Loading ...

Play interactive tourEdit tour

Analysis Report 8QxrJSmRtc

Overview

General Information

Sample Name:8QxrJSmRtc (renamed file extension from none to exe)
Analysis ID:338144
MD5:6593b7ab157ac82967af0e92efa96134
SHA1:c50e003f5c9ebeebc798b6f00b09aae05518d6cf
SHA256:f8b132d8c750482bd5b6f03bae58f6805fb3480ef0904a21f0111ede5a1ebb1b

Most interesting Screenshot:

Detection

Fonix
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Fonix ransomware
Yara detected Ransomware_Generic
Deletes shadow drive data (may be related to ransomware)
May drop file containing decryption instructions (likely related to ransomware)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

Startup

  • System is w10x64
  • 8QxrJSmRtc.exe (PID: 6768 cmdline: 'C:\Users\user\Desktop\8QxrJSmRtc.exe' MD5: 6593B7AB157AC82967AF0E92EFA96134)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
8QxrJSmRtc.exeJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
    8QxrJSmRtc.exeJoeSecurity_FonixYara detected Fonix ransomwareJoe Security

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmpJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
        00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmpJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
          00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmpJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
            00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmpJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
              Process Memory Space: 8QxrJSmRtc.exe PID: 6768JoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                Click to see the 1 entries

                Unpacked PEs

                SourceRuleDescriptionAuthorStrings
                0.2.8QxrJSmRtc.exe.13b0000.0.unpackJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                  0.2.8QxrJSmRtc.exe.13b0000.0.unpackJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
                    0.0.8QxrJSmRtc.exe.13b0000.0.unpackJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                      0.0.8QxrJSmRtc.exe.13b0000.0.unpackJoeSecurity_FonixYara detected Fonix ransomwareJoe Security

                        Sigma Overview

                        No Sigma rule has matched

                        Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Antivirus / Scanner detection for submitted sampleShow sources
                        Source: 8QxrJSmRtc.exeAvira: detected
                        Multi AV Scanner detection for submitted fileShow sources
                        Source: 8QxrJSmRtc.exeVirustotal: Detection: 41%Perma Link
                        Source: 8QxrJSmRtc.exeReversingLabs: Detection: 58%
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01408900 CryptReleaseContext,_Init_thread_footer,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014081C0 CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__std_exception_copy,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014089F0 CryptGenRandom,CryptReleaseContext,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01408330 GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CryptReleaseContext,
                        Source: 8QxrJSmRtc.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: C:\~Ransomware\Fonix - 4.3.2\x64\Release\Fonix.pdb source: 8QxrJSmRtc.exe
                        Source: 8QxrJSmRtc.exeString found in binary or memory: https://code.jquery.com/jquery-latest.js
                        Source: 8QxrJSmRtc.exeString found in binary or memory: https://uupload.ir/files/g510_windows_10.gif
                        Source: 8QxrJSmRtc.exeString found in binary or memory: https://www.who.int

                        Spam, unwanted Advertisements and Ransom Demands:

                        barindex
                        Yara detected Fonix ransomwareShow sources
                        Source: Yara matchFile source: 8QxrJSmRtc.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 8QxrJSmRtc.exe PID: 6768, type: MEMORY
                        Source: Yara matchFile source: 0.2.8QxrJSmRtc.exe.13b0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.8QxrJSmRtc.exe.13b0000.0.unpack, type: UNPACKEDPE
                        Yara detected Ransomware_GenericShow sources
                        Source: Yara matchFile source: 8QxrJSmRtc.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 8QxrJSmRtc.exe PID: 6768, type: MEMORY
                        Source: Yara matchFile source: 0.2.8QxrJSmRtc.exe.13b0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.8QxrJSmRtc.exe.13b0000.0.unpack, type: UNPACKEDPE
                        Deletes shadow drive data (may be related to ransomware)Show sources
                        Source: 8QxrJSmRtc.exe, 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmpBinary or memory string: start cmd.exe /c vssadmin Delete Shadows /All /Quiet
                        Source: 8QxrJSmRtc.exeBinary or memory string: start cmd.exe /c vssadmin Delete Shadows /All /Quiet
                        May drop file containing decryption instructions (likely related to ransomware)Show sources
                        Source: 8QxrJSmRtc.exe, 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmpBinary or memory string: How To Decrypt Files.hta\Help.txt
                        Source: 8QxrJSmRtc.exeBinary or memory string: How To Decrypt Files.hta\Help.txt
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0145F914
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01458928
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0145F07C
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013BE0E0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013E30E0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0146A32C
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01456330
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014453D4
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01451BDC
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013E1A70
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0144F2C4
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013BCAD0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0144F548
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013B6D20
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013E4D00
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013C5D40
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013E4580
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014094C0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0145DCC4
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013B84A0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013B13F0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013B5CD0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013E2700
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_013C0F80
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_0144F7B0
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014597B8
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014556B4
                        Source: classification engineClassification label: mal84.rans.evad.winEXE@1/0@0/0
                        Source: 8QxrJSmRtc.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        Source: 8QxrJSmRtc.exeVirustotal: Detection: 41%
                        Source: 8QxrJSmRtc.exeReversingLabs: Detection: 58%
                        Source: 8QxrJSmRtc.exeStatic file information: File size 1266176 > 1048576
                        Source: 8QxrJSmRtc.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: C:\~Ransomware\Fonix - 4.3.2\x64\Release\Fonix.pdb source: 8QxrJSmRtc.exe
                        Source: 8QxrJSmRtc.exeStatic PE information: section name: _RDATA
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01421020 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,

