Loading ...

Play interactive tourEdit tour

Analysis Report Incaseformat

Overview

General Information

Sample Name:Incaseformat (renamed file extension from none to exe)
Analysis ID:339452
MD5:1ea8bea4055adc9edf91e03b0c80e68a
SHA1:300b32ae0a70e86eecbccc2b850d783ded5a0f69
SHA256:3c8c16428fe5b2d67ed59d543805e5ec63b3565f05305cbc193c961107e56f1d

Most interesting Screenshot:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Creates an undocumented autostart registry key
Drops executable to a common third party application directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a DirectInput object (often for capturing keystrokes)
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • Incaseformat.exe (PID: 3504 cmdline: 'C:\Users\user\Desktop\Incaseformat.exe' MD5: 1EA8BEA4055ADC9EDF91E03B0C80E68A)
  • lvrslql.exe (PID: 5264 cmdline: C:\PROGRA~3\Mozilla\lvrslql.exe -ddeznal MD5: 0174F8B5E7DD2E44B57EBBE3742B216F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: Incaseformat.exeAvira: detected
Antivirus detection for dropped fileShow sources
Source: C:\ProgramData\Mozilla\lvrslql.exeAvira: detection malicious, Label: TR/Dropper.Gen
Source: C:\ProgramData\Mozilla\nnekebf.dllAvira: detection malicious, Label: TR/ATRAPS.Gen4
Multi AV Scanner detection for dropped fileShow sources
Source: C:\ProgramData\Mozilla\nnekebf.dllVirustotal: Detection: 76%Perma Link
Source: C:\ProgramData\Mozilla\nnekebf.dllMetadefender: Detection: 52%Perma Link
Source: C:\ProgramData\Mozilla\nnekebf.dllReversingLabs: Detection: 84%
Multi AV Scanner detection for submitted fileShow sources
Source: Incaseformat.exeVirustotal: Detection: 83%Perma Link
Source: Incaseformat.exeReversingLabs: Detection: 100%
Machine Learning detection for dropped fileShow sources
Source: C:\ProgramData\Mozilla\lvrslql.exeJoe Sandbox ML: detected
Source: C:\ProgramData\Mozilla\nnekebf.dllJoe Sandbox ML: detected
Machine Learning detection for sampleShow sources
Source: Incaseformat.exeJoe Sandbox ML: detected
Source: 0.0.Incaseformat.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 0.2.Incaseformat.exe.400000.0.unpackAvira: Label: TR/Gepys.aouma
Source: 1.2.lvrslql.exe.df0000.1.unpackAvira: Label: TR/Gepys.aouma
Source: 0.2.Incaseformat.exe.2150000.1.unpackAvira: Label: TR/Gepys.aouma
Source: 1.0.lvrslql.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 1.2.lvrslql.exe.400000.0.unpackAvira: Label: TR/Gepys.aouma

Compliance:

barindex
Detected unpacking (creates a PE file in dynamic memory)Show sources
Source: C:\Users\user\Desktop\Incaseformat.exeUnpacked PE file: 0.2.Incaseformat.exe.2150000.1.unpack
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\Incaseformat.exeUnpacked PE file: 0.2.Incaseformat.exe.400000.0.unpack
Source: C:\ProgramData\Mozilla\lvrslql.exeUnpacked PE file: 1.2.lvrslql.exe.400000.0.unpack
Source: Incaseformat.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: Incaseformat.exe, 00000000.00000002.216899225.00000000007BA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: Incaseformat.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: Incaseformat.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: lvrslql.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: nnekebf.dll.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal100.evad.winEXE@2/2@0/0
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_00401830 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,GetUserNameW,SysAllocString,CoUninitialize,CoUninitialize,
Source: Incaseformat.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Incaseformat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Incaseformat.exeVirustotal: Detection: 83%
Source: Incaseformat.exeReversingLabs: Detection: 100%
Source: C:\Users\user\Desktop\Incaseformat.exeFile read: C:\Users\user\Desktop\Incaseformat.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Incaseformat.exe 'C:\Users\user\Desktop\Incaseformat.exe'
Source: unknownProcess created: C:\ProgramData\Mozilla\lvrslql.exe C:\PROGRA~3\Mozilla\lvrslql.exe -ddeznal
Source: C:\Users\user\Desktop\Incaseformat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\Incaseformat.exeUnpacked PE file: 0.2.Incaseformat.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\ProgramData\Mozilla\lvrslql.exeUnpacked PE file: 1.2.lvrslql.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Detected unpacking (creates a PE file in dynamic memory)Show sources
Source: C:\Users\user\Desktop\Incaseformat.exeUnpacked PE file: 0.2.Incaseformat.exe.2150000.1.unpack
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\Incaseformat.exeUnpacked PE file: 0.2.Incaseformat.exe.400000.0.unpack
Source: C:\ProgramData\Mozilla\lvrslql.exeUnpacked PE file: 1.2.lvrslql.exe.400000.0.unpack
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_0040488B LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_00403CB5 push ecx; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040E03D push edi; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040F03F push ecx; iretd
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040D8DF pushad ; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_00403CB5 push ecx; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040EA1F push ebp; retf
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040DAC9 push ecx; iretd
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040D2F0 push ebp; iretd
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040BE88 push ecx; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_00DB8720 push edx; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_00D919CE push edx; iretd
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_00D932C2 push FFFFFFDFh; ret
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_00D93FE0 push ss; retn 0003h
Source: initial sampleStatic PE information: section name: .text entropy: 7.66572568976
Source: initial sampleStatic PE information: section name: .text entropy: 7.66572568976
Source: initial sampleStatic PE information: section name: .text entropy: 7.08580926417

