Loading ...

Play interactive tourEdit tour

Analysis Report aEdlObiYav

Overview

General Information

Sample Name:aEdlObiYav (renamed file extension from none to exe)
Analysis ID:376365
MD5:ae03a6f8fb74d401b403647d28e21574
SHA1:6ee320cedc77499f5df9ae9c93ef42c0d91f3ce8
SHA256:1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Emotet e-Banking trojan
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • aEdlObiYav.exe (PID: 5064 cmdline: 'C:\Users\user\Desktop\aEdlObiYav.exe' MD5: AE03A6F8FB74D401B403647D28E21574)
    • aEdlObiYav.exe (PID: 5528 cmdline: --79fd8b32 MD5: AE03A6F8FB74D401B403647D28E21574)
  • picturerus.exe (PID: 6084 cmdline: C:\Windows\SysWOW64\picturerus.exe MD5: AE03A6F8FB74D401B403647D28E21574)
    • picturerus.exe (PID: 4228 cmdline: --b743c2a4 MD5: AE03A6F8FB74D401B403647D28E21574)
  • svchost.exe (PID: 5536 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2376 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4504 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 804 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 1228 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 5540 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 5048 cmdline: 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 3896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
    • 0xfad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 FA ED 00 85 C0
    • 0x50d4:$snippet6: 33 C0 21 05 EC 10 EE 00 A3 E8 10 EE 00 39 05 A0 E3 ED 00 74 18 40 A3 E8 10 EE 00 83 3C C5 A0 E3 ...
    00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
      • 0xfad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 FA E2 00 85 C0
      • 0x50d4:$snippet6: 33 C0 21 05 EC 10 E3 00 A3 E8 10 E3 00 39 05 A0 E3 E2 00 74 18 40 A3 E8 10 E3 00 83 3C C5 A0 E3 ...
      00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        Click to see the 11 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.aEdlObiYav.exe.22c053f.2.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
        • 0x2577:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
        • 0x255d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
        0.2.aEdlObiYav.exe.22c053f.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          0.2.aEdlObiYav.exe.22c053f.2.unpackEmotetEmotet Payloadkevoreilly
          • 0x7ad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 FA 40 00 85 C0
          • 0x48d4:$snippet6: 33 C0 21 05 EC 10 41 00 A3 E8 10 41 00 39 05 A0 E3 40 00 74 18 40 A3 E8 10 41 00 83 3C C5 A0 E3 ...
          3.2.picturerus.exe.e1053f.2.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
          • 0x2577:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
          • 0x255d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
          3.2.picturerus.exe.e1053f.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
            Click to see the 23 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: aEdlObiYav.exeAvira: detected
            Multi AV Scanner detection for submitted fileShow sources
            Source: aEdlObiYav.exeReversingLabs: Detection: 96%
            Machine Learning detection for sampleShow sources
            Source: aEdlObiYav.exeJoe Sandbox ML: detected
            Source: 0.2.aEdlObiYav.exe.22c053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: 3.2.picturerus.exe.e1053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: 4.2.picturerus.exe.60053f.1.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: 1.2.aEdlObiYav.exe.218053f.1.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219207B CryptDuplicateHash,CryptEncrypt,CryptDestroyHash,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219215A CryptDuplicateHash,CryptDecrypt,CryptVerifySignatureW,CryptDestroyHash,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191F11 CryptExportKey,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191F56 CryptGetHashParam,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191FFC CryptGenKey,CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED207B CryptDuplicateHash,CryptEncrypt,CryptDestroyHash,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1FFC CryptGenKey,CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1F75 CryptAcquireContextW,CryptDecodeObjectEx,CryptImportKey,LocalFree,CryptReleaseContext,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1F11 CryptExportKey,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED215A CryptDuplicateHash,CryptDecrypt,CryptVerifySignatureW,CryptDestroyHash,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1F56 CryptGetHashParam,
            Source: aEdlObiYav.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: Binary string: c:\Users\User\Desktop\2003\modeless\Release\modeless.pdb source: aEdlObiYav.exe
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043A377 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043AE3F lstrlenA,FindFirstFileA,FindClose,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043A377 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043AE3F lstrlenA,FindFirstFileA,FindClose,
            Source: global trafficTCP traffic: 192.168.2.5:49717 -> 209.141.41.136:8080
            Source: global trafficTCP traffic: 192.168.2.5:49726 -> 104.236.246.93:8080
            Source: global trafficTCP traffic: 192.168.2.5:49727 -> 198.199.114.69:8080
            Source: global trafficTCP traffic: 192.168.2.5:49730 -> 152.89.236.214:8080
            Source: global trafficTCP traffic: 192.168.2.5:49731 -> 87.106.136.232:8080
            Source: global trafficTCP traffic: 192.168.2.5:49732 -> 178.210.51.222:8080
            Source: Joe Sandbox ViewIP Address: 104.236.246.93 104.236.246.93
            Source: Joe Sandbox ViewIP Address: 104.236.246.93 104.236.246.93
            Source: Joe Sandbox ViewIP Address: 87.106.136.232 87.106.136.232
            Source: unknownTCP traffic detected without corresponding DNS query: 45.33.54.74
            Source: unknownTCP traffic detected without corresponding DNS query: 45.33.54.74
            Source: unknownTCP traffic detected without corresponding DNS query: 45.33.54.74
            Source: unknownTCP traffic detected without corresponding DNS query: 209.141.41.136
            Source: unknownTCP traffic detected without corresponding DNS query: 209.141.41.136
            Source: unknownTCP traffic detected without corresponding DNS query: 209.141.41.136
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
            Source: unknownTCP traffic detected without corresponding DNS query: 198.199.114.69
            Source: unknownTCP traffic detected without corresponding DNS query: 198.199.114.69
            Source: unknownTCP traffic detected without corresponding DNS query: 198.199.114.69
            Source: unknownTCP traffic detected without corresponding DNS query: 152.89.236.214
            Source: unknownTCP traffic detected without corresponding DNS query: 152.89.236.214
            Source: unknownTCP traffic detected without corresponding DNS query: 152.89.236.214
            Source: unknownTCP traffic detected without corresponding DNS query: 87.106.136.232
            Source: unknownTCP traffic detected without corresponding DNS query: 87.106.136.232
            Source: unknownTCP traffic detected without corresponding DNS query: 87.106.136.232
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1383 InternetReadFile,
            Source: picturerus.exe, 00000004.00000002.487408684.0000000000199000.00000004.00000001.sdmpString found in binary or memory: http://178.210.51.222/attrib/glitch/add/merge/
            Source: svchost.exe, 00000005.00000002.490559739.000001F634A0F000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: svchost.exe, 00000005.00000002.490559739.000001F634A0F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: svchost.exe, 00000005.00000002.487921047.000001F62F2A0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: svchost.exe, 00000005.00000002.491346023.000001F634C00000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
            Source: svchost.exe, 00000009.00000002.305301146.0000023F57C13000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
            Source: svchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
            Source: svchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
            Source: svchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
            Source: svchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
            Source: svchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
            Source: svchost.exe, 00000009.00000003.305003343.0000023F57C5A000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
            Source: svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
            Source: svchost.exe, 00000009.00000002.305345104.0000023F57C4E000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
            Source: svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
            Source: svchost.exe, 00000009.00000002.305323775.0000023F57C42000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
            Source: svchost.exe, 00000009.00000002.305323775.0000023F57C42000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
            Source: svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
            Source: svchost.exe, 00000009.00000003.305003343.0000023F57C5A000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000009.00000002.305368398.0000023F57C64000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
            Source: svchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
            Source: svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000009.00000003.283224217.0000023F57C31000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
            Source: svchost.exe, 00000009.00000002.305301146.0000023F57C13000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000009.00000003.305027218.0000023F57C45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000009.00000003.305027218.0000023F57C45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000009.00000003.283224217.0000023F57C31000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
            Source: svchost.exe, 00000009.00000003.305042012.0000023F57C3A000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
            Source: svchost.exe, 00000009.00000002.305345104.0000023F57C4E000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043814C GetKeyState,GetKeyState,GetKeyState,GetKeyState,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0044C334 GetKeyState,GetKeyState,GetKeyState,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004450BA ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0042F3FF __EH_prolog,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00449796 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00433B4D GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043814C GetKeyState,GetKeyState,GetKeyState,GetKeyState,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0044C334 GetKeyState,GetKeyState,GetKeyState,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004450BA ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0042F3FF __EH_prolog,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00449796 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00433B4D GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