                        Malware Analysis System Evasion:

                        barindex
                        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                        Source: 8QxrJSmRtc.exeBinary or memory string: OUTPUT ERROR ::::].FONIXZIP FILECOPY TO PATH \CPUB.KEYREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM /V DISABLETASKMGR /T REG_DWORD /D 1 /FREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER" /V DISABLEANTISPYWARE /T REG_DWORD /D 1 /FREG DELETE HKEY_CURRENT_USER\SYSTEM\CURRENTCONTROLSET\CONTROL\SAFEBOOT /VA /FREG DELETE HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTROL\SAFEBOOT /VA /FSTART CMD.EXE /C ICACLS * /GRANT EVERYONE:(OI)(CI)F /T /C /QSTART CMD.EXE /C TASKKILL /T /F /IM SQL* && TASKKILL /F /T /IM VEEAM* && TASKKILL /F /T /IM MSEXCHANGE* && TASKKILL /F /T /IM MICROSOFT.EXCHANGE* && TASKKILL /F /T /IM PVX* && TASKKILL /F /T /IM DBSRV* && EXITSTART UP ATTRIB +H +S "%APPDATA%\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"SCHTASKS /CREATE /SC ONLOGON /TN FONIX /TR C:\PROGRAMDATA\XINOF.EXE /RU SYSTEM /RL HIGHEST /FCOPY C:\PROGRAMDATA\XINOF.EXE "%APPDATA%\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"COPY C:\PROGRAMDATA\XINOF.EXE "C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXEXINOF.EXESCHTASKS /CREATE /SC ONLOGON /TN FONIX /TR C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FFLAG C:\PROGRAMDATA\NONSNONSFLAGBLACK LIST MMS.EXESCHEDUL2.EXESCHEDHELP.EXETIB_MOUNTER_MONITOR.EXESQLIOSIM.EXESQLAGENT.EXESQLMAINT.EXESQLSTUBSS.EXECSRSS.EXESQLCEIP.EXEMSTSC.EXETASKMGR.EXESQLSERVR.EXEQBIDPSERVICE.EXESQLSERVER.EXEMSFTESQL.EXESQLAGENT.EXESQLBROWSER.EXESQLWRITER.EXEORACLE.EXEOCSSD.EXEDBSNMP.EXESYNCTIME.EXEMYDESKTOPQOS.EXEAGNTSVC.EXEISQLPPLUSSVC.EXEISQLPUSSVC.EXEXFSSVCCON.EXEMYDESKTOPSERVICE.EXEOCAUTOUPDS.EXEENCSVC.EXEFIREFOXCONFIG.EXETBIRDCONFIG.EXEOCOMM.EXEMYSQLD.EXEMYSQLD-NT.EXEMYSQLD-OPT.EXEDBENG50.EXESQBCORESERVICE.EXEEXCEL.EXEINFOPATH.EXEMSACCESS.EXEMSPUB.EXEONENOTE.EXEOUTLOOK.EXEPOWERPNT.EXESTREAM.EXETHEBAT.EXETHEBAT64.EXETHUNDERBIRD.EXEVISIO.EXEWINWORD.EXEWORDPAD.EXENOTEPAD.EXEPAINT.EXENOTEPAD++.EXEENDNOTE.EXEVMWAREUSER.EXEVMWARESERVICE.EXEVBOXSERVICE.EXEVBOXTRAY.EXESANDBOXIEDCOMLAUNCH.EXEPROCMON.EXEREGMON.EXEFILEMON.EXEWIRESHARK.EXENETMON.EXEVMTOOLSD.EXENTOSKRNL.EXESSMS.EXECBSERVICE.EXEHTTPD.EXEJUSCHED.EXEJUCHECK.EXEJAVAW.EXEJAVA.EXEIPTRAY.EXEIPERIUS.EXEFILEZILLA.EXEDATACOLLECTORSVC.EXEEDGETRANSPORT.EXESTORE.EXEACROTRAY.EXEAGENT.EXESAGECSCLIENT.EXEWSUSSERVICE.EXESLACK.EXENODE.EXEW3WP.EXEMYSQL.EXEMSMDSRV.EXEMSDTSSRVR.EXEFDLAUNCHER.EXEFDHOST.EXEREPORTINGS
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: 8QxrJSmRtc.exeBinary or memory string: Output error ::::].FONIXzip filecopy to path \Cpub.keyreg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /freg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /freg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /Freg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /Fstart cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Qstart cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exitstart up attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /Fcopy C:\ProgramData\XINOF.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"copy C:\ProgramData\XINOF.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exeXINOF.exeschtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /Freg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /fflag C:\ProgramData\nonsnonsFlagblack list mms.exeschedul2.exeschedhelp.exetib_mounter_monitor.exeSQLIOSIM.EXESqlagent.exesqlmaint.exesqlstubss.execsrss.exesqlceip.exemstsc.exetaskmgr.exesqlservr.exeQBIDPService.exesqlserver.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exemydesktopqos.exeagntsvc.exeisqlpplussvc.exeisqlpussvc.exexfssvccon.exemydesktopservice.exeocautoupds.exeencsvc.exefirefoxconfig.exetbirdconfig.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng50.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exestream.exethebat.exethebat64.exeThunderbird.exevisio.exewinword.exewordpad.exenotepad.exepaint.exenotepad++.exeendnote.exevmwareuser.exevmwareservice.exevboxservice.exevboxtray.exeSandboxiedcomlaunch.exeprocmon.exeregmon.exefilemon.exewireshark.exenetmon.exevmtoolsd.exentoskrnl.exeSsms.execbService.exehttpd.exejusched.exejucheck.exejavaw.exejava.exeiptray.exeIperius.exeFileZilla.exeDataCollectorSvc.exeEdgeTransport.exestore.exeacrotray.exeagent.exeSageCSClient.exewsusservice.exeslack.exenode.exew3wp.exemysql.exemsmdsrv.exeMsDtsSrvr.exefdlauncher.exefdhost.exeReportingS
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01421FE8 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01421FE8 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01422D3C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_014517F8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: try_get_function,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\8QxrJSmRtc.exeCode function: 0_2_01423200 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management InstrumentationApplication Shimming1Application Shimming1File Deletion1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySecurity Software Discovery121Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerSystem Information Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

