Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nR63RhmdVb.exe

Overview

General Information

Sample name:nR63RhmdVb.exe
renamed because original name is a hash value
Original sample name:7685178D4A459B36E605853D3E08AB69.exe
Analysis ID:1637406
MD5:7685178d4a459b36e605853d3e08ab69
SHA1:6bef7015cf72d88dbbfbc09350981ae4fd535a6f
SHA256:5b14caa155f6ea778f391015a79bce4fd03a387eef5d4c8fa5f962dfcb2953b6
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:92
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Reads the System eventlog
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
Enables security privileges
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • nR63RhmdVb.exe (PID: 6632 cmdline: "C:\Users\user\Desktop\nR63RhmdVb.exe" MD5: 7685178D4A459B36E605853D3E08AB69)
    • conhost.exe (PID: 6636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["213.209.129.155:27667"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: nR63RhmdVb.exe PID: 6632JoeSecurity_RedLineYara detected RedLine StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: nR63RhmdVb.exeAvira: detected
    Source: nR63RhmdVb.exeMalware Configuration Extractor: RedLine {"C2 url": ["213.209.129.155:27667"], "Bot Id": "button1"}
    Source: nR63RhmdVb.exeReversingLabs: Detection: 63%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.0% probability
    Source: nR63RhmdVb.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: nR63RhmdVb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: 213.209.129.155:27667
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: #www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002D10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_8a37b87f-b

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

    System Summary

    barindex
    Source: nR63RhmdVb.exe, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess token adjusted: SecurityJump to behavior
    Source: nR63RhmdVb.exe, 00000000.00000000.845841702.000000000064E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSpulebane.exe" vs nR63RhmdVb.exe
    Source: nR63RhmdVb.exeBinary or memory string: OriginalFilenameSpulebane.exe" vs nR63RhmdVb.exe
    Source: nR63RhmdVb.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: nR63RhmdVb.exe, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: nR63RhmdVb.exe, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: classification engineClassification label: mal92.troj.evad.winEXE@2/1@0/0
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nR63RhmdVb.exe.logJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6636:120:WilError_03
    Source: nR63RhmdVb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: nR63RhmdVb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: nR63RhmdVb.exeReversingLabs: Detection: 63%
    Source: unknownProcess created: C:\Users\user\Desktop\nR63RhmdVb.exe "C:\Users\user\Desktop\nR63RhmdVb.exe"
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeSection loaded: textshaping.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: nR63RhmdVb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: nR63RhmdVb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: nR63RhmdVb.exeStatic PE information: 0xB86EFD41 [Fri Jan 20 10:38:57 2068 UTC]
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeCode function: 0_2_00007FFB9AB1715D push ecx; retf 0_2_00007FFB9AB1718C
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeCode function: 0_2_00007FFB9AB1456C push cs; retf 0_2_00007FFB9AB1456F
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeCode function: 0_2_00007FFB9AB1718D push E95F1DDAh; ret 0_2_00007FFB9AB17199
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeMemory allocated: 1AAD0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exe TID: 6952Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeMemory allocated: page read and write | page guardJump to behavior
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002D10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002D10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindowy
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeQueries volume information: C:\Users\user\Desktop\nR63RhmdVb.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\nR63RhmdVb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: nR63RhmdVb.exe PID: 6632, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: nR63RhmdVb.exe PID: 6632, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    2
    Process Injection
    1
    Masquerading
    11
    Input Capture
    11
    Security Software Discovery
    Remote Services11
    Input Capture
    1
    Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Process Injection
    NTDS12
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Timestomp
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    nR63RhmdVb.exe63%ReversingLabsByteCode-MSIL.Ransomware.RedLine
    nR63RhmdVb.exe100%AviraTR/Spy.RedLine.nwhil
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    213.209.129.155:276670%Avira URL Cloudsafe
    https://api.ip.s0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    213.209.129.155:27667true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ip.sb/ipnR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B38000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://api.ip.snR63RhmdVb.exe, 00000000.00000002.883612990.0000000002B38000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://discord.com/api/v9/users/nR63RhmdVb.exe, 00000000.00000002.883612990.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        No contacted IP infos
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1637406
        Start date and time:2025-03-13 15:56:12 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 55s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:nR63RhmdVb.exe
        renamed because original name is a hash value
        Original Sample Name:7685178D4A459B36E605853D3E08AB69.exe
        Detection:MAL
        Classification:mal92.troj.evad.winEXE@2/1@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 1
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\nR63RhmdVb.exe
        File Type:CSV text
        Category:dropped
        Size (bytes):1281
        Entropy (8bit):5.370111951859942
        Encrypted:false
        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
        MD5:12C61586CD59AA6F2A21DF30501F71BD
        SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
        SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
        SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
        Malicious:true
        Reputation:high, very likely benign file
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.301345762995628
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:nR63RhmdVb.exe
        File size:550'912 bytes
        MD5:7685178d4a459b36e605853d3e08ab69
        SHA1:6bef7015cf72d88dbbfbc09350981ae4fd535a6f
        SHA256:5b14caa155f6ea778f391015a79bce4fd03a387eef5d4c8fa5f962dfcb2953b6
        SHA512:3e4522fafae7144c659a4c1ec2e79dd29f1da9088ba7a1683b77188ed17a0ba376ded6790bdcd7c8dd866752482e9448ab69074b3c76685eddf60771283839de
        SSDEEP:6144:YYqdc0NkzDVM/j6TIlA41w1cN3p0NIb88WsNMPaKFP3b2V122J0sL:Y9J8K7zMcN3CNIb88WsNMP5F1k
        TLSH:EDC49D81B359AD12DA6B06F6900518A01E71FF79E90BC71AAEC77FBF7EB23215111807
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A.n...............0.................. ........@.. ....................................@................................
        Icon Hash:079d1d1d4c72e64b
        Entrypoint:0x42cace
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xB86EFD41 [Fri Jan 20 10:38:57 2068 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x2ca780x53.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x5b662.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x2aad40x2ac00ff0ad6ed4597ed5472870f2a89380a50False0.483866730628655data6.343717551957301IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x2e0000x5b6620x5b800278a80ccc3a5e692c64084f117be5586False0.2557873335040984data4.464105663187214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x8a0000xc0x200ba22bcbaf74c8c3ec0d92fb8827fe2dbFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x2e2500x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2703360.20358685682161137
        RT_ICON0x702780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.34492192121140425
        RT_ICON0x80aa00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.4390056683986774
        RT_ICON0x84cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5059128630705394
        RT_ICON0x872700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5218105065666041
        RT_ICON0x883180x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.6020491803278688
        RT_ICON0x88ca00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6338652482269503
        RT_GROUP_ICON0x891080x68data0.7403846153846154
        RT_VERSION0x891700x306data0.46382428940568476
        RT_MANIFEST0x894780x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        DescriptionData
        Translation0x0000 0x04b0
        CommentsRubaiyat App
        CompanyNameGroup
        FileDescriptionGroup
        FileVersion39.55.12
        InternalNameSpulebane.exe
        LegalCopyrightGroup Corp. 2005
        OriginalFilenameSpulebane.exe
        ProductName
        ProductVersion39.55.12
        Assembly Version37.40.78.0
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:57:02
        Start date:13/03/2025
        Path:C:\Users\user\Desktop\nR63RhmdVb.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\nR63RhmdVb.exe"
        Imagebase:0x620000
        File size:550'912 bytes
        MD5 hash:7685178D4A459B36E605853D3E08AB69
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:10:57:02
        Start date:13/03/2025
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff642da0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:22.5%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:3
          Total number of Limit Nodes:0
          execution_graph 2255 7ffb9ab184e1 2256 7ffb9ab184ff GetConsoleWindow 2255->2256 2258 7ffb9ab185c3 2256->2258

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.885354440.00007FFB9AB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB9AB10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffb9ab10000_nR63RhmdVb.jbxd
          Similarity
          • API ID: ConsoleWindow
          • String ID:
          • API String ID: 2863861424-0
          • Opcode ID: d2d9a1efc2af365c5b8f21b08a53d8e623dbaf147e764259fa0911774aa6f60c
          • Instruction ID: 249b1b4a332e7e7699290d4fee44b53172fb87ad6e6f41ab3a2e52ddcae89acd
          • Opcode Fuzzy Hash: d2d9a1efc2af365c5b8f21b08a53d8e623dbaf147e764259fa0911774aa6f60c
          • Instruction Fuzzy Hash: 54418A7090C68C8FDB55EFA8C855BE9BBF0FF56310F1041AAD049D7292DA74A886CB41