Persistence and Installation Behavior:

barindex
Drops executable to a common third party application directoryShow sources
Source: C:\Users\user\Desktop\Incaseformat.exeFile written: C:\ProgramData\Mozilla\lvrslql.exeJump to behavior
Source: C:\ProgramData\Mozilla\lvrslql.exeFile written: C:\ProgramData\Mozilla\nnekebf.dllJump to behavior
Source: C:\ProgramData\Mozilla\lvrslql.exeFile created: C:\ProgramData\Mozilla\nnekebf.dllJump to dropped file
Source: C:\Users\user\Desktop\Incaseformat.exeFile created: C:\ProgramData\Mozilla\lvrslql.exeJump to dropped file
Source: C:\ProgramData\Mozilla\lvrslql.exeFile created: C:\ProgramData\Mozilla\nnekebf.dllJump to dropped file
Source: C:\Users\user\Desktop\Incaseformat.exeFile created: C:\ProgramData\Mozilla\lvrslql.exeJump to dropped file

Boot Survival:

barindex
Creates an undocumented autostart registry key Show sources
Source: C:\ProgramData\Mozilla\lvrslql.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows AppInit_DLLsJump to behavior
Source: C:\Users\user\Desktop\Incaseformat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\ProgramData\Mozilla\lvrslql.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\ProgramData\Mozilla\lvrslql.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\ProgramData\Mozilla\lvrslql.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\ProgramData\Mozilla\lvrslql.exeDropped PE file which has not been started: C:\ProgramData\Mozilla\nnekebf.dllJump to dropped file
Source: C:\Users\user\Desktop\Incaseformat.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
Source: C:\ProgramData\Mozilla\lvrslql.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_0040281C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_0040488B LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_004022D0 GetProcessHeap,GetTickCount,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,CreateDirectoryW,GetShortPathNameW,RegOpenKeyExW,_memset,RegQueryValueExW,RegCloseKey,GetCommandLineW,GetVersion,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_0040281C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_0040432D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040281C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\ProgramData\Mozilla\lvrslql.exeCode function: 1_2_0040432D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_00402179 GetTickCount,CreateFileW,WriteFile,CloseHandle,HeapFree,_memset,ShellExecuteExW,Sleep,DeleteFileW,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_004022D0 GetProcessHeap,GetTickCount,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,CreateDirectoryW,GetShortPathNameW,RegOpenKeyExW,_memset,RegQueryValueExW,RegCloseKey,GetCommandLineW,GetVersion,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_00401830 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,GetUserNameW,SysAllocString,CoUninitialize,CoUninitialize,
Source: C:\Users\user\Desktop\Incaseformat.exeCode function: 0_2_004022D0 GetProcessHeap,GetTickCount,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,CreateDirectoryW,GetShortPathNameW,RegOpenKeyExW,_memset,RegQueryValueExW,RegCloseKey,GetCommandLineW,GetVersion,
Source: C:\Users\user\Desktop\Incaseformat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScheduled Task/Job1Scheduled Task/Job1Exploitation for Privilege Escalation1Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API2Registry Run Keys / Startup Folder1Process Injection1Process Injection1LSASS MemorySecurity Software Discovery12Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information2Security Account ManagerAccount Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Software Packing33NTDSSystem Owner/User Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery4SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Incaseformat.exe83%VirustotalBrowse
Incaseformat.exe100%ReversingLabsWin32.Dropper.GepSys
Incaseformat.exe100%AviraTR/Dropper.Gen
Incaseformat.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\ProgramData\Mozilla\lvrslql.exe100%AviraTR/Dropper.Gen
C:\ProgramData\Mozilla\nnekebf.dll100%AviraTR/ATRAPS.Gen4
C:\ProgramData\Mozilla\lvrslql.exe100%Joe Sandbox ML
C:\ProgramData\Mozilla\nnekebf.dll100%Joe Sandbox ML
C:\ProgramData\Mozilla\nnekebf.dll76%VirustotalBrowse
C:\ProgramData\Mozilla\nnekebf.dll55%MetadefenderBrowse
C:\ProgramData\Mozilla\nnekebf.dll84%ReversingLabsWin32.Trojan.Zeus

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.0.Incaseformat.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
0.2.Incaseformat.exe.400000.0.unpack100%AviraTR/Gepys.aoumaDownload File
1.2.lvrslql.exe.df0000.1.unpack100%AviraTR/Gepys.aoumaDownload File
0.2.Incaseformat.exe.2150000.1.unpack100%AviraTR/Gepys.aoumaDownload File
1.0.lvrslql.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
1.2.lvrslql.exe.400000.0.unpack100%AviraTR/Gepys.aoumaDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:339452
Start date:14.01.2021
Start time:04:19:24
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 14m 11s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Incaseformat (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:39
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.winEXE@2/2@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 31% (good quality ratio 28.6%)
  • Quality average: 80.4%
  • Quality standard deviation: 29.8%
HCA Information:
  • Successful, ratio: 52%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Max analysis timeout: 720s exceeded, the analysis took too long
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe

Simulations

Behavior and APIs

TimeTypeDescription
04:20:19Task SchedulerRun new task: uihuovc path: C:\PROGRA~3\Mozilla\lvrslql.exe s>-ddeznal

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Mozilla\lvrslql.exe
Process:C:\Users\user\Desktop\Incaseformat.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:modified
Size (bytes):386118
Entropy (8bit):7.757548173569129
Encrypted:false
SSDEEP:6144:flzoa7yNgAIQo8OLamr3RLzRnHhq92gkqnC2v7LA+Fq3PTzhVaY:ftB7yNgD83m3fE92TqC25sPPKY
MD5:0174F8B5E7DD2E44B57EBBE3742B216F
SHA1:182A5FA3FA20939D1646A8BB2D5D99D358AB0C67
SHA-256:E2830DBE2A0C182413532707C4A1D0005BF77F5A4275D743C40DBC5CD257AD01
SHA-512:D094657C9FD11DC9D4E909AFB0E8C7A1F21038189D49EBD4C749E9FE508DBDEE76BC68A6C478B38CCE8F5C13FB76CE0CB7E3CC5924507C8FADAA003A6982532D
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=..S..S..S..v(..S..R..S.1.A..S..S..S.....S.....S.....S.Rich.S.........PE..L..."..Q..........................................@.............................................................................d....................................................................................................................text...F........................... ..`.rdata..............................@..@.data...............................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
C:\ProgramData\Mozilla\nnekebf.dll
Process:C:\ProgramData\Mozilla\lvrslql.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:modified
Size (bytes):23040
Entropy (8bit):6.549949874024087
Encrypted:false
SSDEEP:384:ucR0NobYoT7lP/uy4rKTFBYFk64owOCjxXfr6ftakRl:ue0OHlz4EVhTPjxXz6T
MD5:186E739497337C4C3084CE81279271D4
SHA1:2A31C24432B259926A7E5E33F7EB8C9AE57A517B
SHA-256:33F74F3530AF748C84DDDE066BF29E347BDA982FE81C742773951B1FF286CC0B
SHA-512:B9AAC441ECD2055BE2A2407299243357BD6A28A39309D5FF7463EAAAD46FC8A565C35379C7CCFD0579EC0EFB3DF7A16D1E46D595D9F380995B7F327D95B29E34
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: Virustotal, Detection: 76%, Browse
  • Antivirus: Metadefender, Detection: 55%, Browse
  • Antivirus: ReversingLabs, Detection: 84%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=..S..S..S..v(..S..R..S.1.A..S.....S..S..S.....S.....S.Rich.S.........PE..L...!..Q...........!.....D...................`...............................`...............................................`..d....................................................................................`...............................text...XC.......D.................. ..`.rdata.......`.......H..............@..@.data...L....p.......L..............@....rsrc................N..............@..@.reloc...............V..............@..B................................................................................................................................................................................................................................................................................................................................................

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.75753941681381
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Incaseformat.exe
File size:386110
MD5:1ea8bea4055adc9edf91e03b0c80e68a
SHA1:300b32ae0a70e86eecbccc2b850d783ded5a0f69
SHA256:3c8c16428fe5b2d67ed59d543805e5ec63b3565f05305cbc193c961107e56f1d
SHA512:28e9af00495f838562d8ee67ab3521baea93f8b0360505cd0cbd40b40ad14b7e365ae7c71599fe5d05c539c106323021890a16c97c19770fda1bb5a01131b0bf
SSDEEP:6144:flzoa7yNgAIQo8OLamr3RLzRnHhq92gkqnC2v7LA+Fq3PTzhVap:ftB7yNgD83m3fE92TqC25sPPKp
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=...S...S...S..v(...S...R...S.1.A...S...S...S.......S.......S.......S.Rich..S.........PE..L..."..Q...........................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x42c0f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x51829C22 [Thu May 2 17:02:26 2013 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:b40c457657c59e9d515f1130618a2f1e

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
sub esp, 50h
lea eax, dword ptr [ebp-50h]
push eax
call dword ptr [0042D034h]
push 0000019Ch
push 00000000h
call dword ptr [0042D070h]
test eax, eax
je 00007F4F08AE7696h
xor eax, eax
jmp 00007F4F08AE76E9h
push 00007F00h
push 00000000h
call dword ptr [0042D070h]
test eax, eax
jne 00007F4F08AE7696h
xor eax, eax
jmp 00007F4F08AE76D4h
push ebp
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
mov eax, eax
call 00007F4F08AE7089h
mov esp, ebp
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 0000021Ch
mov eax, dword ptr [ebp+08h]
mov dword ptr [ebp-0000020Ch], eax
mov ecx, dword ptr [ebp+0Ch]
mov dword ptr [ebp-0000021Ch], ecx
mov dword ptr [ebp-00000218h], 00000005h
mov dword ptr [ebp-00000210h], 0042E0E0h
mov edx, dword ptr [ebp-0000020Ch]
cmp edx, dword ptr [ebp-0000021Ch]
jnc 00007F4F08AE76A6h
mov dword ptr [ebp-00000218h], 00000005h

Rich Headers

Programming Language:
  • [IMP] VS2005 build 50727
  • [RES] VS2008 build 21022
  • [LNK] VS2008 build 21022
  • [ C ] VS2008 build 21022

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x2d0940x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2f0000x790.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2d0000x94.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2b3460x2b400False0.853814803107data7.66572568976IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x2d0000x3b40x400False0.5078125data4.79024068833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x2e0000x1180x200False0.263671875data2.00112152127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x2f0000x2b7900x800False0.3037109375data2.76533518439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0x2f0d00x188Alpha compressed COFFRussianRussia
None0x2f2680x526PC bitmap, Windows 3.x format, 160 x 15 x 4RussianRussia
None0x2f2580xbPGP Secret Sub-key (v4) - 0b created on Tue Jul 14 05:20:16 1970 - unknown (pub 0) Plaintext or unencrypted dataRussianRussia

Imports

DLLImport
KERNEL32.dllReadFile, CreateFileA, GetTickCount, GetModuleHandleA, GetCommandLineA, GetProcAddress, GetStartupInfoA, ExitProcess
USER32.dllGetSystemMetrics, LoadBitmapA, GetMessageA, LoadIconA, LoadMenuA, PostQuitMessage, RegisterClassExA, ReleaseDC, SetMenu, ShowWindow, TranslateMessage, UpdateWindow, LoadIconW, GetDC, EndPaint, DispatchMessageA, DefWindowProcA, CreateWindowExA, BeginPaint, LoadCursorA
GDI32.dllSelectObject, DeleteDC, CreateCompatibleDC, BitBlt
ADVAPI32.dllRegOpenKeyA

Version Infos

DescriptionData
FileDescription
CompanyName
Translation0x0419 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
RussianRussia

Network Behavior

No network behavior found

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:04:20:13
Start date:14/01/2021
Path:C:\Users\user\Desktop\Incaseformat.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\Incaseformat.exe'
Imagebase:0x400000
File size:386110 bytes
MD5 hash:1EA8BEA4055ADC9EDF91E03B0C80E68A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:04:20:18
Start date:14/01/2021
Path:C:\ProgramData\Mozilla\lvrslql.exe
Wow64 process (32bit):true
Commandline:C:\PROGRA~3\Mozilla\lvrslql.exe -ddeznal
Imagebase:0x400000
File size:386118 bytes
MD5 hash:0174F8B5E7DD2E44B57EBBE3742B216F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 100%, Avira
  • Detection: 100%, Joe Sandbox ML
Reputation:low

Disassembly

Code Analysis

Reset < >