                        Behavior Graph

                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        SourceDetectionScannerLabelLink
                        8QxrJSmRtc.exe41%VirustotalBrowse
                        8QxrJSmRtc.exe59%ReversingLabsWin64.Ransomware.Fonix
                        8QxrJSmRtc.exe100%AviraHEUR/AGEN.1138883

                        Dropped Files

                        No Antivirus matches

                        Unpacked PE Files

                        SourceDetectionScannerLabelLinkDownload
                        0.0.8QxrJSmRtc.exe.13b0000.0.unpack100%AviraHEUR/AGEN.1138883Download File
                        0.2.8QxrJSmRtc.exe.13b0000.0.unpack100%AviraHEUR/AGEN.1138883Download File

                        Domains

                        No Antivirus matches

                        URLs

                        No Antivirus matches

                        Domains and IPs

                        Contacted Domains

                        No contacted domains info

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        https://uupload.ir/files/g510_windows_10.gif8QxrJSmRtc.exefalse
                          high
                          https://www.who.int8QxrJSmRtc.exefalse
                            high
                            https://code.jquery.com/jquery-latest.js8QxrJSmRtc.exefalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:338144
                              Start date:11.01.2021
                              Start time:17:59:11
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 2m 40s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:8QxrJSmRtc (renamed file extension from none to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:1
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal84.rans.evad.winEXE@1/0@0/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Stop behavior analysis, all processes terminated

                              Simulations

                              Behavior and APIs

                              No simulations

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              No created / dropped files found

                              Static File Info

                              General

                              File type:PE32+ executable (console) x86-64, for MS Windows
                              Entropy (8bit):6.349484774601221
                              TrID:
                              • Win64 Executable Console (202006/5) 92.65%
                              • Win64 Executable (generic) (12005/4) 5.51%
                              • Generic Win/DOS Executable (2004/3) 0.92%
                              • DOS Executable Generic (2002/1) 0.92%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:8QxrJSmRtc.exe
                              File size:1266176
                              MD5:6593b7ab157ac82967af0e92efa96134
                              SHA1:c50e003f5c9ebeebc798b6f00b09aae05518d6cf
                              SHA256:f8b132d8c750482bd5b6f03bae58f6805fb3480ef0904a21f0111ede5a1ebb1b
                              SHA512:2028cbd94372a900ada0a5daeb68a7608e2013adcac4750c36979d137e4c29b3c5a3e524b42e6b4563ad6d27b5990881f2fdab3ede5b1296ec4c4fb96cc0bbc6
                              SSDEEP:24576:z9C4QYc8ntZP2sQQ0GqrCPQX8BYOzhjZAJZ1o:z9C4PnnP5QQ0xrj8Cshir
                              File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........}P^...^...^.......J.......S............;.._.......O.......T...............Q...^...........r.......\......._......._...^..._..

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x4729a4
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows cui
                              Image File Characteristics:EXECUTABLE_IMAGE
                              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x5FF0BEEA [Sat Jan 2 18:43:54 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:0c0d7ab54c9443fe1117b1f5373e7fb1

                              Entrypoint Preview

                              Instruction
                              dec eax
                              sub esp, 28h
                              call 00007F2978719178h
                              dec eax
                              add esp, 28h
                              jmp 00007F2978718797h
                              int3
                              int3
                              dec eax
                              sub esp, 28h
                              dec ebp
                              mov eax, dword ptr [ecx+38h]
                              dec eax
                              mov ecx, edx
                              dec ecx
                              mov edx, ecx
                              call 00007F2978718932h
                              mov eax, 00000001h
                              dec eax
                              add esp, 28h
                              ret
                              int3
                              int3
                              int3
                              inc eax
                              push ebx
                              inc ebp
                              mov ebx, dword ptr [eax]
                              dec eax
                              mov ebx, edx
                              inc ecx
                              and ebx, FFFFFFF8h
                              dec esp
                              mov ecx, ecx
                              inc ecx
                              test byte ptr [eax], 00000004h
                              dec esp
                              mov edx, ecx
                              je 00007F2978718935h
                              inc ecx
                              mov eax, dword ptr [eax+08h]
                              dec ebp
                              arpl word ptr [eax+04h], dx
                              neg eax
                              dec esp
                              add edx, ecx
                              dec eax
                              arpl ax, cx
                              dec esp
                              and edx, ecx
                              dec ecx
                              arpl bx, ax
                              dec edx
                              mov edx, dword ptr [eax+edx]
                              dec eax
                              mov eax, dword ptr [ebx+10h]
                              mov ecx, dword ptr [eax+08h]
                              dec eax
                              mov eax, dword ptr [ebx+08h]
                              test byte ptr [ecx+eax+03h], 0000000Fh
                              je 00007F297871892Dh
                              movzx eax, byte ptr [ecx+eax+03h]
                              and eax, FFFFFFF0h
                              dec esp
                              add ecx, eax
                              dec esp
                              xor ecx, edx
                              dec ecx
                              mov ecx, ecx
                              pop ebx
                              jmp 00007F2978717FD2h
                              int3
                              dec eax
                              mov eax, esp
                              dec eax
                              mov dword ptr [eax+08h], ebx
                              dec eax
                              mov dword ptr [eax+10h], ebp
                              dec eax
                              mov dword ptr [eax+18h], esi
                              dec eax
                              mov dword ptr [eax+20h], edi
                              inc ecx
                              push esi
                              dec eax
                              sub esp, 20h
                              dec ecx
                              mov ebx, dword ptr [ecx+38h]
                              dec eax
                              mov esi, edx
                              dec ebp
                              mov esi, eax
                              dec eax
                              mov ebp, ecx
                              dec ecx
                              mov edx, ecx
                              dec eax
                              mov ecx, esi
                              dec ecx
                              mov edi, ecx
                              dec esp
                              lea eax, dword ptr [ebx+04h]
                              call 00007F2978718891h

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x11f6980xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1380000x1e0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x12d0000x9de0.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0xffc600x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xffb300x130.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xcba040xcbc00False0.472408215107data6.42014647338IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0xcd0000x539380x53a00False0.40311448991data5.43180771387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x1210000xbd4c0x8a00False0.188688858696data4.87188898109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .pdata0x12d0000x9de00x9e00False0.485289754747data5.98253637707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              _RDATA0x1370000x940x200False0.20703125data1.38531860657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x1380000x1e00x200False0.529296875data4.71229819329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1390000x2ba00x2c00False0.00301846590909data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_MANIFEST0x1380600x17dXML 1.0 document textEnglishUnited States

                              Imports

                              DLLImport
                              KERNEL32.DLLSetThreadPriority, CreateMutexW, InitializeCriticalSectionEx, FindClose, LocalAlloc, ReleaseMutex, GetLocaleInfoA, OpenProcess, SetFileAttributesW, CreateToolhelp32Snapshot, Sleep, FormatMessageW, CopyFileA, GetLastError, Process32NextW, DeleteFileA, Process32FirstW, CloseHandle, RaiseException, DecodePointer, GetDriveTypeA, LocalFree, DeleteCriticalSection, CopyFileW, WideCharToMultiByte, GetConsoleWindow, GetDiskFreeSpaceExA, OpenMutexW, GetDriveTypeW, SetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, GetCurrentThread, GetThreadTimes, SetEndOfFile, WriteConsoleW, CreateFileW, SetStdHandle, GetProcessHeap, SetEnvironmentVariableW, TerminateProcess, GetCurrentProcess, FindNextFileW, SetPriorityClass, FindFirstFileW, SetThreadPriorityBoost, SetProcessPriorityBoost, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, HeapSize, HeapReAlloc, ReadConsoleW, ReadFile, GetFileAttributesExW, CreateProcessW, GetExitCodeProcess, GetConsoleMode, GetConsoleCP, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, GetCurrentThreadId, WaitForSingleObjectEx, SwitchToThread, EncodePointer, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, GetModuleHandleW, GetProcAddress, CompareStringW, LCMapStringW, GetLocaleInfoW, GetCPInfo, IsDebuggerPresent, OutputDebugStringW, SetEvent, ResetEvent, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetStartupInfoW, GetCurrentProcessId, CreateTimerQueue, SignalObjectAndWait, CreateThread, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetProcessAffinityMask, SetThreadAffinityMask, RegisterWaitForSingleObject, UnregisterWait, FreeLibrary, FreeLibraryAndExitThread, GetModuleFileNameW, GetModuleHandleA, LoadLibraryExW, GetVersionExW, VirtualAlloc, VirtualProtect, VirtualFree, DuplicateHandle, ReleaseSemaphore, InterlockedPopEntrySList, InterlockedPushEntrySList, InterlockedFlushSList, QueryDepthSList, UnregisterWaitEx, LoadLibraryW, WaitForSingleObject, RtlUnwindEx, RtlPcToFileHeader, ExitProcess, GetModuleHandleExW, ExitThread, MoveFileExW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, GetFileSizeEx, SetFilePointerEx, GetFileType, HeapAlloc, HeapFree, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, RtlUnwind
                              ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameA
                              IPHLPAPI.DLLGetIpNetTable
                              NETAPI32.dllNetShareEnum, NetApiBufferFree
                              USER32.dllGetKeyboardLayoutList, ShowWindow, MessageBoxW, SystemParametersInfoW
                              WININET.dllInternetCheckConnectionA
                              WS2_32.dllinet_ntoa, socket, connect, WSAGetLastError, send, WSAStartup, gethostbyname, closesocket, WSACleanup, recv, htons

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              No network behavior found

                              Code Manipulations

                              Statistics

                              System Behavior

                              General

                              Start time:17:59:58
                              Start date:11/01/2021
                              Path:C:\Users\user\Desktop\8QxrJSmRtc.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Users\user\Desktop\8QxrJSmRtc.exe'
                              Imagebase:0x13b0000
                              File size:1266176 bytes
                              MD5 hash:6593B7AB157AC82967AF0E92EFA96134
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ransomware_Generic, Description: Yara detected Ransomware_Generic, Source: 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Fonix, Description: Yara detected Fonix ransomware, Source: 00000000.00000000.646603344.000000000147D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ransomware_Generic, Description: Yara detected Ransomware_Generic, Source: 00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Fonix, Description: Yara detected Fonix ransomware, Source: 00000000.00000002.657343156.000000000147D000.00000002.00020000.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >