Loading ...

Play interactive tourEdit tour

Analysis Report OII9x4FeW7.exe

Overview

General Information

Sample Name:OII9x4FeW7.exe
Analysis ID:356280
MD5:ff7d3b6003c9058e40ae38a6a7efe40c
SHA1:842bbfb81f4a65112bc2d8e4aff8b976e5db9a55
SHA256:c3304ec52968793ae709cf7c7caad6acae0bded8088f06cefbee55bde0a9224f
Tags:exeYoungLotus

Most interesting Screenshot:

Detection

Mimikatz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Mimikatz
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample is not signed and drops a device driver
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables driver privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Spawns drivers
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • OII9x4FeW7.exe (PID: 3604 cmdline: 'C:\Users\user\Desktop\OII9x4FeW7.exe' MD5: FF7D3B6003C9058E40AE38A6A7EFE40C)
    • Ogxog.exe (PID: 6188 cmdline: 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Ogxog.exe' MD5: FF7D3B6003C9058E40AE38A6A7EFE40C)
    • cmd.exe (PID: 6204 cmdline: C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\OII9X4~1.EXE > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • PING.EXE (PID: 6312 cmdline: ping -n 2 127.0.0.1 MD5: 70C24A306F768936563ABDADB9CA9108)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
    00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
      Process Memory Space: OII9x4FeW7.exe PID: 3604JoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
        Process Memory Space: Ogxog.exe PID: 6188JoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          1.2.OII9x4FeW7.exe.10101928.5.raw.unpackGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
          • 0x22ff0:$x4: Http/1.1 403 Forbidden
          • 0x22ff0:$s5: Http/1.1 403 Forbidden
          1.2.OII9x4FeW7.exe.10101928.5.raw.unpackMimikatz_StringsDetects Mimikatz stringsFlorian Roth
          • 0x22fa7:$x1: sekurlsa::logonpasswords
          1.2.OII9x4FeW7.exe.10101928.5.raw.unpackJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
            2.2.Ogxog.exe.10101928.4.raw.unpackGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
            • 0x22ff0:$x4: Http/1.1 403 Forbidden
            • 0x22ff0:$s5: Http/1.1 403 Forbidden
            2.2.Ogxog.exe.10101928.4.raw.unpackMimikatz_StringsDetects Mimikatz stringsFlorian Roth
            • 0x22fa7:$x1: sekurlsa::logonpasswords
            Click to see the 7 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: OII9x4FeW7.exeAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Windows\System32\drivers\QAssist.sysAvira: detection malicious, Label: RKIT/Agent.ccibt
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeReversingLabs: Detection: 76%
            Source: C:\Windows\System32\drivers\QAssist.sysReversingLabs: Detection: 46%
            Multi AV Scanner detection for submitted fileShow sources
            Source: OII9x4FeW7.exeVirustotal: Detection: 73%Perma Link
            Source: OII9x4FeW7.exeReversingLabs: Detection: 76%
            Machine Learning detection for dropped fileShow sources
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeJoe Sandbox ML: detected
            Machine Learning detection for sampleShow sources
            Source: OII9x4FeW7.exeJoe Sandbox ML: detected

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: OII9x4FeW7.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: F:\hidden-master\x64\Debug\QAssist.pdb source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp, QAssist.sys.2.dr
            Source: Binary string: F:\hidden-master\Debug\QAssist.pdb source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp

            Networking:

            barindex
            Uses ping.exe to check the status of other devices and networksShow sources
            Source: unknownProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: global trafficTCP traffic: 192.168.2.5:49708 -> 58.218.67.253:281
            Source: unknownDNS traffic detected: queries for: s2010218.f3322.net
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpString found in binary or memory: http://ptlogin2.qun.qq.com%s
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpString found in binary or memory: http://qun.qq.com%s
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpString found in binary or memory: https://localhost.ptlogin2.qq.com:4301%s
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpString found in binary or memory: https://ssl.ptlogin2.qq.com%s
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpString found in binary or memory: https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 1.2.OII9x4FeW7.exe.10101928.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
            Source: 1.2.OII9x4FeW7.exe.10101928.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
            Source: 2.2.Ogxog.exe.10101928.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
            Source: 2.2.Ogxog.exe.10101928.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
            Source: 1.2.OII9x4FeW7.exe.10110f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
            Source: 1.2.OII9x4FeW7.exe.10110f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
            Source: 2.2.Ogxog.exe.10110f70.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
            Source: 2.2.Ogxog.exe.10110f70.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\system32\drivers\QAssist.sysJump to behavior
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\system32\drivers\QAssist.sysJump to behavior
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\system32\drivers\QAssist.sysJump to behavior
            Source: Joe Sandbox ViewDropped File: C:\Windows\System32\drivers\QAssist.sys 6CCE28B275D5EC20992BB13790976CAF434AB46DDBFD5CFD431D33424943122B
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeProcess token adjusted: Load Driver
            Source: OII9x4FeW7.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: OII9x4FeW7.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Ogxog.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Ogxog.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: OII9x4FeW7.exe, 00000001.00000002.246831697.00000000007A0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs OII9x4FeW7.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.246831697.00000000007A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs OII9x4FeW7.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247283379.0000000002500000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs OII9x4FeW7.exe
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\QAssist
            Source: OII9x4FeW7.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: 1.2.OII9x4FeW7.exe.10101928.5.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.OII9x4FeW7.exe.10101928.5.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/, score =
            Source: 2.2.Ogxog.exe.10101928.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.Ogxog.exe.10101928.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/, score =
            Source: 1.2.OII9x4FeW7.exe.10110f70.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.OII9x4FeW7.exe.10110f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/, score =
            Source: 2.2.Ogxog.exe.10110f70.5.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.Ogxog.exe.10110f70.5.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/, score =
            Source: QAssist.sys.2.drBinary string: \Device\QAssist\DosDevices\QAssist
            Source: QAssist.sys.2.drBinary string: \Device\
            Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@8/4@3/2
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeMutant created: \Sessions\1\BaseNamedObjects\Global\87S2tba0tb7QCLOztLTQEAn6pg==
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6268:120:WilError_01
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: OII9x4FeW7.exeVirustotal: Detection: 73%
            Source: OII9x4FeW7.exeReversingLabs: Detection: 76%
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile read: C:\Users\user\Desktop\OII9x4FeW7.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\OII9x4FeW7.exe 'C:\Users\user\Desktop\OII9x4FeW7.exe'
            Source: unknownProcess created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Ogxog.exe'
            Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\OII9X4~1.EXE > nul
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Ogxog.exe'
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\OII9X4~1.EXE > nul
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
            Source: Binary string: F:\hidden-master\x64\Debug\QAssist.pdb source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp, QAssist.sys.2.dr
            Source: Binary string: F:\hidden-master\Debug\QAssist.pdb source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeCode function: 1_2_0045F704 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: initial sampleStatic PE information: section where entry point is pointing to: .data
            Source: Ogxog.exe.1.drStatic PE information: real checksum: 0x6fb56 should be: 0x66380
            Source: OII9x4FeW7.exeStatic PE information: real checksum: 0x6fb56 should be: 0x66380
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeCode function: 1_2_0045E860 push eax; ret
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeCode function: 2_2_0045E860 push eax; ret

            Persistence and Installation Behavior:

            barindex
            Sample is not signed and drops a device driverShow sources
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\system32\drivers\QAssist.sysJump to behavior
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeJump to dropped file
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\System32\drivers\QAssist.sysJump to dropped file
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeJump to dropped file
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeFile created: C:\Windows\System32\drivers\QAssist.sysJump to dropped file

            Boot Survival:

            barindex
            Drops PE files to the startup folderShow sources
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeJump to dropped file
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe\:Zone.Identifier:$DATAJump to behavior
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssistJump to behavior
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe\:Zone.Identifier:$DATAJump to behavior
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Uses ping.exe to sleepShow sources
            Source: unknownProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeWindow / User API: threadDelayed 509
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeWindow / User API: threadDelayed 407
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeDropped PE file which has not been started: C:\Windows\System32\drivers\QAssist.sysJump to dropped file
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe TID: 6236Thread sleep count: 509 > 30
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe TID: 6236Thread sleep time: -30540000s >= -30000s
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe TID: 6192Thread sleep count: 407 > 30
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe TID: 6236Thread sleep time: -60000s >= -30000s
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeLast function: Thread delayed
            Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeCode function: 1_2_0045F704 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Ogxog.exe'
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\OII9X4~1.EXE > nul
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 2 127.0.0.1
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: Progman
            Source: Ogxog.exe, 00000002.00000002.512918682.0000000000D10000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
            Source: Ogxog.exe, 00000002.00000002.512918682.0000000000D10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
            Source: Ogxog.exe, 00000002.00000002.512918682.0000000000D10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndProgman%s.exeBITS -inst.sys\system32\drivers\\sysnative\drivers\SYSTEM\CurrentControlSet\Services\BITSSYSTEM\SelectMarkTimeSYSTEM\CurrentControlSet\Services\\Registry\Machine\System\CurrentControlSet\Services\%SZwUnloadDriverNTDLL.DLLRtlInitUnicodeStringSeLoadDriverPrivilegeCreateEventACloseHandleWaitForSingleObject
            Source: C:\Users\user\Desktop\OII9x4FeW7.exeCode function: 1_2_0045C790 EntryPoint,GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: acs.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: vsserv.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: avcenter.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: kxetray.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: avp.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: cfp.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: KSafeTray.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: rtvscan.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: 360tray.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: ashDisp.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: TMBMSRV.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: avgwdsvc.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: AYAgent.aye
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: QUHLPSVC.EXE
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: RavMonD.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: Mcshield.exe
            Source: OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpBinary or memory string: K7TSecurity.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected MimikatzShow sources
            Source: Yara matchFile source: 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: OII9x4FeW7.exe PID: 3604, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Ogxog.exe PID: 6188, type: MEMORY
            Source: Yara matchFile source: 1.2.OII9x4FeW7.exe.10101928.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Ogxog.exe.10101928.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.OII9x4FeW7.exe.10110f70.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Ogxog.exe.10110f70.5.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsNative API1Startup Items1Startup Items1Masquerading3OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobWindows Service2Windows Service2Virtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery12Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Registry Run Keys / Startup Folder12Process Injection12Process Injection12Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)LSASS Driver2Registry Run Keys / Startup Folder12Obfuscated Files or Information1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptLSASS Driver2Software PackingLSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery11VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Network Configuration Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery2Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            OII9x4FeW7.exe73%VirustotalBrowse
            OII9x4FeW7.exe77%ReversingLabsWin32.Backdoor.Farfli
            OII9x4FeW7.exe100%AviraTR/Crypt.XPACK.Gen
            OII9x4FeW7.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Windows\System32\drivers\QAssist.sys100%AviraRKIT/Agent.ccibt
            C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe100%AviraTR/Crypt.XPACK.Gen
            C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe100%Joe Sandbox ML
            C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe77%ReversingLabsWin32.Backdoor.Farfli
            C:\Windows\System32\drivers\QAssist.sys47%ReversingLabsWin64.Trojan.Generic

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            2.0.Ogxog.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            2.2.Ogxog.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.0.OII9x4FeW7.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.OII9x4FeW7.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://ssl.ptlogin2.qq.com%s0%Avira URL Cloudsafe
            http://ptlogin2.qun.qq.com%s0%Avira URL Cloudsafe
            http://qun.qq.com%s0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            s2010218.f3322.net
            58.218.67.253
            truefalse
              high

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              https://ssl.ptlogin2.qq.com%sOII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_OII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpfalse
                high
                http://ptlogin2.qun.qq.com%sOII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://qun.qq.com%sOII9x4FeW7.exe, 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Ogxog.exe, 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                58.218.67.253
                unknownChina
                134769CHINANET-JIANGSU-CHANGZHOU-IDCChinaNetJiangsuChangzhouIDfalse

                Private

                IP
                127.0.0.1

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:356280
                Start date:22.02.2021
                Start time:20:41:01
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 23s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:OII9x4FeW7.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:27
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.adwa.evad.winEXE@8/4@3/2
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 70.5% (good quality ratio 64%)
                • Quality average: 78.7%
                • Quality standard deviation: 31.3%
                HCA Information:Failed
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 104.42.151.234, 51.103.5.186, 204.79.197.200, 13.107.21.200, 93.184.220.29, 51.104.144.132, 13.64.90.137, 40.88.32.150, 168.61.161.212, 184.30.24.56, 184.30.21.144, 51.103.5.159, 51.104.146.109, 92.122.213.194, 92.122.213.247, 20.54.26.129
                • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, client.wns.windows.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, dual-a-0001.a-msedge.net, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                20:41:59API Interceptor1096x Sleep call for process: Ogxog.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                58.218.67.253mgZRDu7Jxu.exeGet hashmaliciousBrowse

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  CHINANET-JIANGSU-CHANGZHOU-IDCChinaNetJiangsuChangzhouIDmgZRDu7Jxu.exeGet hashmaliciousBrowse
                  • 58.218.67.253

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Windows\System32\drivers\QAssist.sysMoQCvCpfgw.exeGet hashmaliciousBrowse
                    dC5i7RPJtz.exeGet hashmaliciousBrowse
                      dTCaJ7tQjT.exeGet hashmaliciousBrowse
                        KrcT896PNT.exeGet hashmaliciousBrowse
                          egy7oSjGz0.dllGet hashmaliciousBrowse
                            dPTqTpDNrQ.exeGet hashmaliciousBrowse
                              qGMyccscIL.exeGet hashmaliciousBrowse
                                d6Ide0bYbh.exeGet hashmaliciousBrowse

                                  Created / dropped Files

                                  C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe
                                  Process:C:\Users\user\Desktop\OII9x4FeW7.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):409600
                                  Entropy (8bit):7.806057633930343
                                  Encrypted:false
                                  SSDEEP:6144:2SuxNOug5MI3KBau3EO8iZrEXA2czL6mWzdoZtAznpGuGEwJvfJ0s+VC:3ux9g5F6U2WOWczLygAzN6fJX
                                  MD5:FF7D3B6003C9058E40AE38A6A7EFE40C
                                  SHA1:842BBFB81F4A65112BC2D8E4AFF8B976E5DB9A55
                                  SHA-256:C3304EC52968793AE709CF7C7CAAD6ACAE0BDED8088F06CEFBEE55BDE0A9224F
                                  SHA-512:486865A075B6D87187EA73AE2E76A7537F8FD63A6743ADFBFC4225573E98187DE4C397771061E92442FB868AB48DF8CDE4B9E4EBBA2EF6D065456C8A4049EE98
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 77%
                                  Reputation:low
                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........6...X,..X,..X,..S,..X,y.V,..X,..R,..X,y..,..X,..Y,..X,..i,..X,=.^,..X,..\,..X,Rich..X,........PE..L...0|.].....................<....................@..........................`......V...................................E...\...(.... ...6...........................................................................................................data...............................@....rsrc....6... ...8..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe:Zone.Identifier
                                  Process:C:\Users\user\Desktop\OII9x4FeW7.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview: [ZoneTransfer]....ZoneId=0
                                  C:\Windows\System32\drivers\QAssist.sys
                                  Process:C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):77896
                                  Entropy (8bit):6.14724588578885
                                  Encrypted:false
                                  SSDEEP:1536:svHIPCv5eT9OrLPC5VwHrhpTrkt5Ad53vE1qXn9Jm6Y:svHIPmn/rHrhpTrkt52E1qXpY
                                  MD5:4E34C068E764AD0FF0CB58BC4F143197
                                  SHA1:1A392A469FC8C65D80055C1A7AAEE27BF5EBE7C4
                                  SHA-256:6CCE28B275D5EC20992BB13790976CAF434AB46DDBFD5CFD431D33424943122B
                                  SHA-512:DCEA6D76452B1AC9E3C1FED7463FE873B4DD4603EC67A4E204C27BA2C1EA79415508C3044223626F0AE499A9B7A3D6FB283F0978B5E20A58E959C9440376E98B
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 47%
                                  Joe Sandbox View:
                                  • Filename: MoQCvCpfgw.exe, Detection: malicious, Browse
                                  • Filename: dC5i7RPJtz.exe, Detection: malicious, Browse
                                  • Filename: dTCaJ7tQjT.exe, Detection: malicious, Browse
                                  • Filename: KrcT896PNT.exe, Detection: malicious, Browse
                                  • Filename: egy7oSjGz0.dll, Detection: malicious, Browse
                                  • Filename: dPTqTpDNrQ.exe, Detection: malicious, Browse
                                  • Filename: qGMyccscIL.exe, Detection: malicious, Browse
                                  • Filename: d6Ide0bYbh.exe, Detection: malicious, Browse
                                  Reputation:low
                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........E.|\$./\$./\$./U\6/]$./U\ /]$./..{/X$./..x/]$./U\&/Y$./\$./.$./.U/V$./.k/]$./Rich\$./........................PE..d....E\.........."..................@.........@.............................`...............................................................@..<............0..........H....P...... ................................................................................text............................... ..h.rdata..............................@..H.data...0.... ......................@....pdata.......0......................@..HINIT.........@...................... ..b.reloc.......P......................@..B................................................................................................................................................................................................................................................................
                                  \Device\Null
                                  Process:C:\Windows\SysWOW64\PING.EXE
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):331
                                  Entropy (8bit):4.92149009030101
                                  Encrypted:false
                                  SSDEEP:6:PzLSLzMRfmWxHLThx2LThx0sW26VY7FwAFeMmvVOIHJFxMVlmJHaVFEG1vv:PKMRJpTeT0sBSAFSkIrxMVlmJHaVzvv
                                  MD5:2E512EE24AAB186D09E9A1F9B72A0569
                                  SHA1:C5BA2E0C0338FFEE13ED1FB6DA0CC9C000824B0B
                                  SHA-256:DB41050CA723A06D95B73FFBE40B32DE941F5EE474F129B2B33E91C67B72674F
                                  SHA-512:6B4487A088155E34FE5C642E1C3D46F63CB2DDD9E4092809CE6F3BEEFDEF0D1F8AA67F8E733EDE70B07F467ED5BB6F07104EEA4C1E7AC7E1A502A772F56F7DE9
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview: ..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.806057633930343
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:OII9x4FeW7.exe
                                  File size:409600
                                  MD5:ff7d3b6003c9058e40ae38a6a7efe40c
                                  SHA1:842bbfb81f4a65112bc2d8e4aff8b976e5db9a55
                                  SHA256:c3304ec52968793ae709cf7c7caad6acae0bded8088f06cefbee55bde0a9224f
                                  SHA512:486865a075b6d87187ea73ae2e76a7537f8fd63a6743adfbfc4225573e98187de4c397771061e92442fb868ab48df8cde4b9e4ebba2ef6d065456c8a4049ee98
                                  SSDEEP:6144:2SuxNOug5MI3KBau3EO8iZrEXA2czL6mWzdoZtAznpGuGEwJvfJ0s+VC:3ux9g5F6U2WOWczLygAzN6fJX
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........6...X,..X,..X,..S,..X,y.V,..X,..R,..X,y..,..X,..Y,..X,..i,..X,=.^,..X,..\,..X,Rich..X,........PE..L...0|.]...................

                                  File Icon

                                  Icon Hash:f0d2ec4ccce8d270

                                  Static PE Info

                                  General

                                  Entrypoint:0x45c790
                                  Entrypoint Section:.data
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                  DLL Characteristics:
                                  Time Stamp:0x5D977C30 [Fri Oct 4 17:06:56 2019 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:19d4e66d725c89ba6712b82bebc8196d

                                  Entrypoint Preview

                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push FFFFFFFFh
                                  push 0045B568h
                                  push 0045D560h
                                  mov eax, dword ptr fs:[00000000h]
                                  push eax
                                  mov dword ptr fs:[00000000h], esp
                                  sub esp, 58h
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-18h], esp
                                  call dword ptr [00401010h]
                                  xor edx, edx
                                  mov dl, ah
                                  mov dword ptr [004606ACh], edx
                                  mov ecx, eax
                                  and ecx, 000000FFh
                                  mov dword ptr [004606A8h], ecx
                                  shl ecx, 08h
                                  add ecx, edx
                                  mov dword ptr [004606A4h], ecx
                                  shr eax, 10h
                                  mov dword ptr [004606A0h], eax
                                  push 00000001h
                                  call 00007FBCC87D18FFh
                                  pop ecx
                                  test eax, eax
                                  jne 00007FBCC87D0CEAh
                                  push 0000001Ch
                                  call 00007FBCC87D0DA8h
                                  pop ecx
                                  call 00007FBCC87D16AAh
                                  test eax, eax
                                  jne 00007FBCC87D0CEAh
                                  push 00000010h
                                  call 00007FBCC87D0D97h
                                  pop ecx
                                  xor esi, esi
                                  mov dword ptr [ebp-04h], esi
                                  call 00007FBCC87D14D8h
                                  call dword ptr [0040100Ch]
                                  mov dword ptr [00460D58h], eax
                                  call 00007FBCC87D1396h
                                  mov dword ptr [00460690h], eax
                                  call 00007FBCC87D113Fh
                                  call 00007FBCC87D1081h
                                  call 00007FBCC87D0D8Ch
                                  mov dword ptr [ebp-30h], esi
                                  lea eax, dword ptr [ebp-5Ch]
                                  push eax
                                  call dword ptr [00401008h]
                                  call 00007FBCC87D1012h
                                  mov dword ptr [ebp-64h], eax
                                  test byte ptr [ebp-30h], 00000001h
                                  je 00007FBCC87D0CE8h
                                  movzx eax, word ptr [ebp+00h]

                                  Rich Headers

                                  Programming Language:
                                  • [C++] VS98 (6.0) SP6 build 8804
                                  • [EXP] VC++ 6.0 SP5 build 8804
                                  • [ C ] VS98 (6.0) SP6 build 8804
                                  • [LNK] VC++ 6.0 SP5 build 8804

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x611d00x45.data
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x60d5c0x28.data
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x3690.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000xc8.data
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .data0x10000x602150x60400False0.923445109578data7.8782253441IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                  .rsrc0x620000x36900x3800False0.337611607143data4.00280030121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_ICON0x621e00xea8dataChineseChina
                                  RT_ICON0x630880x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0ChineseChina
                                  RT_ICON0x639300x568GLS_BINARY_LSB_FIRSTChineseChina
                                  RT_ICON0x63ec80x10a8dataChineseChina
                                  RT_ICON0x64f700x468GLS_BINARY_LSB_FIRSTChineseChina
                                  RT_GROUP_ICON0x63e980x30dataChineseChina
                                  RT_GROUP_ICON0x653d80x22dataChineseChina
                                  RT_MANIFEST0x654000x28bXML 1.0 document textChineseChina

                                  Imports

                                  DLLImport
                                  KERNEL32.dllGetProcAddress, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, HeapFree, RtlUnwind, WriteFile, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCPInfo, GetACP, GetOEMCP, HeapAlloc, VirtualAlloc, HeapReAlloc, LoadLibraryA, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, InterlockedDecrement, InterlockedIncrement

                                  Exports

                                  NameOrdinalAddress
                                  Loader10x45c738

                                  Possible Origin

                                  Language of compilation systemCountry where language is spokenMap
                                  ChineseChina

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Feb 22, 2021 20:42:01.029640913 CET49708281192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:01.080394983 CET497098080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:04.087625980 CET49708281192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:04.165674925 CET497098080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:10.088187933 CET49708281192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:10.213155031 CET497098080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:53.948281050 CET497298080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:42:56.951469898 CET497298080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:43:03.081592083 CET497298080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:43:48.058778048 CET497328080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:43:51.049793959 CET497328080192.168.2.558.218.67.253
                                  Feb 22, 2021 20:43:57.065963984 CET497328080192.168.2.558.218.67.253

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Feb 22, 2021 20:41:48.500123978 CET5270453192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:48.505867958 CET5221253192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:48.557265043 CET53522128.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:48.559782028 CET53527048.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:49.011498928 CET5430253192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:49.060205936 CET53543028.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:49.158063889 CET5378453192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:49.223365068 CET53537848.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:49.361866951 CET6530753192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:49.413301945 CET53653078.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:49.502137899 CET6434453192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:49.550826073 CET53643448.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:51.354911089 CET6206053192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:51.403692961 CET53620608.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:52.531354904 CET6180553192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:52.580068111 CET53618058.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:53.553792953 CET5479553192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:53.602478981 CET53547958.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:54.484803915 CET4955753192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:54.542031050 CET53495578.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:55.732637882 CET6173353192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:55.784128904 CET53617338.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:57.307502031 CET6544753192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:57.358906984 CET53654478.8.8.8192.168.2.5
                                  Feb 22, 2021 20:41:58.987716913 CET5244153192.168.2.58.8.8.8
                                  Feb 22, 2021 20:41:59.036402941 CET53524418.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:00.254842997 CET6217653192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:00.304841042 CET53621768.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:00.736221075 CET5959653192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:01.060415983 CET53595968.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:01.588896036 CET6529653192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:01.642838001 CET53652968.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:02.764766932 CET6318353192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:02.813393116 CET53631838.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:04.300543070 CET6015153192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:04.360558033 CET53601518.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:09.053586960 CET5696953192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:09.115528107 CET53569698.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:09.366693974 CET5516153192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:09.426685095 CET53551618.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:25.297349930 CET5475753192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:25.348947048 CET53547578.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:44.368484974 CET4999253192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:44.425599098 CET53499928.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:46.439716101 CET6007553192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:46.488514900 CET53600758.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:52.526004076 CET5501653192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:52.586776018 CET53550168.8.8.8192.168.2.5
                                  Feb 22, 2021 20:42:53.885593891 CET6434553192.168.2.58.8.8.8
                                  Feb 22, 2021 20:42:53.943073034 CET53643458.8.8.8192.168.2.5
                                  Feb 22, 2021 20:43:09.285339117 CET5712853192.168.2.58.8.8.8
                                  Feb 22, 2021 20:43:09.334151983 CET53571288.8.8.8192.168.2.5
                                  Feb 22, 2021 20:43:32.359483004 CET5479153192.168.2.58.8.8.8
                                  Feb 22, 2021 20:43:32.411156893 CET53547918.8.8.8192.168.2.5
                                  Feb 22, 2021 20:43:47.758420944 CET5046353192.168.2.58.8.8.8
                                  Feb 22, 2021 20:43:48.057722092 CET53504638.8.8.8192.168.2.5

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Feb 22, 2021 20:42:00.736221075 CET192.168.2.58.8.8.80x6780Standard query (0)s2010218.f3322.netA (IP address)IN (0x0001)
                                  Feb 22, 2021 20:42:53.885593891 CET192.168.2.58.8.8.80xc566Standard query (0)s2010218.f3322.netA (IP address)IN (0x0001)
                                  Feb 22, 2021 20:43:47.758420944 CET192.168.2.58.8.8.80x6914Standard query (0)s2010218.f3322.netA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Feb 22, 2021 20:42:01.060415983 CET8.8.8.8192.168.2.50x6780No error (0)s2010218.f3322.net58.218.67.253A (IP address)IN (0x0001)
                                  Feb 22, 2021 20:42:53.943073034 CET8.8.8.8192.168.2.50xc566No error (0)s2010218.f3322.net58.218.67.253A (IP address)IN (0x0001)
                                  Feb 22, 2021 20:43:48.057722092 CET8.8.8.8192.168.2.50x6914No error (0)s2010218.f3322.net58.218.67.253A (IP address)IN (0x0001)

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:20:41:58
                                  Start date:22/02/2021
                                  Path:C:\Users\user\Desktop\OII9x4FeW7.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\OII9x4FeW7.exe'
                                  Imagebase:0x400000
                                  File size:409600 bytes
                                  MD5 hash:FF7D3B6003C9058E40AE38A6A7EFE40C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Mimikatz_1, Description: Yara detected Mimikatz, Source: 00000001.00000002.247680497.0000000010100000.00000004.00000001.sdmp, Author: Joe Security
                                  Reputation:low

                                  General

                                  Start time:20:41:59
                                  Start date:22/02/2021
                                  Path:C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Ogxog.exe'
                                  Imagebase:0x400000
                                  File size:409600 bytes
                                  MD5 hash:FF7D3B6003C9058E40AE38A6A7EFE40C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Mimikatz_1, Description: Yara detected Mimikatz, Source: 00000002.00000002.514979015.0000000010100000.00000004.00000001.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 77%, ReversingLabs
                                  Reputation:low

                                  General

                                  Start time:20:41:59
                                  Start date:22/02/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\user\Desktop\OII9X4~1.EXE > nul
                                  Imagebase:0x330000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:20:42:01
                                  Start date:22/02/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7ecfc0000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:20:42:01
                                  Start date:22/02/2021
                                  Path:C:\Windows\SysWOW64\PING.EXE
                                  Wow64 process (32bit):true
                                  Commandline:ping -n 2 127.0.0.1
                                  Imagebase:0xee0000
                                  File size:18944 bytes
                                  MD5 hash:70C24A306F768936563ABDADB9CA9108
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  Disassembly

                                  Code Analysis

                                  Reset < >