Loading ...

Play interactive tourEdit tour

Analysis Report New Doc 20211401#_our new price.exe

Overview

General Information

Sample Name:New Doc 20211401#_our new price.exe
Analysis ID:342481
MD5:14a7ac7e8a7cc68ee2040ea5f3bb145e
SHA1:e7eabd570ec2dce1203d013a11599a8c627b527a
SHA256:cb3e82e9c93c6b7b44dd782d26d22ad26f323176f8662642397d6d271754768d
Tags:exenVpnRATRemcosRAT

Most interesting Screenshot:

Detection

Remcos GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Contains functionality to hide a thread from the debugger
Creates autostart registry keys with suspicious values (likely registry only malware)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected VB6 Downloader Generic
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 7092 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • Indtastningsfacilitet.exe (PID: 5412 cmdline: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe MD5: 14A7AC7E8A7CC68EE2040EA5F3BB145E)
      • Indtastningsfacilitet.exe (PID: 1340 cmdline: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe MD5: 14A7AC7E8A7CC68EE2040EA5F3BB145E)
  • wscript.exe (PID: 6284 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • Indtastningsfacilitet.exe (PID: 3808 cmdline: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe MD5: 14A7AC7E8A7CC68EE2040EA5F3BB145E)
      • Indtastningsfacilitet.exe (PID: 6564 cmdline: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe MD5: 14A7AC7E8A7CC68EE2040EA5F3BB145E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.344016500.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000010.00000002.352919337.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
      Process Memory Space: Indtastningsfacilitet.exe PID: 1340JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
        Process Memory Space: Indtastningsfacilitet.exe PID: 1340JoeSecurity_GuLoaderYara detected GuLoaderJoe Security
          Process Memory Space: Indtastningsfacilitet.exe PID: 3808JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
            Click to see the 7 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: RemcosShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe, ProcessId: 6556, TargetFilename: C:\Users\user\AppData\Roaming\remcos\logs.dat

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeReversingLabs: Detection: 13%
            Multi AV Scanner detection for submitted fileShow sources
            Source: New Doc 20211401#_our new price.exeReversingLabs: Detection: 13%

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: New Doc 20211401#_our new price.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            Uses dynamic DNS servicesShow sources
            Source: unknownDNS query: name: oluchi.ddns.net
            Source: global trafficTCP traffic: 192.168.2.7:49726 -> 91.193.75.243:2405
            Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digi
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344901282.000000000092D000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344901282.000000000092D000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344901282.000000000092D000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmpString found in binary or memory: https://fkteua.db.files.1drv.com/
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmpString found in binary or memory: https://fkteua.db.files.1drv.com/y4m1K5aXO_hTJZwQ6sRUBeX3MwbIRGCEyLmUsy6a-Tv86ILmUxMJD16_BkowRYABW7o
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344866328.00000000008F0000.00000004.00000020.sdmpString found in binary or memory: https://fkteua.db.files.1drv.com/y4m7jo0uscLY3JGQOA8WNtz0kE6mECzmykD9EyNeCFL_ih_emej5aweglDZjRx1WKGH
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344796615.00000000008A7000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 00000010.00000002.352919337.0000000000560000.00000040.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=A32AEA2B4355716B&resid=A32AEA2B4355716B%215171&authkey=APwe6-

            System Summary:

            barindex
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021508B7 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02158CE9 NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_0215310A NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021587FD NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02159012 NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02157088 NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021570B8 NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021536AE NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021592AE NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021512DE NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021534F5 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02158CF3 NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021508EF NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021532EA NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_0215911A NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02158F0D NtResumeThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02153187 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02156DB9 NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02158DF2 NtResumeThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021408B7 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02148CE9 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_0214310A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021487FD NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02149012 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02147088 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021470B8 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021436AE NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021492AE NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021412DE NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021434F5 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02148CF3 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021408EF NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021432EA NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_0214911A NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02148F0D NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02143187 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02146DB9 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02148DF2 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00568CE9 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005608B7 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005687FD NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00569012 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005612DE NtSetInformationThread,NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00568CF3 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005608EF NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00567088 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005670B8 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005692AE NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_0056911A NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00568F0D NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00568DF2 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00566DB9 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F08B7 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F8CE9 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F310A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F87FD NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F9012 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F7088 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F70B8 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F36AE NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F92AE NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F12DE NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F34F5 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F8CF3 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F08EF NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F32EA NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F911A NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F8F0D NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F3187 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F6DB9 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F8DF2 NtMapViewOfSection,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00568CE9 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005608B7 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005687FD NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00569012 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005612DE NtSetInformationThread,NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00568CF3 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005608EF NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00567088 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005670B8 NtSetInformationThread,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005692AE NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_0056911A NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00568F0D NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00568DF2 NtQueryInformationProcess,
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00566DB9 NtSetInformationThread,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_004041D8
            Source: New Doc 20211401#_our new price.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Indtastningsfacilitet.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: New Doc 20211401#_our new price.exe, 00000000.00000000.254304802.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBindsaalerne.exe vs New Doc 20211401#_our new price.exe
            Source: New Doc 20211401#_our new price.exe, 00000000.00000002.273121164.0000000002140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs New Doc 20211401#_our new price.exe
            Source: New Doc 20211401#_our new price.exe, 00000002.00000000.271623707.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBindsaalerne.exe vs New Doc 20211401#_our new price.exe
            Source: New Doc 20211401#_our new price.exeBinary or memory string: OriginalFilenameBindsaalerne.exe vs New Doc 20211401#_our new price.exe
            Source: New Doc 20211401#_our new price.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.troj.evad.winEXE@13/3@13/2
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile created: C:\Users\user\AppData\Roaming\remcosJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-MNA1IV
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF089D9D5C2295B640.TMPJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs'
            Source: New Doc 20211401#_our new price.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: New Doc 20211401#_our new price.exeReversingLabs: Detection: 13%
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile read: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe 'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
            Source: unknownProcess created: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe 'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
            Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs'
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs'
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess created: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe 'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 0000000E.00000002.344016500.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.352919337.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 1340, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 3808, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 5412, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Doc 20211401#_our new price.exe PID: 6344, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 6564, type: MEMORY
            Yara detected VB6 Downloader GenericShow sources
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 1340, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 3808, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 5412, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Doc 20211401#_our new price.exe PID: 6344, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Indtastningsfacilitet.exe PID: 6564, type: MEMORY
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_00406A5D push esp; retf
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_0040701C push edx; retn 0035h
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_00406830 push 0000007Eh; retf 0016h
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_004064D8 push 00000014h; retf 0010h
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_004052E0 push 0000007Eh; retf
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_004018AE push ds; ret
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_00406D74 push 0000007Eh; retf 0016h
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02155AE1 push 01D18579h; retf
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02145AE1 push 01D18579h; retf
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00565AE1 push 01D18579h; retf
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F5AE1 push 01D18579h; retf
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00565AE1 push 01D18579h; retf
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeJump to dropped file

            Boot Survival:

            barindex
            Creates autostart registry keys with suspicious values (likely registry only malware)Show sources
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Brandsson C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbsJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Brandsson C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbsJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce BrandssonJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce BrandssonJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce BrandssonJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce BrandssonJump to behavior
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Indtastningsfacilitet.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02157802 rdtsc
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeWindow / User API: threadDelayed 602
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe TID: 5968Thread sleep count: 602 > 30
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe TID: 5968Thread sleep time: -6020000s >= -30000s
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeLast function: Thread delayed
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344796615.00000000008A7000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWx
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344866328.00000000008F0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: Indtastningsfacilitet.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

            Anti Debugging:

            barindex
            Contains functionality to hide a thread from the debuggerShow sources
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021508B7 NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,?,0215074C
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02157802 rdtsc
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02154D2A LdrInitializeThunk,
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02152A8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_021520DE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02153B0D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_0215812E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02156D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeCode function: 0_2_02157391 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02142A8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_021420DE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02143B0D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_0214812E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02146D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 12_2_02147391 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00562A8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_005620DE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00566D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00563B0D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_0056812E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 14_2_00567391 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F2A8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F20DE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F3B0D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F812E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F6D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 15_2_021F7391 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00562A8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_005620DE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00566D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00563B0D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_0056812E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeCode function: 16_2_00567391 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\New Doc 20211401#_our new price.exeProcess created: C:\Users\user\Desktop\New Doc 20211401#_our new price.exe 'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exeProcess created: C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
            Source: logs.dat.2.drBinary or memory string: [ Program Manager ]
            Source: New Doc 20211401#_our new price.exe, 00000002.00000003.454251663.000000001E842000.00000004.00000001.sdmpBinary or memory string: |Program Manager|
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Remote Access Functionality:

            barindex
            Detected Remcos RATShow sources
            Source: Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmpString found in binary or memory: Remcos_Mutex_InjSI:,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScripting11Registry Run Keys / Startup Folder11Process Injection12Masquerading1OS Credential DumpingSecurity Software Discovery521Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Virtualization/Sandbox Evasion22LSASS MemoryVirtualization/Sandbox Evasion22Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 342481 Sample: New Doc 20211401#_our new p... Startdate: 21/01/2021 Architecture: WINDOWS Score: 100 36 oluchi.ddns.net 2->36 38 g.msn.com 2->38 64 Multi AV Scanner detection for submitted file 2->64 66 Detected Remcos RAT 2->66 68 Yara detected GuLoader 2->68 70 5 other signatures 2->70 8 New Doc 20211401#_our new price.exe 1 2 2->8         started        11 wscript.exe 2->11         started        13 wscript.exe 2->13         started        signatures3 process4 signatures5 72 Creates autostart registry keys with suspicious values (likely registry only malware) 8->72 74 Tries to detect Any.run 8->74 76 Hides threads from debuggers 8->76 15 New Doc 20211401#_our new price.exe 2 12 8->15         started        20 Indtastningsfacilitet.exe 2 11->20         started        22 Indtastningsfacilitet.exe 2 13->22         started        process6 dnsIp7 52 oluchi.ddns.net 91.193.75.243, 2405, 49726, 49735 DAVID_CRAIGGG Serbia 15->52 54 192.168.2.1 unknown unknown 15->54 56 3 other IPs or domains 15->56 30 C:\Users\user\...\Indtastningsfacilitet.exe, PE32 15->30 dropped 32 C:\Users\user\AppData\Roaming\...\logs.dat, ASCII 15->32 dropped 34 C:\Users\user\...\Indtastningsfacilitet.vbs, ASCII 15->34 dropped 58 Multi AV Scanner detection for dropped file 20->58 60 Tries to detect Any.run 20->60 62 Hides threads from debuggers 20->62 24 Indtastningsfacilitet.exe 7 20->24         started        28 Indtastningsfacilitet.exe 7 22->28         started        file8 signatures9 process10 dnsIp11 40 onedrive.live.com 24->40 42 fkteua.db.files.1drv.com 24->42 44 db-files.fe.1drv.com 24->44 78 Tries to detect Any.run 24->78 80 Hides threads from debuggers 24->80 46 onedrive.live.com 28->46 48 fkteua.db.files.1drv.com 28->48 50 db-files.fe.1drv.com 28->50 signatures12

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            New Doc 20211401#_our new price.exe13%ReversingLabsWin32.Trojan.Generic

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe13%ReversingLabsWin32.Trojan.Generic

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            oluchi.ddns.net1%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://crl3.digi0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            oluchi.ddns.net
            91.193.75.243
            truetrueunknown
            g.msn.com
            unknown
            unknownfalse
              high
              onedrive.live.com
              unknown
              unknownfalse
                high
                fkteua.db.files.1drv.com
                unknown
                unknownfalse
                  high

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://fkteua.db.files.1drv.com/Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmpfalse
                    high
                    https://onedrive.live.com/download?cid=A32AEA2B4355716B&resid=A32AEA2B4355716B%215171&authkey=APwe6-Indtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 00000010.00000002.352919337.0000000000560000.00000040.00000001.sdmpfalse
                      high
                      http://crl3.digiIndtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fkteua.db.files.1drv.com/y4m1K5aXO_hTJZwQ6sRUBeX3MwbIRGCEyLmUsy6a-Tv86ILmUxMJD16_BkowRYABW7oIndtastningsfacilitet.exe, 0000000E.00000002.344844732.00000000008D5000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmpfalse
                        high
                        https://onedrive.live.com/Indtastningsfacilitet.exe, 0000000E.00000002.344796615.00000000008A7000.00000004.00000020.sdmpfalse
                          high
                          https://fkteua.db.files.1drv.com/y4m7jo0uscLY3JGQOA8WNtz0kE6mECzmykD9EyNeCFL_ih_emej5aweglDZjRx1WKGHIndtastningsfacilitet.exe, 0000000E.00000002.344883069.0000000000909000.00000004.00000020.sdmp, Indtastningsfacilitet.exe, 0000000E.00000002.344866328.00000000008F0000.00000004.00000020.sdmpfalse
                            high

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            91.193.75.243
                            unknownSerbia
                            209623DAVID_CRAIGGGtrue

                            Private

                            IP
                            192.168.2.1

                            General Information

                            Joe Sandbox Version:31.0.0 Red Diamond
                            Analysis ID:342481
                            Start date:21.01.2021
                            Start time:07:22:53
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 8m 18s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:New Doc 20211401#_our new price.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:31
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@13/3@13/2
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 40.7% (good quality ratio 27.5%)
                            • Quality average: 39.3%
                            • Quality standard deviation: 31.7%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.43.139.144, 92.122.145.220, 2.20.84.85, 13.64.90.137, 13.107.42.13, 13.107.42.12, 205.185.216.10, 205.185.216.42, 51.103.5.159, 51.11.168.160, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 52.142.114.176
                            • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, vip1-par02p.wns.notify.trafficmanager.net, l-0004.l-msedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, odc-db-files-geo.onedrive.akadns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, odc-db-files-brs.onedrive.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, odc-web-geo.onedrive.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, odc-db-files.onedrive.akadns.net.l-0003.dc-msedge.net.l-0003.l-msedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing network information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            07:24:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Brandsson C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs
                            07:24:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Brandsson C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs
                            07:24:14API Interceptor1117x Sleep call for process: New Doc 20211401#_our new price.exe modified

                            Joe Sandbox View / Context

                            IPs

                            No context

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            oluchi.ddns.netRE INCOICE AGAINST INV NO. EX-00120-21 SUPPLY.jsGet hashmaliciousBrowse
                            • 185.165.153.189
                            Bank Details Changed..exeGet hashmaliciousBrowse
                            • 185.244.30.82

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            DAVID_CRAIGGGcompany profile.exeGet hashmaliciousBrowse
                            • 185.140.53.227
                            NEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
                            • 185.140.53.253
                            richiealvin.exeGet hashmaliciousBrowse
                            • 91.193.75.185
                            Quotation.exeGet hashmaliciousBrowse
                            • 185.140.53.154
                            DHL Delivery Shipping Cargo. Pdf.exeGet hashmaliciousBrowse
                            • 185.244.30.18
                            CompanyLicense.exeGet hashmaliciousBrowse
                            • 185.140.53.253
                            Purchase Order 2094742424.exeGet hashmaliciousBrowse
                            • 185.244.30.132
                            PURCHASE OREDER. PRINT. pdf.exeGet hashmaliciousBrowse
                            • 91.193.75.45
                            PO.exeGet hashmaliciousBrowse
                            • 185.140.53.234
                            SWIFT.exeGet hashmaliciousBrowse
                            • 185.140.53.154
                            SecuriteInfo.com.BScope.Trojan-Dropper.Injector.exeGet hashmaliciousBrowse
                            • 185.140.53.234
                            PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                            • 185.140.53.131
                            Orden n.#U00ba STL21119, pdf.exeGet hashmaliciousBrowse
                            • 185.140.53.129
                            Proof of Payment.exeGet hashmaliciousBrowse
                            • 185.244.30.51
                            DxCHoDnNLn.exeGet hashmaliciousBrowse
                            • 185.140.53.202
                            T7gzTHDZ7g.rtfGet hashmaliciousBrowse
                            • 185.140.53.202
                            PO - 2021-000511.exeGet hashmaliciousBrowse
                            • 185.244.30.69
                            PO AR483-1590436 _ J-3000 PROJT.xlsxGet hashmaliciousBrowse
                            • 185.140.53.202
                            Qotation.exeGet hashmaliciousBrowse
                            • 185.140.53.154
                            PO - 2021-000511.exeGet hashmaliciousBrowse
                            • 185.244.30.69

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Process:C:\Users\user\Desktop\New Doc 20211401#_our new price.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):98304
                            Entropy (8bit):5.474945438388249
                            Encrypted:false
                            SSDEEP:1536:Go4qgC1Zc5NDyFCG1Pc+HdNW2XLnolNIj:Gop1+5N+FCG1PcmN/Lnkmj
                            MD5:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            SHA1:E7EABD570EC2DCE1203D013A11599A8C627B527A
                            SHA-256:CB3E82E9C93C6B7B44DD782D26D22AD26F323176F8662642397D6D271754768D
                            SHA-512:AD59B75BBF9CAEA440CB8F45CCE3B6107DB9898455F017265F110AE3EDC510BB20EDD4F9A506D4C28A890FB11B006D1A2503C20FB18D3BFD6358B155880DDEE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 13%
                            Reputation:low
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........I...................................Rich............................PE..L...W~xY................. ...`...............0....@.................................d.......................................4...(....P..T>..................................................................8... ....................................text............ .................. ..`.data........0.......0..............@....rsrc...T>...P...@...@..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs
                            Process:C:\Users\user\Desktop\New Doc 20211401#_our new price.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):136
                            Entropy (8bit):4.879301401273559
                            Encrypted:false
                            SSDEEP:3:jfF+m8nhvF3mRD0nacwRE2J5xAIPAo+sLBRovI7LVM:jFqhv9IcNwi23fPA4WvI7C
                            MD5:1E014CCA5D292FE677817619DD7BA4ED
                            SHA1:A612539B648CD9D37A324E01B105EF4242D94490
                            SHA-256:227669767DAA3DA8A3AF893A3F8AA79657D4E28E2217E55292AD21432C7A57E7
                            SHA-512:F0BC257DA14376A67FA889319CCC7FF2C1EE42885593F9AEDFA2DDB06548F3245B0E38E9389D4DEEF0299B3CF5C38EEFF263C3D318F90F85139C73A074788FA6
                            Malicious:true
                            Reputation:low
                            Preview: Set W = CreateObject("WScript.Shell")..Set C = W.Exec ("C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe")
                            C:\Users\user\AppData\Roaming\remcos\logs.dat
                            Process:C:\Users\user\Desktop\New Doc 20211401#_our new price.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):85
                            Entropy (8bit):4.670712042265206
                            Encrypted:false
                            SSDEEP:3:ttU6fJMLrA4RXMRPHv33a1oy1aeo:tmeJM/XqdHv3qNIP
                            MD5:E52EAA341FF027445F564DBC59F6BDC7
                            SHA1:78FB89DA6B341E7E7FA4C8C7096B1A7CFAA80841
                            SHA-256:AE36F5D7C06B608DB31D0F5F3F4ACBF0E839EE58C6615ADC29AAC79BF237895D
                            SHA-512:56D6D9BA4C075E725650E248DDBECCECB2855E23834BC4F7F9B0615505FDBB12DAFDD551B943DEB2F46BBBBA4DE6F7EE688BB364A2E5DE76265EC0956BE28A2D
                            Malicious:true
                            Reputation:low
                            Preview: ..[2021/01/21 07:24:14 Offline Keylogger Started]....[ Run ]....[ Program Manager ]..

                            Static File Info

                            General

                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):5.474945438388249
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.15%
                            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:New Doc 20211401#_our new price.exe
                            File size:98304
                            MD5:14a7ac7e8a7cc68ee2040ea5f3bb145e
                            SHA1:e7eabd570ec2dce1203d013a11599a8c627b527a
                            SHA256:cb3e82e9c93c6b7b44dd782d26d22ad26f323176f8662642397d6d271754768d
                            SHA512:ad59b75bbf9caea440cb8f45cce3b6107db9898455f017265f110ae3edc510bb20edd4f9a506d4c28a890fb11b006d1a2503c20fb18d3bfd6358b155880ddee4
                            SSDEEP:1536:Go4qgC1Zc5NDyFCG1Pc+HdNW2XLnolNIj:Gop1+5N+FCG1PcmN/Lnkmj
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........I....................................Rich............................PE..L...W~xY................. ...`...............0....@

                            File Icon

                            Icon Hash:0919914f4707077b

                            Static PE Info

                            General

                            Entrypoint:0x401480
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                            DLL Characteristics:
                            Time Stamp:0x59787E57 [Wed Jul 26 11:34:47 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:cdaaae34b462dd94bb47458bdb1adef4

                            Entrypoint Preview

                            Instruction
                            push 0040280Ch
                            call 00007F26E0A66113h
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            xor byte ptr [eax], al
                            add byte ptr [eax], al
                            inc eax
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [esi], ch
                            mov esp, 5DC5F02Ch
                            inc esp
                            mov ecx, FF485C66h
                            sahf
                            sbb eax, dword ptr [eax]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [ecx], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax-56h], ah
                            adc al, 03h
                            push eax
                            insb
                            jns 00007F26E0A66185h
                            outsd
                            jnc 00007F26E0A66183h
                            jne 00007F26E0A66194h
                            cmp byte ptr [eax], al
                            and byte ptr [eax], cl
                            inc ecx
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add bh, bh
                            int3
                            xor dword ptr [eax], eax
                            add eax, D1D43FADh
                            movsb
                            fild dword ptr [edx+43h]
                            mov ch, 4Dh
                            imul ebp, dword ptr [edi+eax*4-49h], 09h
                            scasb
                            sahf
                            add esi, ebp
                            cmc
                            cld
                            cmp eax, edi
                            inc edx
                            mov dword ptr [4C513B13h], eax
                            call 00007F272FE0F95Bh
                            lodsd
                            xor ebx, dword ptr [ecx-48EE309Ah]
                            or al, 00h
                            stosb
                            add byte ptr [eax-2Dh], ah
                            xchg eax, ebx
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            test eax, CD000010h
                            sldt word ptr [eax]
                            add byte ptr [esi], cl
                            add byte ptr [eax+72h], dl
                            outsd
                            arpl word ptr [ebp+72h], si
                            popad
                            je 00007F26E0A66191h
                            jc 00007F26E0A66183h
                            je 00007F26E0A66187h
                            add byte ptr [56000C01h], cl

                            Data Directories

                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x11c340x28.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x3e54.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2380x20
                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x118.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                            Sections

                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x110d00x12000False0.337483723958data5.46471413927IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .data0x130000x15980x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                            .rsrc0x150000x3e540x4000False0.405029296875data5.81847534661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                            Resources

                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x151480x468GLS_BINARY_LSB_FIRST
                            RT_ICON0x155b00x10a8data
                            RT_ICON0x166580x25a8data
                            RT_GROUP_ICON0x18c000x30data
                            RT_VERSION0x18c300x224dataEnglishUnited States

                            Imports

                            DLLImport
                            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaI2Str, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                            Version Infos

                            DescriptionData
                            Translation0x0409 0x04b0
                            InternalNameBindsaalerne
                            FileVersion1.00
                            CompanyNameAbove
                            ProductNamePelycosaur8
                            ProductVersion1.00
                            OriginalFilenameBindsaalerne.exe

                            Possible Origin

                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Jan 21, 2021 07:24:14.521344900 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:17.674045086 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:23.785506010 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:24.070239067 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:24.070379972 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:24.071430922 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:27.146111012 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:27.331531048 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:27.331631899 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:27.441579103 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:27.520848989 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:27.604600906 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:27.950588942 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:32.523847103 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:32.525665998 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:33.272695065 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:33.417449951 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:33.541630030 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:37.528942108 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:37.538995028 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:38.286729097 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:38.621501923 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:38.966265917 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:42.518316031 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:42.520317078 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:42.970196009 CET24054972691.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:43.176753044 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:43.177746058 CET497262405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:43.669768095 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:43.669859886 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:43.672858953 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.196091890 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.196216106 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.197123051 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.197138071 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.197218895 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.477375984 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.477416039 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.477473974 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.477519035 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.481142998 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.481252909 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.489509106 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.489603996 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.490221977 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.490330935 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.496974945 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.497056007 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.498100996 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.498131037 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.498182058 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.498223066 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.772279978 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.772394896 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.776206017 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.777057886 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.777105093 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.777169943 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:44.780019999 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.782233953 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.783164978 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.784903049 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.789169073 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.792277098 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.797346115 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.798115969 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.799463034 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.802153111 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.805254936 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.818996906 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:44.819020033 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.337050915 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.337080956 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.350132942 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.355755091 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.399606943 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.451910973 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:45.648607016 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:45.656327963 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:45.656466007 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.255831957 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.256135941 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.259340048 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.259440899 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.262399912 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.262494087 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.274549007 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.274590015 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.274607897 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.274641037 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.274684906 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.274861097 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.685617924 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.685642004 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.686506987 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.686530113 CET24054973591.193.75.243192.168.2.7
                            Jan 21, 2021 07:24:46.686661005 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.686722994 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.686799049 CET497352405192.168.2.791.193.75.243
                            Jan 21, 2021 07:24:46.686827898 CET497352405192.168.2.791.193.75.243

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Jan 21, 2021 07:24:12.932408094 CET192.168.2.78.8.8.80xd46aStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:13.960990906 CET192.168.2.78.8.8.80xd76eStandard query (0)fkteua.db.files.1drv.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:14.459875107 CET192.168.2.78.8.8.80xca13Standard query (0)oluchi.ddns.netA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:33.119712114 CET192.168.2.78.8.8.80x914cStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:34.629179001 CET192.168.2.78.8.8.80xa76aStandard query (0)fkteua.db.files.1drv.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:39.444567919 CET192.168.2.78.8.8.80xd188Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:40.098330975 CET192.168.2.78.8.8.80xb18Standard query (0)fkteua.db.files.1drv.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:25:44.243402004 CET192.168.2.78.8.8.80x52f2Standard query (0)g.msn.comA (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:29.045977116 CET192.168.2.78.8.8.80xec3fStandard query (0)oluchi.ddns.netA (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:40.572093964 CET192.168.2.78.8.8.80xf343Standard query (0)oluchi.ddns.netA (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:43.713131905 CET192.168.2.78.8.8.80x2d01Standard query (0)oluchi.ddns.netA (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:46.916858912 CET192.168.2.78.8.8.80x4b6dStandard query (0)oluchi.ddns.netA (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:49.918509007 CET192.168.2.78.8.8.80xee6Standard query (0)oluchi.ddns.netA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Jan 21, 2021 07:24:12.983098984 CET8.8.8.8192.168.2.70xd46aNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:14.069500923 CET8.8.8.8192.168.2.70xd76eNo error (0)fkteua.db.files.1drv.comdb-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:14.069500923 CET8.8.8.8192.168.2.70xd76eNo error (0)db-files.fe.1drv.comodc-db-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:14.520232916 CET8.8.8.8192.168.2.70xca13No error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)
                            Jan 21, 2021 07:24:33.176738024 CET8.8.8.8192.168.2.70x914cNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:34.709955931 CET8.8.8.8192.168.2.70xa76aNo error (0)fkteua.db.files.1drv.comdb-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:34.709955931 CET8.8.8.8192.168.2.70xa76aNo error (0)db-files.fe.1drv.comodc-db-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:39.492403984 CET8.8.8.8192.168.2.70xd188No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:40.157777071 CET8.8.8.8192.168.2.70xb18No error (0)fkteua.db.files.1drv.comdb-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:24:40.157777071 CET8.8.8.8192.168.2.70xb18No error (0)db-files.fe.1drv.comodc-db-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:25:44.310305119 CET8.8.8.8192.168.2.70x52f2No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                            Jan 21, 2021 07:26:29.106426001 CET8.8.8.8192.168.2.70xec3fNo error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:40.628381968 CET8.8.8.8192.168.2.70xf343No error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:43.771128893 CET8.8.8.8192.168.2.70x2d01No error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:46.972825050 CET8.8.8.8192.168.2.70x4b6dNo error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)
                            Jan 21, 2021 07:26:49.975899935 CET8.8.8.8192.168.2.70xee6No error (0)oluchi.ddns.net91.193.75.243A (IP address)IN (0x0001)

                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:07:23:54
                            Start date:21/01/2021
                            Path:C:\Users\user\Desktop\New Doc 20211401#_our new price.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Visual Basic
                            Reputation:low

                            General

                            Start time:07:24:02
                            Start date:21/01/2021
                            Path:C:\Users\user\Desktop\New Doc 20211401#_our new price.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\user\Desktop\New Doc 20211401#_our new price.exe'
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low

                            General

                            Start time:07:24:13
                            Start date:21/01/2021
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs'
                            Imagebase:0x7ff7d50e0000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:07:24:15
                            Start date:21/01/2021
                            Path:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Visual Basic
                            Antivirus matches:
                            • Detection: 13%, ReversingLabs
                            Reputation:low

                            General

                            Start time:07:24:21
                            Start date:21/01/2021
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.vbs'
                            Imagebase:0x7ff7d50e0000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:07:24:22
                            Start date:21/01/2021
                            Path:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000E.00000002.344016500.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                            Reputation:low

                            General

                            Start time:07:24:23
                            Start date:21/01/2021
                            Path:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Visual Basic
                            Reputation:low

                            General

                            Start time:07:24:32
                            Start date:21/01/2021
                            Path:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Local\Temp\Strikkebgernes\Indtastningsfacilitet.exe
                            Imagebase:0x400000
                            File size:98304 bytes
                            MD5 hash:14A7AC7E8A7CC68EE2040EA5F3BB145E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000010.00000002.352919337.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                            Reputation:low

                            Disassembly

                            Code Analysis

                            Reset < >