Loading ...

Play interactive tourEdit tour

Analysis Report IRS_Covid-19_Relief_Payment_Notice_pdf.exe

Overview

General Information

Sample Name:IRS_Covid-19_Relief_Payment_Notice_pdf.exe
Analysis ID:344014
MD5:5525bb8a978d3ac15812c8d8ca9b8a57
SHA1:dcb9549ff9c290e056f83639ad546b03206a0806
SHA256:21f49ea6e105c22882a9fb0065803deee18eddb76767a30ddade2e2725eb65d9

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to hide a thread from the debugger
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Executable has a suspicious name (potential lure to open the executable)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 7120JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 7120JoeSecurity_GuLoaderYara detected GuLoaderJoe Security
      Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 4168JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
        Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 4168JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for domain / URLShow sources
          Source: chengsolution.comVirustotal: Detection: 8%Perma Link
          Source: https://chengsolution.com/vr/tembin_AbNFdk131.binVirustotal: Detection: 10%Perma Link
          Multi AV Scanner detection for submitted fileShow sources
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeVirustotal: Detection: 67%Perma Link
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeMetadefender: Detection: 37%Perma Link
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeReversingLabs: Detection: 75%

          Compliance:

          barindex
          Uses 32bit PE filesShow sources
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Uses secure TLS version for HTTPS connectionsShow sources
          Source: unknownHTTPS traffic detected: 162.0.209.179:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: Joe Sandbox ViewASN Name: ACPCA ACPCA
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056907C LoadLibraryA,InternetReadFile,
          Source: unknownDNS traffic detected: queries for: chengsolution.com
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeString found in binary or memory: https://chengsolution.com/vr/tembin_AbNFdk131.bin
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 162.0.209.179:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000000.00000002.679600218.000000000074A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          System Summary:

          barindex
          Executable has a suspicious name (potential lure to open the executable)Show sources
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeStatic file information: Suspicious name
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: initial sampleStatic PE information: Filename: IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02418B05 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241907C LoadLibraryA,NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024108BF EnumWindows,NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02414EE3 NtWriteVirtualMemory,LoadLibraryA,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02410A4D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419271 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419202 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02410A0D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419215 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413A2E NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241923E NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413AF6 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413A88 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02412294 NtSetInformationThread,NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024192AA NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02417B5F NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413B61 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419369 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241932C NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024193D4 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024153E5 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419396 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413BB6 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413868 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413819 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024190D4 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024138E0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419082 NtWriteVirtualMemory,NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02410943 NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241094D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413929 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419128 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024139D1 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024191D6 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413980 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024109BE NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413E4E NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413E07 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419608 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413E34 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241963E NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024196D4 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024136ED NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024196A5 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413745 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419711 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024137BD NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413C56 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241945D NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413CE4 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024194FA NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419571 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02419531 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413DD9 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024195E5 NtResumeThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413D8E NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005608BF EnumWindows,NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00568B05 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00560943 NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056094D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005609BE NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00560A4D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00560A0D NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00562294 NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00567B5F NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00561374 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056137C NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005613C0 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0040187B
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0040422B
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000000.00000000.646048005.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameauricular.exe vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000000.00000002.679589804.0000000000730000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1006189759.000000001DDA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000000.678655791.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameauricular.exe vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1006207484.000000001DEF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeBinary or memory string: OriginalFilenameauricular.exe vs IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@1/1
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\~DF49EDEC8FC18F3BDF.TMPJump to behavior
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeVirustotal: Detection: 67%
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeMetadefender: Detection: 37%
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeReversingLabs: Detection: 75%
          Source: unknownProcess created: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe 'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe 'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess created: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe 'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'

          Data Obfuscation:

          barindex
          Yara detected GuLoaderShow sources
          Source: Yara matchFile source: Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 7120, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 4168, type: MEMORY
          Yara detected VB6 Downloader GenericShow sources
          Source: Yara matchFile source: Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 7120, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IRS_Covid-19_Relief_Payment_Notice_pdf.exe PID: 4168, type: MEMORY
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02415B5E push edi; retf
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00565B5E push edi; retf
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02414EE3 NtWriteVirtualMemory,LoadLibraryA,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02412294 NtSetInformationThread,NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241838A
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024136DF
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00562294 NtSetInformationThread,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056838A
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005636DF
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00564EE3 LoadLibraryA,
          Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 0000000002417D79 second address: 0000000002417D79 instructions:
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 00000000005617E4 second address: 0000000000567569 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pop dword ptr [ebp+000000B4h] 0x00000010 cmp ax, bx 0x00000013 jmp 00007F10843A64E6h 0x00000015 test ecx, 108D7A16h 0x0000001b test dh, bh 0x0000001d push dword ptr [ebp+64h] 0x00000020 test ah, FFFFFFE3h 0x00000023 push 00000367h 0x00000028 push ecx 0x00000029 mov ecx, 22739622h 0x0000002e cmp ecx, 22739622h 0x00000034 jne 00007F10843A55B1h 0x0000003a pop ecx 0x0000003b push 00000031h 0x0000003d cmp dl, bl 0x0000003f push dword ptr [ebp+000000B4h] 0x00000045 call 00007F10843AC1B8h 0x0000004a cmp ebx, ecx 0x0000004c cmp dl, FFFFFFF3h 0x0000004f mov edx, dword ptr [esp+04h] 0x00000053 test ebx, edx 0x00000055 mov ecx, dword ptr [esp+08h] 0x00000059 test al, 1Eh 0x0000005b add edx, ecx 0x0000005d neg ecx 0x0000005f mov ebx, dword ptr [esp+0Ch] 0x00000063 cmp edx, F9C1C0D7h 0x00000069 mov eax, dword ptr [esp+10h] 0x0000006d pushad 0x0000006e rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 0000000000567569 second address: 0000000000567569 instructions:
          Tries to detect Any.runShow sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeFile opened: C:\Program Files\qga\qga.exe
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 0000000002417D79 second address: 0000000002417D79 instructions:
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 000000000241870B second address: 000000000241870B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b inc ecx 0x0000000c inc ebx 0x0000000d cmp dword ptr [ebx], 9090C350h 0x00000013 jne 00007F10843A6503h 0x00000015 cmp edx, dword ptr [ebx] 0x00000017 jne 00007F10843A64D8h 0x00000019 cmp byte ptr [ebx], FFFFFFE8h 0x0000001c jne 00007F10843A657Ah 0x00000022 cmp byte ptr [ebx], FFFFFFB8h 0x00000025 jne 00007F10843A650Eh 0x00000027 cmp ecx, 00002000h 0x0000002d jne 00007F10843A6338h 0x00000033 pushad 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 000000000056870B second address: 000000000056870B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b inc ecx 0x0000000c inc ebx 0x0000000d cmp dword ptr [ebx], 9090C350h 0x00000013 jne 00007F1084A0CD13h 0x00000015 cmp edx, dword ptr [ebx] 0x00000017 jne 00007F1084A0CCE8h 0x00000019 cmp byte ptr [ebx], FFFFFFE8h 0x0000001c jne 00007F1084A0CD8Ah 0x00000022 cmp byte ptr [ebx], FFFFFFB8h 0x00000025 jne 00007F1084A0CD1Eh 0x00000027 cmp ecx, 00002000h 0x0000002d jne 00007F1084A0CB48h 0x00000033 pushad 0x00000034 lfence 0x00000037 rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 00000000005617E4 second address: 0000000000567569 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pop dword ptr [ebp+000000B4h] 0x00000010 cmp ax, bx 0x00000013 jmp 00007F10843A64E6h 0x00000015 test ecx, 108D7A16h 0x0000001b test dh, bh 0x0000001d push dword ptr [ebp+64h] 0x00000020 test ah, FFFFFFE3h 0x00000023 push 00000367h 0x00000028 push ecx 0x00000029 mov ecx, 22739622h 0x0000002e cmp ecx, 22739622h 0x00000034 jne 00007F10843A55B1h 0x0000003a pop ecx 0x0000003b push 00000031h 0x0000003d cmp dl, bl 0x0000003f push dword ptr [ebp+000000B4h] 0x00000045 call 00007F10843AC1B8h 0x0000004a cmp ebx, ecx 0x0000004c cmp dl, FFFFFFF3h 0x0000004f mov edx, dword ptr [esp+04h] 0x00000053 test ebx, edx 0x00000055 mov ecx, dword ptr [esp+08h] 0x00000059 test al, 1Eh 0x0000005b add edx, ecx 0x0000005d neg ecx 0x0000005f mov ebx, dword ptr [esp+0Ch] 0x00000063 cmp edx, F9C1C0D7h 0x00000069 mov eax, dword ptr [esp+10h] 0x0000006d pushad 0x0000006e rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeRDTSC instruction interceptor: First address: 0000000000567569 second address: 0000000000567569 instructions:
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02410BA5 rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeWindow / User API: threadDelayed 8415
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeAPI coverage: 7.2 %
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe TID: 4240Thread sleep count: 200 > 30
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe TID: 4240Thread sleep time: -2000000s >= -30000s
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeLast function: Thread delayed
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

          Anti Debugging:

          barindex
          Contains functionality to hide a thread from the debuggerShow sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024108BF NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?
          Hides threads from debuggersShow sources
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeThread information set: HideFromDebugger
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeThread information set: HideFromDebugger
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02410BA5 rdtsc
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02414A2D LdrInitializeThunk,
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02412294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241838A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024183B9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413017 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413020 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02413096 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024130AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02416924 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_024141E9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02417632 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241845E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02418402 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_0241841F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 0_2_02412D1A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00563017 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00563020 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00563096 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005630AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00566924 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005641E9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00562294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056838A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_005683B9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056845E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_0056841F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00568402 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00562D1A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeCode function: 2_2_00567632 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exeProcess created: C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe 'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1000756448.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1000756448.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1000756448.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: IRS_Covid-19_Relief_Payment_Notice_pdf.exe, 00000002.00000002.1000756448.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion22Input Capture1Security Software Discovery721Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion22Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          IRS_Covid-19_Relief_Payment_Notice_pdf.exe68%VirustotalBrowse
          IRS_Covid-19_Relief_Payment_Notice_pdf.exe41%MetadefenderBrowse
          IRS_Covid-19_Relief_Payment_Notice_pdf.exe75%ReversingLabsWin32.Spyware.Noon

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          No Antivirus matches

          Domains

          SourceDetectionScannerLabelLink
          chengsolution.com8%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          https://chengsolution.com/vr/tembin_AbNFdk131.bin11%VirustotalBrowse
          https://chengsolution.com/vr/tembin_AbNFdk131.bin0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          chengsolution.com
          162.0.209.179
          truetrueunknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          https://chengsolution.com/vr/tembin_AbNFdk131.binIRS_Covid-19_Relief_Payment_Notice_pdf.exetrue
          • 11%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          162.0.209.179
          unknownCanada
          35893ACPCAtrue

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:344014
          Start date:25.01.2021
          Start time:21:11:27
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 6s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:IRS_Covid-19_Relief_Payment_Notice_pdf.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@3/0@1/1
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 6.7% (good quality ratio 4.1%)
          • Quality average: 29.6%
          • Quality standard deviation: 28.9%
          HCA Information:
          • Successful, ratio: 77%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 168.61.161.212, 51.11.168.160, 52.155.217.156, 20.54.26.129, 8.248.137.254, 8.241.11.126, 8.248.113.254, 8.241.121.254, 8.241.123.254, 95.101.22.134, 95.101.22.125
          • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          21:12:38API Interceptor201x Sleep call for process: IRS_Covid-19_Relief_Payment_Notice_pdf.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          162.0.209.179IRS_Covid_19_Relief_Grant_Document_docx.exeGet hashmaliciousBrowse
            IRS_Covid-19_Relief_Payment_Notice_pdf.exeGet hashmaliciousBrowse

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              chengsolution.comIRS_Covid_19_Relief_Grant_Document_docx.exeGet hashmaliciousBrowse
              • 162.0.209.179
              IRS_Covid-19_Relief_Payment_Notice_pdf.exeGet hashmaliciousBrowse
              • 162.0.209.179

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              ACPCABENVAV31BU.htmlGet hashmaliciousBrowse
              • 162.0.209.171
              IRS_Covid_19_Relief_Grant_Document_docx.exeGet hashmaliciousBrowse
              • 162.0.209.179
              invoice 2021.xlsxGet hashmaliciousBrowse
              • 162.0.215.9
              1ELOG8UQ4M.htmGet hashmaliciousBrowse
              • 162.0.209.171
              1ELOG8UQ4M.htmGet hashmaliciousBrowse
              • 162.0.209.171
              FM0DWXGE27.htmGet hashmaliciousBrowse
              • 162.0.209.171
              Purchase Order and Contract Agreement Namtip THAI CO.docGet hashmaliciousBrowse
              • 162.0.209.181
              IRS_Covid-19_Relief_Payment_Notice_pdf.exeGet hashmaliciousBrowse
              • 162.0.209.179
              LRGjZ3F0AO.exeGet hashmaliciousBrowse
              • 162.0.219.122
              Busan Korea.exeGet hashmaliciousBrowse
              • 162.0.213.60
              mssecsvc.exeGet hashmaliciousBrowse
              • 162.36.93.137
              SCAN_20210115140930669.exeGet hashmaliciousBrowse
              • 162.0.213.203
              Order (2021.01.06).exeGet hashmaliciousBrowse
              • 162.0.213.203
              https://vodafone-bill-failed.comGet hashmaliciousBrowse
              • 162.0.215.120
              UF14VE7MF3.htmGet hashmaliciousBrowse
              • 162.0.209.142
              https://verify-requests.com/HSBC/Get hashmaliciousBrowse
              • 162.0.209.141
              46M2B7IIGN.htmGet hashmaliciousBrowse
              • 162.0.209.142
              http://recp.mkt91.net/ctt?m=804040&r=Njg0NjYxMDU1NQS2&b=0&j=NjAwMDczOTg3S0&k=NCLogo&kx=1&kt=12&kd=https://ahlhealth.com/Wednesday5029kl%23mark.tryniski@cbna.comGet hashmaliciousBrowse
              • 162.0.209.130
              https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fin0038847990.sn.am%2flfCk7ZE6GWq&c=E,1,XbwqZlmKwFAf_trFhDdV9wkuU6vutPEIQqN4IhE8jUbxLD3wnPPXDvKp8Jibjk9HngPAI5iRQWnG4vU_DQMKfMGkzgCqkZ-4BfRprMNSl9Nr7VoPQEtWNft5&typo=1Get hashmaliciousBrowse
              • 162.0.209.25
              https://joom.ag/qJFCGet hashmaliciousBrowse
              • 162.0.209.115

              JA3 Fingerprints

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              37f463bf4616ecd445d4a1937da06e19PAYMENT INFO.xlsxGet hashmaliciousBrowse
              • 162.0.209.179
              k.dllGet hashmaliciousBrowse
              • 162.0.209.179
              DOCUMENTS_RECEIVED.htmlGet hashmaliciousBrowse
              • 162.0.209.179
              case (348).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              request_form_1611565093.xlsmGet hashmaliciousBrowse
              • 162.0.209.179
              creoagent.dllGet hashmaliciousBrowse
              • 162.0.209.179
              creoagent.dllGet hashmaliciousBrowse
              • 162.0.209.179
              case (426).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (250).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              rvYr7FRwkG.dllGet hashmaliciousBrowse
              • 162.0.209.179
              case (1447).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (850).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              SecuriteInfo.com.Heur.18472.xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (1543).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              SecuriteInfo.com.FileRepMalware.dllGet hashmaliciousBrowse
              • 162.0.209.179
              case_1581.xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (435).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (426).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              case (61).xlsGet hashmaliciousBrowse
              • 162.0.209.179
              BENVAV31BU.htmlGet hashmaliciousBrowse
              • 162.0.209.179

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.442072374572181
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:IRS_Covid-19_Relief_Payment_Notice_pdf.exe
              File size:86016
              MD5:5525bb8a978d3ac15812c8d8ca9b8a57
              SHA1:dcb9549ff9c290e056f83639ad546b03206a0806
              SHA256:21f49ea6e105c22882a9fb0065803deee18eddb76767a30ddade2e2725eb65d9
              SHA512:0e5504ee2fc22ce87c1cac663e0c4cd76227025da20c2903d63ddafc0fc8a270d56a90b89c31d8ee448a61f881ace27037beb623f4409b9d1020a6b2a0a9f35b
              SSDEEP:768:bwSsRk+UMfhoeoCm0TI4Y4az55+mGMZkNS8+EMaybN1hBuKYR6mTLktPV9lIBtyd:JzTMoCnbO5+mG4ietbzhBuKYT3yVQm
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...5..`................. ...0...............0....@................

              File Icon

              Icon Hash:c0c4c26270faec04

              Static PE Info

              General

              Entrypoint:0x401498
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x6006B035 [Tue Jan 19 10:11:01 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:98834e8b1c22ed6d1484c39b625780c4

              Entrypoint Preview

              Instruction
              push 00401AD0h
              call 00007F1084753633h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              dec eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [edx], cl
              inc ecx
              hlt
              or cl, 00000019h
              fimul word ptr [ecx-53h]
              out dx, eax
              adc dword ptr [edi-2Fh], 0Dh
              mov al, byte ptr [000000DBh]
              add byte ptr [eax], al
              add byte ptr [ecx], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax+61h], ch
              outsb
              insb
              imul ebp, dword ptr [esi+67h], 6E616C70h
              jc 00007F10847536B1h
              add byte ptr [eax], ch
              js 00007F108475367Ah
              sub dword ptr [edx+00h], ebx
              add byte ptr [eax], al
              add bh, bh
              int3
              xor dword ptr [eax], eax
              or dword ptr [edx+3ADED508h], esp
              or ecx, dword ptr [edx-6Ch]
              pop ds
              pop ds
              xchg eax, ecx
              les ebp, fword ptr [esi]
              retf
              xor al, 10h
              inc esi
              cmp dword ptr [ebx+69h], edi
              mov eax, dword ptr [AD989B4Ch]
              cmp cl, byte ptr [ecx]
              test eax, 4F3AF830h
              lodsd
              xor ebx, dword ptr [ecx-48EE309Ah]
              or al, 00h
              stosb
              add byte ptr [eax-2Dh], ah
              xchg eax, ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              fiadd word ptr [eax+eax]
              add byte ptr [eax+03h], dl
              add byte ptr [eax], al
              add byte ptr [edi], al
              add byte ptr [esi+69h], al
              arpl word ptr [ebp+73h], si
              jnc 00007F1084753643h
              or eax, 00000801h

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x129b40x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x614.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x128.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x11ebc0x12000False0.396335177951data5.91456759437IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x130000x11c00x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x150000x6140x1000False0.159423828125data1.53535569768IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0x1532c0x2e8data
              RT_GROUP_ICON0x153180x14data
              RT_VERSION0x150f00x228dataEnglishUnited States

              Imports

              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaLateMemSt, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaVarCopy, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

              Version Infos

              DescriptionData
              Translation0x0409 0x04b0
              InternalNameauricular
              FileVersion2.00
              CompanyNameViralCherry
              ProductNameViralCherry
              ProductVersion2.00
              OriginalFilenameauricular.exe

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              01/25/21-21:13:16.006774ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 25, 2021 21:12:37.163822889 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.370588064 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.370753050 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.387664080 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.593071938 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.593127012 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.593166113 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.593189001 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.593291998 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.593463898 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.593763113 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.593851089 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.723326921 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.929546118 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:37.929732084 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:37.952332973 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.161600113 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.161936045 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.165251017 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.409738064 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502199888 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502262115 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502304077 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.502319098 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502332926 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.502391100 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502404928 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.502451897 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502465010 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.502504110 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.502521038 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.502577066 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.504307032 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.504407883 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.612926006 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.817199945 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.823016882 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:38.823117971 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:38.825042963 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.069766045 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154299974 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154360056 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154412031 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154422998 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.154463053 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154478073 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.154512882 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154553890 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.154561996 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.154633999 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.155539989 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.155623913 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.268781900 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.475152016 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.480762005 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.480901003 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.481908083 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.732598066 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818527937 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818579912 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818646908 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818650961 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.818691969 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.818696976 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818711996 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.818732977 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818748951 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.818778038 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.818783045 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.818839073 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.820482969 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:39.820561886 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:39.926428080 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.133285999 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.137948036 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.138056040 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.138873100 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.387552977 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.459985018 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460031986 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460088015 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.460091114 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460123062 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.460131884 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460172892 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.460191965 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460202932 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.460243940 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.460272074 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.460319042 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.463000059 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.463140011 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.566030979 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.771478891 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.776566982 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:40.776731014 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:40.777399063 CET49745443192.168.2.4162.0.209.179
              Jan 25, 2021 21:12:41.022336006 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:41.100502968 CET44349745162.0.209.179192.168.2.4
              Jan 25, 2021 21:12:41.100568056 CET44349745162.0.209.179192.168.2.4

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 25, 2021 21:12:10.024382114 CET5802853192.168.2.48.8.8.8
              Jan 25, 2021 21:12:10.072478056 CET53580288.8.8.8192.168.2.4
              Jan 25, 2021 21:12:11.098911047 CET5309753192.168.2.48.8.8.8
              Jan 25, 2021 21:12:11.146888971 CET53530978.8.8.8192.168.2.4
              Jan 25, 2021 21:12:12.063375950 CET4925753192.168.2.48.8.8.8
              Jan 25, 2021 21:12:12.114118099 CET53492578.8.8.8192.168.2.4
              Jan 25, 2021 21:12:13.107501030 CET6238953192.168.2.48.8.8.8
              Jan 25, 2021 21:12:13.158426046 CET53623898.8.8.8192.168.2.4
              Jan 25, 2021 21:12:14.189584970 CET4991053192.168.2.48.8.8.8
              Jan 25, 2021 21:12:14.237626076 CET53499108.8.8.8192.168.2.4
              Jan 25, 2021 21:12:15.161909103 CET5585453192.168.2.48.8.8.8
              Jan 25, 2021 21:12:15.209882021 CET53558548.8.8.8192.168.2.4
              Jan 25, 2021 21:12:16.141916990 CET6454953192.168.2.48.8.8.8
              Jan 25, 2021 21:12:16.198623896 CET53645498.8.8.8192.168.2.4
              Jan 25, 2021 21:12:17.105581045 CET6315353192.168.2.48.8.8.8
              Jan 25, 2021 21:12:17.153500080 CET53631538.8.8.8192.168.2.4
              Jan 25, 2021 21:12:18.105876923 CET5299153192.168.2.48.8.8.8
              Jan 25, 2021 21:12:18.153696060 CET53529918.8.8.8192.168.2.4
              Jan 25, 2021 21:12:19.030431032 CET5370053192.168.2.48.8.8.8
              Jan 25, 2021 21:12:19.078537941 CET53537008.8.8.8192.168.2.4
              Jan 25, 2021 21:12:19.965902090 CET5172653192.168.2.48.8.8.8
              Jan 25, 2021 21:12:20.014018059 CET53517268.8.8.8192.168.2.4
              Jan 25, 2021 21:12:20.888143063 CET5679453192.168.2.48.8.8.8
              Jan 25, 2021 21:12:20.936084986 CET53567948.8.8.8192.168.2.4
              Jan 25, 2021 21:12:21.827239990 CET5653453192.168.2.48.8.8.8
              Jan 25, 2021 21:12:21.875247002 CET53565348.8.8.8192.168.2.4
              Jan 25, 2021 21:12:22.802186966 CET5662753192.168.2.48.8.8.8
              Jan 25, 2021 21:12:22.853049040 CET53566278.8.8.8192.168.2.4
              Jan 25, 2021 21:12:23.793986082 CET5662153192.168.2.48.8.8.8
              Jan 25, 2021 21:12:23.853473902 CET53566218.8.8.8192.168.2.4
              Jan 25, 2021 21:12:24.748112917 CET6311653192.168.2.48.8.8.8
              Jan 25, 2021 21:12:24.796101093 CET53631168.8.8.8192.168.2.4
              Jan 25, 2021 21:12:25.718065977 CET6407853192.168.2.48.8.8.8
              Jan 25, 2021 21:12:25.768959999 CET53640788.8.8.8192.168.2.4
              Jan 25, 2021 21:12:37.072614908 CET6480153192.168.2.48.8.8.8
              Jan 25, 2021 21:12:37.137470961 CET53648018.8.8.8192.168.2.4
              Jan 25, 2021 21:12:40.884989023 CET6172153192.168.2.48.8.8.8
              Jan 25, 2021 21:12:40.933522940 CET53617218.8.8.8192.168.2.4
              Jan 25, 2021 21:12:56.844291925 CET5125553192.168.2.48.8.8.8
              Jan 25, 2021 21:12:56.914582968 CET53512558.8.8.8192.168.2.4
              Jan 25, 2021 21:12:57.455681086 CET6152253192.168.2.48.8.8.8
              Jan 25, 2021 21:12:57.514635086 CET53615228.8.8.8192.168.2.4
              Jan 25, 2021 21:12:58.124985933 CET5233753192.168.2.48.8.8.8
              Jan 25, 2021 21:12:58.172801971 CET53523378.8.8.8192.168.2.4
              Jan 25, 2021 21:12:58.316804886 CET5504653192.168.2.48.8.8.8
              Jan 25, 2021 21:12:58.373580933 CET53550468.8.8.8192.168.2.4
              Jan 25, 2021 21:12:58.848825932 CET4961253192.168.2.48.8.8.8
              Jan 25, 2021 21:12:58.911843061 CET53496128.8.8.8192.168.2.4
              Jan 25, 2021 21:12:59.508490086 CET4928553192.168.2.48.8.8.8
              Jan 25, 2021 21:12:59.557116032 CET5060153192.168.2.48.8.8.8
              Jan 25, 2021 21:12:59.567831039 CET53492858.8.8.8192.168.2.4
              Jan 25, 2021 21:12:59.608613968 CET53506018.8.8.8192.168.2.4
              Jan 25, 2021 21:13:00.114178896 CET6087553192.168.2.48.8.8.8
              Jan 25, 2021 21:13:00.179054976 CET53608758.8.8.8192.168.2.4
              Jan 25, 2021 21:13:00.746525049 CET5644853192.168.2.48.8.8.8
              Jan 25, 2021 21:13:00.802772999 CET53564488.8.8.8192.168.2.4
              Jan 25, 2021 21:13:02.268855095 CET5917253192.168.2.48.8.8.8
              Jan 25, 2021 21:13:02.330444098 CET53591728.8.8.8192.168.2.4
              Jan 25, 2021 21:13:03.524322033 CET6242053192.168.2.48.8.8.8
              Jan 25, 2021 21:13:03.580666065 CET53624208.8.8.8192.168.2.4
              Jan 25, 2021 21:13:04.710621119 CET6057953192.168.2.48.8.8.8
              Jan 25, 2021 21:13:04.767862082 CET53605798.8.8.8192.168.2.4
              Jan 25, 2021 21:13:15.000165939 CET5018353192.168.2.48.8.8.8
              Jan 25, 2021 21:13:15.210535049 CET6153153192.168.2.48.8.8.8
              Jan 25, 2021 21:13:15.958655119 CET5018353192.168.2.48.8.8.8
              Jan 25, 2021 21:13:16.004957914 CET53501838.8.8.8192.168.2.4
              Jan 25, 2021 21:13:16.006660938 CET53501838.8.8.8192.168.2.4
              Jan 25, 2021 21:13:16.031486034 CET53615318.8.8.8192.168.2.4
              Jan 25, 2021 21:13:19.540921926 CET4922853192.168.2.48.8.8.8
              Jan 25, 2021 21:13:19.602782965 CET53492288.8.8.8192.168.2.4
              Jan 25, 2021 21:13:50.004637957 CET5979453192.168.2.48.8.8.8
              Jan 25, 2021 21:13:50.052529097 CET53597948.8.8.8192.168.2.4
              Jan 25, 2021 21:13:51.203885078 CET5591653192.168.2.48.8.8.8
              Jan 25, 2021 21:13:51.260049105 CET53559168.8.8.8192.168.2.4

              ICMP Packets

              TimestampSource IPDest IPChecksumCodeType
              Jan 25, 2021 21:13:16.006773949 CET192.168.2.48.8.8.8d022(Port unreachable)Destination Unreachable

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Jan 25, 2021 21:12:37.072614908 CET192.168.2.48.8.8.80x9d11Standard query (0)chengsolution.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Jan 25, 2021 21:12:37.137470961 CET8.8.8.8192.168.2.40x9d11No error (0)chengsolution.com162.0.209.179A (IP address)IN (0x0001)

              HTTPS Packets

              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
              Jan 25, 2021 21:12:37.593763113 CET162.0.209.179443192.168.2.449745CN=chengsolution.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBSat Jan 09 01:00:00 CET 2021 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Tue Jan 04 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
              CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
              CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:21:12:14
              Start date:25/01/2021
              Path:C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'
              Imagebase:0x400000
              File size:86016 bytes
              MD5 hash:5525BB8A978D3AC15812C8D8CA9B8A57
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Reputation:low

              General

              Start time:21:12:30
              Start date:25/01/2021
              Path:C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\IRS_Covid-19_Relief_Payment_Notice_pdf.exe'
              Imagebase:0x400000
              File size:86016 bytes
              MD5 hash:5525BB8A978D3AC15812C8D8CA9B8A57
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >