLine
    jtijhkasdjrhg.exe75%VirustotalBrowse
    jtijhkasdjrhg.exe100%AviraTR/Spy.RedLine.jtxjt
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    89.23.98.216:810%Avira URL Cloudsafe
    https://api.ip.s0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    18.31.95.13.in-addr.arpa
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      89.23.98.216:81true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.ip.sb/ipjtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://api.ip.sjtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://api.ip.sb/ippaijtijhkasdjrhg.exe, 00000003.00000002.1285546909.0000000002748000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://discord.com/api/v9/users/jtijhkasdjrhg.exe, 00000003.00000002.1285546909.000000000280D000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1635469
            Start date and time:2025-03-11 17:41:27 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 16s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:18
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:jtijhkasdjrhg.exe
            Detection:MAL
            Classification:mal88.troj.evad.winEXE@2/1@1/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 1
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 23.60.203.209, 4.245.163.56, 150.171.27.10, 13.95.31.18, 172.202.163.200
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, g.bing.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\jtijhkasdjrhg.exe
            File Type:CSV text
            Category:dropped
            Size (bytes):1281
            Entropy (8bit):5.370111951859942
            Encrypted:false
            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
            MD5:12C61586CD59AA6F2A21DF30501F71BD
            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
            Malicious:true
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
            File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.301386431095736
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:jtijhkasdjrhg.exe
            File size:550'912 bytes
            MD5:a0c0ee4d7de0c9cac81661a23530bafb
            SHA1:b2027c880471cfc27de4465c0f008b8cb6038a84
            SHA256:077364482914188a642ea8de919005104d1609840ac543f6479bf63fc3c54d67
            SHA512:449dc825e4daa0b108b0362c15dce8599f6a78863b3f25fd3076812f89183f69ff64e7c458ac0ad0b427868b6cc89d6e9d6e8c9bb9495786fbc31472026e191f
            SSDEEP:6144:EYqdc0NkzDV4L3eTIlA41qpcN3p0NIb88WsNMPaKFP3b2V122J0sL:E9J8+jPycN3CNIb88WsNMP5F1k
            TLSH:DFC49D81B359AD12DA6B06F6900518A01E71FF79E90BC71AAEC77FBF7EB23215111807
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A.n...............0.................. ........@.. ....................................@................................
            Icon Hash:079d1d1d4c72e64b
            Entrypoint:0x42cace
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0xB86EFD41 [Fri Jan 20 10:38:57 2068 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x2ca7c0x4f.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x5b662.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x2aad40x2ac001454ebf39ad9272ee06bb4e2ba86b993False0.4838724415204678data6.343840538809773IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0x2e0000x5b6620x5b800278a80ccc3a5e692c64084f117be5586False0.2557873335040984data4.464105663187214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x8a0000xc0x200ba22bcbaf74c8c3ec0d92fb8827fe2dbFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x2e2500x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2703360.20358685682161137
            RT_ICON0x702780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.34492192121140425
            RT_ICON0x80aa00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.4390056683986774
            RT_ICON0x84cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5059128630705394
            RT_ICON0x872700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5218105065666041
            RT_ICON0x883180x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.6020491803278688
            RT_ICON0x88ca00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6338652482269503
            RT_GROUP_ICON0x891080x68data0.7403846153846154
            RT_VERSION0x891700x306data0.46382428940568476
            RT_MANIFEST0x894780x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
            DLLImport
            mscoree.dll_CorExeMain
            DescriptionData
            Translation0x0000 0x04b0
            CommentsRubaiyat App
            CompanyNameGroup
            FileDescriptionGroup
            FileVersion39.55.12
            InternalNameSpulebane.exe
            LegalCopyrightGroup Corp. 2005
            OriginalFilenameSpulebane.exe
            ProductName
            ProductVersion39.55.12
            Assembly Version37.40.78.0
            TimestampSource PortDest PortSource IPDest IP
            Mar 11, 2025 17:42:50.997287989 CET5920453192.168.2.5162.159.36.2
            Mar 11, 2025 17:42:51.001972914 CET5359204162.159.36.2192.168.2.5
            Mar 11, 2025 17:42:51.002049923 CET5920453192.168.2.5162.159.36.2
            Mar 11, 2025 17:42:51.007039070 CET5359204162.159.36.2192.168.2.5
            Mar 11, 2025 17:42:51.504803896 CET5920453192.168.2.5162.159.36.2
            Mar 11, 2025 17:42:51.509619951 CET5359204162.159.36.2192.168.2.5
            Mar 11, 2025 17:42:51.509696007 CET5920453192.168.2.5162.159.36.2
            TimestampSource PortDest PortSource IPDest IP
            Mar 11, 2025 17:42:50.995135069 CET5363423162.159.36.2192.168.2.5
            Mar 11, 2025 17:42:51.638498068 CET5330453192.168.2.51.1.1.1
            Mar 11, 2025 17:42:51.645762920 CET53533041.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Mar 11, 2025 17:42:51.638498068 CET192.168.2.51.1.1.10x652bStandard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Mar 11, 2025 17:42:51.645762920 CET1.1.1.1192.168.2.50x652bName error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:3
            Start time:12:42:17
            Start date:11/03/2025
            Path:C:\Users\user\Desktop\jtijhkasdjrhg.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\jtijhkasdjrhg.exe"
            Imagebase:0x180000
            File size:550'912 bytes
            MD5 hash:A0C0EE4D7DE0C9CAC81661A23530BAFB
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:4
            Start time:12:42:17
            Start date:11/03/2025
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7e2000000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:20.7%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:3
              Total number of Limit Nodes:0
              execution_graph 2345 7ff7c81784e1 2346 7ff7c81784ff GetConsoleWindow 2345->2346 2348 7ff7c81785c3 2346->2348

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 55 7ff7c81784e1-7ff7c81784fd 56 7ff7c8178500-7ff7c81785c1 GetConsoleWindow 55->56 57 7ff7c81784ff 55->57 61 7ff7c81785c9-7ff7c8178619 56->61 62 7ff7c81785c3 56->62 57->56 62->61
              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.1288855691.00007FF7C8170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C8170000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_7ff7c8170000_jtijhkasdjrhg.jbxd
              Similarity
              • API ID: ConsoleWindow
              • String ID:
              • API String ID: 2863861424-0
              • Opcode ID: b66accb9d97f83f5a0ec3feca256f579c2b35d69cf78a5341c397d63c096195c
              • Instruction ID: a0fafe3bcadec942836055613df093156fba8506a1b9837fc2ea255ecf9f29bd
              • Opcode Fuzzy Hash: b66accb9d97f83f5a0ec3feca256f579c2b35d69cf78a5341c397d63c096195c
              • Instruction Fuzzy Hash: 3B41977090CA9C8FDB55EBA89845AEDBBF0FB5A310F1041AAD049D3252DA74A886CB41