            E-Banking Fraud:

            barindex
            Detected Emotet e-Banking trojanShow sources
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219C11B
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00EDC11B
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.aEdlObiYav.exe.22c053f.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.picturerus.exe.e1053f.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.picturerus.exe.60053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.aEdlObiYav.exe.218053f.1.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1F75 CryptAcquireContextW,CryptDecodeObjectEx,CryptImportKey,LocalFree,CryptReleaseContext,

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 0.2.aEdlObiYav.exe.22c053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 3.2.picturerus.exe.e1053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 4.2.picturerus.exe.60053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 1.2.aEdlObiYav.exe.218053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219C2E7 GetModuleFileNameW,lstrlenW,OpenServiceW,DeleteService,CloseServiceHandle,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191D2B CreateProcessAsUserW,CreateProcessW,
            Source: C:\Windows\SysWOW64\picturerus.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile deleted: C:\Windows\SysWOW64\picturerus.exe:Zone.IdentifierJump to behavior
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0041CB04
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004351C1
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00419288
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0041CB04
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004351C1
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00419288
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021828C1
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021830E8
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021830E4
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021937A9
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021937A5
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02192F82
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E130E4
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E130E8
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E128C1
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E237A5
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E237A9
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E22F82
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_006030E4
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_006030E8
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_006028C1
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED37A9
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED37A5
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED2F82
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 00401AB4 appears 46 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 004373E9 appears 31 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0041C3B9 appears 57 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 004334D7 appears 64 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0044D589 appears 86 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 00419937 appears 8618 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0044FB2C appears 32 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 00419918 appears 483 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0041923C appears 130 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0041E3BF appears 79 times
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: String function: 0044D5AF appears 37 times
            Source: aEdlObiYav.exe, 00000000.00000002.221382669.0000000002280000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs aEdlObiYav.exe
            Source: aEdlObiYav.exe, 00000001.00000002.242092910.00000000029F0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs aEdlObiYav.exe
            Source: aEdlObiYav.exe, 00000001.00000002.242092910.00000000029F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs aEdlObiYav.exe
            Source: aEdlObiYav.exe, 00000001.00000002.241858641.0000000002900000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs aEdlObiYav.exe
            Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
            Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
            Source: aEdlObiYav.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 0.2.aEdlObiYav.exe.22c053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 0.2.aEdlObiYav.exe.22c053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 3.2.picturerus.exe.e1053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 3.2.picturerus.exe.e1053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 4.2.picturerus.exe.60053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 4.2.picturerus.exe.60053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 1.2.aEdlObiYav.exe.218053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 1.2.aEdlObiYav.exe.218053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@15/5@0/8
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043F939 __EH_prolog,GetDiskFreeSpaceA,GetFullPathNameA,GetTempFileNameA,GetFileTime,SetFileTime,GetFileSecurityA,GetFileSecurityA,GetFileSecurityA,SetFileSecurityA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191943 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00416DE7 __EH_prolog,VariantClear,SysAllocStringByteLen,CoCreateInstance,CoCreateInstance,CoCreateInstance,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004315F6 __EH_prolog,FindResourceA,LoadResource,LockResource,GetDesktopWindow,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,FreeResource,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219C3B7 OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: C:\Users\user\Desktop\aEdlObiYav.exeMutant created: \Sessions\1\BaseNamedObjects\Global\M765E845E
            Source: C:\Users\user\Desktop\aEdlObiYav.exeMutant created: \Sessions\1\BaseNamedObjects\Global\I765E845E
            Source: C:\Windows\SysWOW64\picturerus.exeMutant created: \BaseNamedObjects\Global\I765E845E
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3896:120:WilError_01
            Source: aEdlObiYav.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\aEdlObiYav.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: aEdlObiYav.exeReversingLabs: Detection: 96%
            Source: C:\Windows\SysWOW64\picturerus.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcess
            Source: unknownProcess created: C:\Users\user\Desktop\aEdlObiYav.exe 'C:\Users\user\Desktop\aEdlObiYav.exe'
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess created: C:\Users\user\Desktop\aEdlObiYav.exe --79fd8b32
            Source: unknownProcess created: C:\Windows\SysWOW64\picturerus.exe C:\Windows\SysWOW64\picturerus.exe
            Source: C:\Windows\SysWOW64\picturerus.exeProcess created: C:\Windows\SysWOW64\picturerus.exe --b743c2a4
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
            Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess created: C:\Users\user\Desktop\aEdlObiYav.exe --79fd8b32
            Source: C:\Windows\SysWOW64\picturerus.exeProcess created: C:\Windows\SysWOW64\picturerus.exe --b743c2a4
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
            Source: C:\Users\user\Desktop\aEdlObiYav.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: aEdlObiYav.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: c:\Users\User\Desktop\2003\modeless\Release\modeless.pdb source: aEdlObiYav.exe
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00432655 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,
            Source: aEdlObiYav.exeStatic PE information: real checksum: 0x7ffed should be: 0x800e5
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00419277 push ecx; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004193A0 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004193A0 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00419918 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00419277 push ecx; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004193A0 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004193A0 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00419918 push eax; ret
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0218E190 push BB276B01h; ret
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E1E190 push BB276B01h; ret
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_0060E190 push BB276B01h; ret

            Persistence and Installation Behavior:

            barindex
            Drops executables to the windows directory (C:\Windows) and starts themShow sources
            Source: C:\Windows\SysWOW64\picturerus.exeExecutable created and started: C:\Windows\SysWOW64\picturerus.exe
            Source: C:\Users\user\Desktop\aEdlObiYav.exePE file moved: C:\Windows\SysWOW64\picturerus.exeJump to behavior
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0219C3B7 OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile opened: C:\Windows\SysWOW64\picturerus.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004121E0 IsIconic,SetFileSecurityW,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043ED39 GetParent,GetParent,IsIconic,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00412F6C IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004415C2 __EH_prolog,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00449839 IsWindowVisible,IsIconic,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004121E0 IsIconic,SetFileSecurityW,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043ED39 GetParent,GetParent,IsIconic,GetParent,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00412F6C IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004415C2 __EH_prolog,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00449839 IsWindowVisible,IsIconic,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\aEdlObiYav.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Found evasive API chain (may stop execution after checking mutex)Show sources
            Source: C:\Windows\SysWOW64\picturerus.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,GetTickCount,OpenServiceW,QueryServiceConfig2W,GetLastError,QueryServiceConfig2W,CloseServiceHandle,
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,GetTickCount,OpenServiceW,QueryServiceConfig2W,GetLastError,QueryServiceConfig2W,CloseServiceHandle,
            Source: C:\Windows\SysWOW64\picturerus.exeAPI coverage: 9.5 %
            Source: C:\Windows\System32\svchost.exe TID: 6064Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\aEdlObiYav.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043A377 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0043AE3F lstrlenA,FindFirstFileA,FindClose,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043A377 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0043AE3F lstrlenA,FindFirstFileA,FindClose,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00419156 VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,
            Source: svchost.exe, 00000007.00000002.488571936.000001D9AD460000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: svchost.exe, 00000005.00000002.490947713.000001F634A62000.00000004.00000001.sdmpBinary or memory string: (@Hyper-V RAW
            Source: svchost.exe, 00000005.00000002.490862849.000001F634A4C000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
            Source: svchost.exe, 00000007.00000002.488571936.000001D9AD460000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: svchost.exe, 00000007.00000002.488571936.000001D9AD460000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: svchost.exe, 00000005.00000002.487748266.000001F62F229000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW`C
            Source: svchost.exe, 00000007.00000002.488350000.000001D9ACE64000.00000004.00000001.sdmp, svchost.exe, 00000008.00000002.487724636.00000157C782A000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: svchost.exe, 00000007.00000002.488571936.000001D9AD460000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\SysWOW64\picturerus.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\picturerus.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\picturerus.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\picturerus.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00432655 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00401B93 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00401BA2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00401B93 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00401BA2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02180467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02180C0C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02181743 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021912CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_02191E04 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E10467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E10C0C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E11743 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E212CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 3_2_00E21E04 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00600467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00600C0C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00601743 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED12CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\picturerus.exeCode function: 4_2_00ED1E04 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_021914F2 GetProcessHeap,RtlAllocateHeap,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00420406 SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0042041A SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00420406 SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0042041A SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_0218C477 cpuid
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,_strncpy,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,_strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,_TranslateName,_TranslateName,IsValidCodePage,IsValidLocale,_strcat,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,_strncpy,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,_strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,_TranslateName,_TranslateName,IsValidCodePage,IsValidLocale,_strcat,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\picturerus.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00420151 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004231DB __lock,_strlen,_strcat,_strncpy,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,_strncpy,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_0044A5CB GetVersion,GetVersion,GetVersion,GetVersion,GetVersion,RegisterWindowMessageA,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Lowering of HIPS / PFW / Operating System Security Settings:

            barindex
            Changes security center settings (notifications, updates, antivirus, firewall)Show sources
            Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
            Source: aEdlObiYav.exe, 00000000.00000002.221218933.00000000004B0000.00000004.00000020.sdmpBinary or memory string: Kav.exe
            Source: svchost.exe, 0000000B.00000002.487696660.0000020979C3D000.00000004.00000001.sdmpBinary or memory string: @V%ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: svchost.exe, 0000000B.00000002.487727705.0000020979D02000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.aEdlObiYav.exe.22c053f.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.picturerus.exe.e1053f.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.aEdlObiYav.exe.218053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.picturerus.exe.e1053f.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.aEdlObiYav.exe.22c053f.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.picturerus.exe.60053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.picturerus.exe.60053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.aEdlObiYav.exe.218053f.1.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_004514EB CreateBindCtx,lstrlenW,lstrlenA,CoTaskMemFree,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 0_2_00451B05 lstrlenA,lstrlenW,lstrlenW,lstrlenW,CoTaskMemAlloc,CoTaskMemFree,CreateBindCtx,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_004514EB CreateBindCtx,lstrlenW,lstrlenA,CoTaskMemFree,
            Source: C:\Users\user\Desktop\aEdlObiYav.exeCode function: 1_2_00451B05 lstrlenA,lstrlenW,lstrlenW,lstrlenW,CoTaskMemAlloc,CoTaskMemFree,CreateBindCtx,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1Windows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
            Default AccountsNative API111Valid Accounts1Valid Accounts1Deobfuscate/Decode Files or Information1LSASS MemorySystem Service Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel22Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsCommand and Scripting Interpreter2Windows Service12Access Token Manipulation1Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsService Execution12Logon Script (Mac)Windows Service12Software Packing1NTDSSystem Information Discovery47Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptProcess Injection1DLL Side-Loading1LSA SecretsSecurity Software Discovery51SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonFile Deletion1Cached Domain CredentialsVirtualization/Sandbox Evasion3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading121DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobValid Accounts1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Virtualization/Sandbox Evasion3Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronProcess Injection1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
            Compromise Software Supply ChainUnix ShellLaunchdLaunchdHidden Files and Directories1KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            aEdlObiYav.exe96%ReversingLabsWin32.Trojan.Emotet
            aEdlObiYav.exe100%AviraHEUR/AGEN.1111753
            aEdlObiYav.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.aEdlObiYav.exe.22c053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
            3.2.picturerus.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            0.2.aEdlObiYav.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            3.2.picturerus.exe.e1053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
            0.0.aEdlObiYav.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            1.2.aEdlObiYav.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            4.2.picturerus.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            3.0.picturerus.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            1.0.aEdlObiYav.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File
            4.2.picturerus.exe.60053f.1.unpack100%AviraTR/Patched.Ren.GenDownload File
            1.2.aEdlObiYav.exe.218053f.1.unpack100%AviraTR/Patched.Ren.GenDownload File
            4.0.picturerus.exe.400000.0.unpack100%AviraHEUR/AGEN.1111753Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://%s.xboxlive.com0%URL Reputationsafe
            https://%s.xboxlive.com0%URL Reputationsafe
            https://%s.xboxlive.com0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            http://178.210.51.222/attrib/glitch/add/merge/0%Avira URL Cloudsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
              high
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000009.00000003.305027218.0000023F57C45000.00000004.00000001.sdmpfalse
                high
                https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpfalse
                  high
                  https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                    high
                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpfalse
                      high
                      https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000009.00000002.305345104.0000023F57C4E000.00000004.00000001.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000009.00000003.305027218.0000023F57C45000.00000004.00000001.sdmpfalse
                            high
                            https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                              high
                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpfalse
                                high
                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000009.00000002.305301146.0000023F57C13000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpfalse
                                  high
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000009.00000002.305323775.0000023F57C42000.00000004.00000001.sdmpfalse
                                    high
                                    https://%s.xboxlive.comsvchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    low
                                    https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000009.00000002.305345104.0000023F57C4E000.00000004.00000001.sdmpfalse
                                      high
                                      https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                        high
                                        https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000009.00000003.283224217.0000023F57C31000.00000004.00000001.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                            high
                                            https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                              high
                                              https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000009.00000003.305003343.0000023F57C5A000.00000004.00000001.sdmpfalse
                                                high
                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000009.00000003.283224217.0000023F57C31000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.svchost.exe, 00000005.00000002.491346023.000001F634C00000.00000002.00000001.sdmpfalse
                                                      high
                                                      https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000009.00000002.305323775.0000023F57C42000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://dynamic.tsvchost.exe, 00000009.00000002.305368398.0000023F57C64000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000009.00000003.305042012.0000023F57C3A000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://appexmapsappupdate.blob.core.windows.netsvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                                              high
                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000009.00000002.305351605.0000023F57C5C000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://178.210.51.222/attrib/glitch/add/merge/picturerus.exe, 00000004.00000002.487408684.0000000000199000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://activity.windows.comsvchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  http://www.bingmapsportal.comsvchost.exe, 00000009.00000002.305301146.0000023F57C13000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000009.00000003.304991002.0000023F57C5F000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000009.00000002.305319310.0000023F57C3D000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://%s.dnet.xboxlive.comsvchost.exe, 00000007.00000002.488280885.000001D9ACE3E000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        • URL Reputation: safe
                                                                        • URL Reputation: safe
                                                                        low
                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000009.00000003.305003343.0000023F57C5A000.00000004.00000001.sdmpfalse
                                                                          high

                                                                          Contacted IPs

                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs

                                                                          Public

                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          152.89.236.214
                                                                          unknownGermany
                                                                          31400ACCELERATED-ITDEfalse
                                                                          198.199.114.69
                                                                          unknownUnited States
                                                                          14061DIGITALOCEAN-ASNUSfalse
                                                                          104.236.246.93
                                                                          unknownUnited States
                                                                          14061DIGITALOCEAN-ASNUSfalse
                                                                          178.210.51.222
                                                                          unknownRussian Federation
                                                                          43727KVANT-TELECOMRUfalse
                                                                          45.33.54.74
                                                                          unknownUnited States
                                                                          63949LINODE-APLinodeLLCUSfalse
                                                                          209.141.41.136
                                                                          unknownUnited States
                                                                          53667PONYNETUSfalse
                                                                          87.106.136.232
                                                                          unknownGermany
                                                                          8560ONEANDONE-ASBrauerstrasse48DEfalse

                                                                          Private

                                                                          IP
                                                                          127.0.0.1

                                                                          General Information

                                                                          Joe Sandbox Version:31.0.0 Emerald
                                                                          Analysis ID:376365
                                                                          Start date:26.03.2021
                                                                          Start time:12:14:01
                                                                          Joe Sandbox Product:CloudBasic
                                                                          Overall analysis duration:0h 9m 24s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:light
                                                                          Sample file name:aEdlObiYav (renamed file extension from none to exe)
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                          Number of analysed new started processes analysed:21
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • HDC enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Detection:MAL
                                                                          Classification:mal100.bank.troj.evad.winEXE@15/5@0/8
                                                                          EGA Information:
                                                                          • Successful, ratio: 50%
                                                                          HDC Information:
                                                                          • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                                                          • Quality average: 91.1%
                                                                          • Quality standard deviation: 6.5%
                                                                          HCA Information:
                                                                          • Successful, ratio: 100%
                                                                          • Number of executed functions: 0
                                                                          • Number of non-executed functions: 0
                                                                          Cookbook Comments:
                                                                          • Adjust boot time
                                                                          • Enable AMSI
                                                                          Warnings:
                                                                          Show All
                                                                          • Exclude process from analysis (whitelisted): taskhostw.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 20.82.210.154, 40.88.32.150, 13.64.90.137, 52.147.198.201, 13.88.21.125, 104.43.139.144, 95.100.54.203, 51.103.5.186, 20.50.102.62, 23.10.249.43, 23.10.249.26, 20.54.26.129
                                                                          • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/376365/sample/aEdlObiYav.exe

                                                                          Simulations

                                                                          Behavior and APIs

                                                                          TimeTypeDescription
                                                                          12:15:06API Interceptor2x Sleep call for process: svchost.exe modified
                                                                          12:16:21API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                          Joe Sandbox View / Context

                                                                          IPs

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          198.199.114.69VYHauUUCLr.exeGet hashmaliciousBrowse
                                                                          • 198.199.114.69:8080/badge/report/xian/
                                                                          http://infraturkey.com/deletecomment/parts_service/daaMnHeDzR/Get hashmaliciousBrowse
                                                                          • 198.199.114.69:8080/jit/
                                                                          https://newwell.studio/test/DOC/NtnDpOmWbTdPEdBxrLyy/Get hashmaliciousBrowse
                                                                          • 198.199.114.69:8080/json/
                                                                          104.236.246.93form.docGet hashmaliciousBrowse
                                                                          • 104.236.246.93:8080/hZhNeaDm/dcUDNcyqQW/niVKRU29uscA3Ju/
                                                                          UAr7Xz5JWr.exeGet hashmaliciousBrowse
                                                                          • 104.236.246.93:8080/ZxZomdMT6G9XK/ghoypfynUN/
                                                                          invoice #865119.docGet hashmaliciousBrowse
                                                                          • 104.236.246.93:8080/XzlcYaBSUK0cswU/pzKYcLCk/PbvwO3hXkaN7W/WM9ZNIP/
                                                                          XY8707573112TQ.docGet hashmaliciousBrowse
                                                                          • 104.236.246.93:8080/att30xZ/YONUKbuNJ8IOQjL/G34JI8e3LEFl/jaWgrB/
                                                                          test-emotet.exeGet hashmaliciousBrowse
                                                                          • 104.236.246.93/
                                                                          45.33.54.74FA_36802305641_Oct2019.docGet hashmaliciousBrowse
                                                                          • 45.33.54.74:443/loadan/stubs/
                                                                          87.106.136.232http://87.106.136.232Get hashmaliciousBrowse
                                                                          • 87.106.136.232/

                                                                          Domains

                                                                          No context

                                                                          ASN

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          ACCELERATED-ITDEZRz0Aq1Rf0.dllGet hashmaliciousBrowse
                                                                          • 185.245.99.134
                                                                          usbGet hashmaliciousBrowse
                                                                          • 45.133.9.100
                                                                          bin.exeGet hashmaliciousBrowse
                                                                          • 84.200.110.123
                                                                          run32dll.exeGet hashmaliciousBrowse
                                                                          • 45.154.35.214
                                                                          Vidoe001mp4.scr signed FAT11 d.o.exeGet hashmaliciousBrowse
                                                                          • 45.154.35.218
                                                                          OD29081792Y_COVID-19_SARS-CoV-2.docGet hashmaliciousBrowse
                                                                          • 185.245.99.2
                                                                          Fakt. - 19 okt., 2020.docGet hashmaliciousBrowse
                                                                          • 185.194.237.65
                                                                          liposnejk.exeGet hashmaliciousBrowse
                                                                          • 84.200.209.11
                                                                          jackpot_http.exeGet hashmaliciousBrowse
                                                                          • 213.190.30.57
                                                                          http://cumds.com/_vti_log/paclm/02d8rg/2jx860566807ll82z66y0b2bd/Get hashmaliciousBrowse
                                                                          • 84.200.5.215
                                                                          mb10.exeGet hashmaliciousBrowse
                                                                          • 185.245.99.134
                                                                          mb10.exeGet hashmaliciousBrowse
                                                                          • 185.245.99.134
                                                                          https://withered-butterfly-9cd3.tkbizulvc.workers.dev/Get hashmaliciousBrowse
                                                                          • 193.135.10.219
                                                                          5xcdJCRyWp.exeGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          emotet_11.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          emotet_11.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          emotet.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          emotet.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          RechnungRechnung.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          RechnungRechnung.docGet hashmaliciousBrowse
                                                                          • 82.211.30.202
                                                                          DIGITALOCEAN-ASNUSajESKcIz8f.exeGet hashmaliciousBrowse
                                                                          • 138.197.53.157
                                                                          Revised Signed Proforma Invoice 000856453553.exeGet hashmaliciousBrowse
                                                                          • 134.209.159.22
                                                                          rona.exeGet hashmaliciousBrowse
                                                                          • 104.248.117.19
                                                                          fDFkIEBfpm.exeGet hashmaliciousBrowse
                                                                          • 206.189.174.29
                                                                          JE74.vbsGet hashmaliciousBrowse
                                                                          • 104.248.193.149
                                                                          4d86320858effdc2c8bf3fc2ae86080f0f6b449141991.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          Rc93GKN1MJ.exeGet hashmaliciousBrowse
                                                                          • 138.197.161.207
                                                                          tBU1h89Elf.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          JbzAir8erB.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          5sH546K9WX.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          qcxuvc6i7S.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          4itHMydujq.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          LzYnwzj8zx.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          si8zqjtdqI.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          5aVrBcmCyl.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          8z5iVMz39r.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          fXNR9O8fGS.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          wdPI7Jq0EV.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          SHWUWeV5aB.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          XG8kPPiEda.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          DIGITALOCEAN-ASNUSajESKcIz8f.exeGet hashmaliciousBrowse
                                                                          • 138.197.53.157
                                                                          Revised Signed Proforma Invoice 000856453553.exeGet hashmaliciousBrowse
                                                                          • 134.209.159.22
                                                                          rona.exeGet hashmaliciousBrowse
                                                                          • 104.248.117.19
                                                                          fDFkIEBfpm.exeGet hashmaliciousBrowse
                                                                          • 206.189.174.29
                                                                          JE74.vbsGet hashmaliciousBrowse
                                                                          • 104.248.193.149
                                                                          4d86320858effdc2c8bf3fc2ae86080f0f6b449141991.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          Rc93GKN1MJ.exeGet hashmaliciousBrowse
                                                                          • 138.197.161.207
                                                                          tBU1h89Elf.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          JbzAir8erB.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          5sH546K9WX.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          qcxuvc6i7S.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          4itHMydujq.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          LzYnwzj8zx.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          si8zqjtdqI.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          5aVrBcmCyl.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          8z5iVMz39r.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          fXNR9O8fGS.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          wdPI7Jq0EV.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          SHWUWeV5aB.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248
                                                                          XG8kPPiEda.dllGet hashmaliciousBrowse
                                                                          • 167.172.240.248

                                                                          JA3 Fingerprints

                                                                          No context

                                                                          Dropped Files

                                                                          No context

                                                                          Created / dropped Files

                                                                          C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                          Process:C:\Windows\System32\svchost.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):4096
                                                                          Entropy (8bit):0.597889115294713
                                                                          Encrypted:false
                                                                          SSDEEP:6:bVk1GaD0JOCEfMuaaD0JOCEfMKQmDF1Al/gz2cE0fMbhEZolrRSQ2hyYIIT:bCGaD0JcaaD0JwQQF1Ag/0bjSQJ
                                                                          MD5:4E33D805E2A479CEE4D175EDBAE59C11
                                                                          SHA1:1EAA684AA38277FA15E860035EB1BDEBCE587FAE
                                                                          SHA-256:C9040CEDCAA9BC5392C8A43422B685431F804EF7E2669F45A546DAFEE0512988
                                                                          SHA-512:D74D01C1C48F02E7E75DD5BFA2BA0849912165C532A8D62D47BD8D5E2DBC5CD9AD391DB420CDDCA382EB10CC55B0905E164A1739B2C89161DF89A748102308C7
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: ....E..h..(..........yY.............. ..1C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@........................yY...........&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G............................................................................................................................................................................................................
                                                                          C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                          Process:C:\Windows\System32\svchost.exe
                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x04dffe7c, page size 16384, DirtyShutdown, Windows version 10.0
                                                                          Category:dropped
                                                                          Size (bytes):32768
                                                                          Entropy (8bit):0.09636108144020473
                                                                          Encrypted:false
                                                                          SSDEEP:6:sEsAzwl/+KRIE11Y8TRXrrFlKGEsAzwl/+KRIE11Y8TRXrrFlK:sFA0+KO4blrrFlKGFA0+KO4blrrFlK
                                                                          MD5:CC2B342ACF2A0814B5BCAE5A58DBD2FC
                                                                          SHA1:C44E20AB2EA24C9EA9A4C381B6E01B832946E984
                                                                          SHA-256:F709D7EA01C60FA0756B3E170EC7FCE60EFD88499230B57C9064D38FC77C63A2
                                                                          SHA-512:AA06D2E349B13ADD0C70ADBE8268B0C03B39EC1AA4BDAD6E8CFD1A25F9CB898C9ED653364A1DA03814D8769D111E0DB33DDDFD38E172BD661537642363CD5FE2
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: ...|... ................e.f.3...w........................&..........w.......yY.h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w.........................................................................................................................................................................................................................................Z.....yY....................b.....yY.........................................................................................................................................................................................................................................................................................................................................................................................
                                                                          C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                          Process:C:\Windows\System32\svchost.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):8192
                                                                          Entropy (8bit):0.11086134938174995
                                                                          Encrypted:false
                                                                          SSDEEP:3:DnSLEvjUOMjSXl/bJdAtixx/CYll:OyPMj8t4O/
                                                                          MD5:F88FE82FEE638B48780BE86DCD42F59B
                                                                          SHA1:68CEFD6EF8B846506CCBD4615FF9BBE46281EA49
                                                                          SHA-256:3C0871C0DD8B3D2A331A974F01A144C665E3476291AB203118C257FEFBB3483D
                                                                          SHA-512:9105C803F7A75AFC6D3502A7BC89B9719A32AAB46909C010B3ACA2D408E29E534138946B62DD0EF0DD99EFD8306AE0BED2DFEA4964C5EBFE776098B98A6E1BE5
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: .......................................3...w.......yY......w...............w.......w....:O.....w.....................b.....yY.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                                                          Process:C:\Windows\System32\svchost.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):55
                                                                          Entropy (8bit):4.306461250274409
                                                                          Encrypted:false
                                                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                          C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                          Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):906
                                                                          Entropy (8bit):3.132534585600141
                                                                          Encrypted:false
                                                                          SSDEEP:12:58KRBubdpkoF1AG3rYyGljok9+MlWlLehB4yAq7ejCZyGljB:OaqdmuF3roljL+kWReH4yJ7MAljB
                                                                          MD5:565473E4D9B99CA298056458A32F5C4A
                                                                          SHA1:41B263FB8EF34508A270C1131E851F03AA21152C
                                                                          SHA-256:AB279EB907E7309130B86D1709ACA6F349EEDD5AC22FA34388685A2EAC32FDB2
                                                                          SHA-512:FC96109E8D6901953C225F7483A935CAF1068F4DD2A10CD8F645FFD84A0C74374D0124F09723001883DFAA86631F56D770301BC043A38515F880C64F3CC09839
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: ........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. M.a.r. .. 2.6. .. 2.0.2.1. .1.2.:.1.6.:.2.1.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. F.r.i. .. M.a.r. .. 2.6. .. 2.0.2.1. .1.2.:.1.6.:.2.1.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....

                                                                          Static File Info

                                                                          General

                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.625638741868008
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:aEdlObiYav.exe
                                                                          File size:516346
                                                                          MD5:ae03a6f8fb74d401b403647d28e21574
                                                                          SHA1:6ee320cedc77499f5df9ae9c93ef42c0d91f3ce8
                                                                          SHA256:1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d
                                                                          SHA512:ab2a30d32722419c72808032ae01b9443bfb8ea80ec52426aeb42ac21a84f0a2b04dd6f311c13b06bcaa37b7874b4e311ff8dc0c94ccfa42cbf6dcac0e2facab
                                                                          SSDEEP:6144:PebeJq15KNVIjux9tE9dVyAhwoajYPNo4ahRFPhpxOtYS0xefNPf+R6axxVccVPo:W5KNgux9t0VyAShUPCRdUi8cVRPw17i
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*1..Db..Db..Dbd..b..Db..]b..Db...b..Db..Kb..Db...ba.Db..cb..Dbd..b..Db..Eb..Db..$b..Db...b..Db...b..Db...b..DbRich..Db.......

                                                                          File Icon

                                                                          Icon Hash:00828e8e8686b000

                                                                          Static PE Info

                                                                          General

                                                                          Entrypoint:0x419b95
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                          DLL Characteristics:
                                                                          Time Stamp:0x5D9A0326 [Sun Oct 6 15:07:18 2019 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:92bdfd5dfdc574760c27f87d6f10fe98

                                                                          Entrypoint Preview

                                                                          Instruction
                                                                          push 00000060h
                                                                          push 0045C7A8h
                                                                          call 00007FD794FDE160h
                                                                          mov edi, 00000094h
                                                                          mov eax, edi
                                                                          call 00007FD794FDE2B8h
                                                                          mov dword ptr [ebp-18h], esp
                                                                          mov esi, esp
                                                                          mov dword ptr [esi], edi
                                                                          push esi
                                                                          call dword ptr [004552A0h]
                                                                          mov ecx, dword ptr [esi+10h]
                                                                          mov dword ptr [0047B960h], ecx
                                                                          mov eax, dword ptr [esi+04h]
                                                                          mov dword ptr [0047B96Ch], eax
                                                                          mov edx, dword ptr [esi+08h]
                                                                          mov dword ptr [0047B970h], edx
                                                                          mov esi, dword ptr [esi+0Ch]
                                                                          and esi, 00007FFFh
                                                                          mov dword ptr [0047B964h], esi
                                                                          cmp ecx, 02h
                                                                          je 00007FD794FDEACEh
                                                                          or esi, 00008000h
                                                                          mov dword ptr [0047B964h], esi
                                                                          shl eax, 08h
                                                                          add eax, edx
                                                                          mov dword ptr [0047B968h], eax
                                                                          xor esi, esi
                                                                          push esi
                                                                          mov edi, dword ptr [00455320h]
                                                                          call edi
                                                                          cmp word ptr [eax], 5A4Dh
                                                                          jne 00007FD794FDEAE1h
                                                                          mov ecx, dword ptr [eax+3Ch]
                                                                          add ecx, eax
                                                                          cmp dword ptr [ecx], 00004550h
                                                                          jne 00007FD794FDEAD4h
                                                                          movzx eax, word ptr [ecx+18h]
                                                                          cmp eax, 0000010Bh
                                                                          je 00007FD794FDEAE1h
                                                                          cmp eax, 0000020Bh
                                                                          je 00007FD794FDEAC7h
                                                                          mov dword ptr [ebp-1Ch], esi
                                                                          jmp 00007FD794FDEAE9h
                                                                          cmp dword ptr [ecx+00000084h], 0Eh
                                                                          jbe 00007FD794FDEAB4h
                                                                          xor eax, eax
                                                                          cmp dword ptr [ecx+000000F8h], esi
                                                                          jmp 00007FD794FDEAD0h
                                                                          cmp dword ptr [ecx+74h], 0Eh
                                                                          jbe 00007FD794FDEAA4h
                                                                          xor eax, eax
                                                                          cmp dword ptr [ecx+000000E8h], esi
                                                                          setne al
                                                                          mov dword ptr [ebp-1Ch], eax

                                                                          Rich Headers

                                                                          Programming Language:
                                                                          • [ASM] VS2003 (.NET) build 3077
                                                                          • [LNK] VS2003 (.NET) build 3077
                                                                          • [RES] VS2003 (.NET) build 3077
                                                                          • [EXP] VS2003 (.NET) build 3077
                                                                          • [C++] VS2003 (.NET) build 3077
                                                                          • [ C ] VS2003 (.NET) build 3077

                                                                          Data Directories

                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x68cf00x53.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x662240x104.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7e0000x3ebc.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x558800x1c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x60ed00x48.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x550000x878.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x661740x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                          Sections

                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x53ee90x54000False0.505048479353DOS executable (COM)6.50788658927IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x550000x13d430x14000False0.315026855469data5.20395932053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0x690000x142340x11000False0.795568129596data7.54511629913IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x7e0000x3ebc0x4000False0.259643554688data3.45842321085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                          Resources

                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_CURSOR0x7eb680x134dataEnglishUnited States
                                                                          RT_CURSOR0x7ec9c0xb4dataEnglishUnited States
                                                                          RT_CURSOR0x7ed500x134AmigaOS bitmap fontEnglishUnited States
                                                                          RT_CURSOR0x7ee840x134dataEnglishUnited States
                                                                          RT_CURSOR0x7efb80x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f0ec0x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f2200x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f3540x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f4880x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f5bc0x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f6f00x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f8240x134dataEnglishUnited States
                                                                          RT_CURSOR0x7f9580x134AmigaOS bitmap fontEnglishUnited States
                                                                          RT_CURSOR0x7fa8c0x134dataEnglishUnited States
                                                                          RT_CURSOR0x7fbc00x134dataEnglishUnited States
                                                                          RT_CURSOR0x7fcf40x134dataEnglishUnited States
                                                                          RT_BITMAP0x7fe280xb8dataEnglishUnited States
                                                                          RT_BITMAP0x7fee00x144dataEnglishUnited States
                                                                          RT_DIALOG0x800240x184dataEnglishUnited States
                                                                          RT_DIALOG0x801a80xf4dataEnglishUnited States
                                                                          RT_DIALOG0x8029c0x100dataEnglishUnited States
                                                                          RT_DIALOG0x8039c0xe8dataEnglishUnited States
                                                                          RT_STRING0x804840x44dataEnglishUnited States
                                                                          RT_STRING0x804c80x48dataEnglishUnited States
                                                                          RT_STRING0x805100x2cdataEnglishUnited States
                                                                          RT_STRING0x8053c0x38dataEnglishUnited States
                                                                          RT_STRING0x805740x48dataEnglishUnited States
                                                                          RT_STRING0x805bc0x64dataEnglishUnited States
                                                                          RT_STRING0x806200x46dataEnglishUnited States
                                                                          RT_STRING0x806680x82dataEnglishUnited States
                                                                          RT_STRING0x806ec0x2adataEnglishUnited States
                                                                          RT_STRING0x807180x192dataEnglishUnited States
                                                                          RT_STRING0x808ac0x4e2dataEnglishUnited States
                                                                          RT_STRING0x80d900x31adataEnglishUnited States
                                                                          RT_STRING0x810ac0x2dcdataEnglishUnited States
                                                                          RT_STRING0x813880x8adataEnglishUnited States
                                                                          RT_STRING0x814140xacdataEnglishUnited States
                                                                          RT_STRING0x814c00xdedataEnglishUnited States
                                                                          RT_STRING0x815a00x4c4dataEnglishUnited States
                                                                          RT_STRING0x81a640x264dataEnglishUnited States
                                                                          RT_STRING0x81cc80x2cdataEnglishUnited States
                                                                          RT_STRING0x81cf40x42dataEnglishUnited States
                                                                          RT_STRING0x81d380x48dataEnglishUnited States
                                                                          RT_GROUP_CURSOR0x81d800x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81da40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81db80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81dcc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81de00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81df40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e1c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81e940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                          RT_GROUP_CURSOR0x81ea80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States

                                                                          Imports

                                                                          DLLImport
                                                                          CRYPT32.dllCertOpenStore
                                                                          KERNEL32.dllGetStartupInfoA, GetCommandLineA, ExitProcess, HeapReAlloc, TerminateProcess, ExitThread, CreateThread, HeapSize, FatalAppExitA, HeapDestroy, HeapCreate, VirtualFree, IsBadWritePtr, GetStdHandle, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetUnhandledExceptionFilter, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetTimeZoneInformation, IsBadReadPtr, IsBadCodePtr, GetTimeFormatA, GetDateFormatA, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, IsValidCodePage, SetConsoleCtrlHandler, RtlUnwind, GetLocaleInfoW, SetEnvironmentVariableA, InterlockedExchange, GetACP, GetLocaleInfoA, GetThreadLocale, GetVersionExA, MultiByteToWideChar, WideCharToMultiByte, GetLastError, GetVersion, lstrcmpiA, lstrlenW, lstrcmpiW, lstrlenA, CompareStringA, CompareStringW, GetEnvironmentVariableA, GetEnvironmentVariableW, GetStringTypeExA, GetStringTypeExW, SizeofResource, LockResource, LoadResource, FindResourceA, FreeResource, GlobalFree, GlobalUnlock, GlobalLock, LocalFree, lstrcpynA, FormatMessageA, GlobalAlloc, GlobalSize, MulDiv, CopyFileA, SetLastError, GetProcAddress, GetModuleHandleA, lstrcmpW, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, HeapFree, HeapAlloc, GetDiskFreeSpaceA, GetTempFileNameA, LocalLock, LocalUnlock, GetFileTime, GetFileAttributesA, SetFileAttributesA, SetFileTime, LocalFileTimeToFileTime, FileTimeToLocalFileTime, SetErrorMode, GetShortPathNameA, CreateFileA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, DeleteFileA, MoveFileA, GetCurrentDirectoryA, GetPrivateProfileStringA, WritePrivateProfileStringA, GetPrivateProfileIntA, SystemTimeToFileTime, FileTimeToSystemTime, GetOEMCP, GetCPInfo, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, TlsGetValue, EnterCriticalSection, GlobalHandle, GlobalReAlloc, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalFlags, DeleteCriticalSection, InitializeCriticalSection, RaiseException, CreateEventA, SuspendThread, SetEvent, WaitForSingleObject, ResumeThread, SetThreadPriority, CloseHandle, GetCurrentThread, lstrcmpA, GetModuleFileNameA, lstrcatA, ConvertDefaultLocale, EnumResourceLanguagesA, lstrcpyA, InterlockedDecrement, GetCurrentThreadId, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, LoadLibraryA, FreeLibrary, SetStdHandle
                                                                          USER32.dllIsClipboardFormatAvailable, MessageBeep, GetTabbedTextExtentA, GetDCEx, LockWindowUpdate, SetParent, InvalidateRect, InsertMenuItemA, CreatePopupMenu, SetRectEmpty, BringWindowToTop, SetMenu, TranslateAcceleratorA, DestroyIcon, DeleteMenu, wsprintfA, WaitMessage, GetWindowThreadProcessId, ReleaseCapture, WindowFromPoint, SetCapture, LoadCursorA, GetSysColorBrush, GetDialogBaseUnits, GetMessageA, TranslateMessage, GetCursorPos, ValidateRect, ShowOwnedPopups, SetCursor, PostQuitMessage, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, FillRect, DestroyMenu, GetMenuItemInfoA, InflateRect, SetMenuItemBitmaps, ModifyMenuA, EnableMenuItem, CheckMenuItem, GetMenuCheckMarkDimensions, LoadBitmapA, ScrollWindowEx, ShowWindow, MoveWindow, SetWindowTextA, IsDialogMessageA, IsDlgButtonChecked, SetDlgItemInt, GetDlgItemTextA, GetDlgItemInt, CheckRadioButton, CheckDlgButton, RegisterWindowMessageA, WinHelpA, GetCapture, CreateWindowExA, SetWindowsHookExA, CallNextHookEx, KillTimer, GetClassInfoExA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SendDlgItemMessageA, GetFocus, SetFocus, IsChild, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetLastActivePopup, DispatchMessageA, BeginDeferWindowPos, EndDeferWindowPos, GetTopWindow, UnhookWindowsHookEx, GetMessageTime, GetMessagePos, PeekMessageA, MapWindowPoints, ScrollWindow, MessageBoxA, TrackPopupMenuEx, TrackPopupMenu, GetKeyState, SetScrollRange, SetDlgItemTextA, CharLowerA, CharLowerW, CharUpperA, CharUpperW, SendMessageA, EnableWindow, DrawIcon, AppendMenuA, GetSystemMenu, IsIconic, GetClientRect, SetActiveWindow, LoadIconA, GetScrollRange, SetScrollPos, GetScrollPos, SetForegroundWindow, ShowScrollBar, IsWindowVisible, UpdateWindow, GetMenu, PostMessageA, GetSysColor, AdjustWindowRectEx, ScreenToClient, EqualRect, DeferWindowPos, GetScrollInfo, SetScrollInfo, SetTimer, SetRect, UnionRect, IsRectEmpty, MapVirtualKeyA, GetClassInfoA, RegisterClassA, UnregisterClassA, SetWindowPlacement, GetDlgCtrlID, DefWindowProcA, SetWindowLongA, SetWindowPos, OffsetRect, IntersectRect, SystemParametersInfoA, GetWindowPlacement, GetKeyNameTextA, LoadMenuA, UnpackDDElParam, ReuseDDElParam, GetClassLongA, LoadAcceleratorsA, CallWindowProcA, LoadStringW, GetSystemMetrics, EndDialog, GetNextDlgTabItem, GetParent, IsWindowEnabled, GetDlgItem, GetWindowLongA, IsWindow, DestroyWindow, CreateDialogIndirectParamA, GetActiveWindow, GetDesktopWindow, RemoveMenu, GetSubMenu, GetMenuItemCount, InsertMenuA, GetWindowRect, CopyRect, PtInRect, GetWindow, GetMenuState, GetMenuStringA, GetMenuItemID
                                                                          GDI32.dllSetMapperFlags, SetArcDirection, SetColorAdjustment, DeleteObject, SelectClipRgn, GetClipRgn, CreateRectRgn, SelectClipPath, GetViewportExtEx, GetWindowExtEx, GetPixel, StartDocA, PtVisible, RectVisible, TextOutA, Escape, SelectObject, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, OffsetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetCurrentPositionEx, ArcTo, PolyDraw, PolylineTo, PolyBezierTo, SetTextCharacterExtra, DeleteDC, CreateDIBPatternBrushPt, CreatePatternBrush, GetStockObject, SelectPalette, PlayMetaFileRecord, GetObjectType, EnumMetaFile, PlayMetaFile, CreatePen, ExtCreatePen, CreateSolidBrush, CreateHatchBrush, GetTextMetricsA, CreateRectRgnIndirect, SetRectRgn, CombineRgn, GetMapMode, PatBlt, DPtoLP, CreateCompatibleBitmap, StretchDIBits, GetCharWidthA, CreateFontA, GetBkColor, StartPage, EndPage, SetAbortProc, AbortDoc, EndDoc, SetTextJustification, SetTextAlign, MoveToEx, LineTo, OffsetClipRgn, IntersectClipRect, ExcludeClipRect, SetMapMode, SetStretchBltMode, SetROP2, SetPolyFillMode, SetBkMode, RestoreDC, SaveDC, GetTextExtentPoint32A, ExtTextOutA, BitBlt, CreateCompatibleDC, CreateFontIndirectA, CreateBitmap, GetObjectA, SetBkColor, SetTextColor, GetClipBox, GetDCOrgEx, CreateDCA, CopyMetaFileA, ExtSelectClipRgn, GetDeviceCaps
                                                                          comdlg32.dllPageSetupDlgA, FindTextA, ReplaceTextA, GetOpenFileNameA, CommDlgExtendedError, PrintDlgA, GetFileTitleA, GetSaveFileNameA
                                                                          WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter, GetJobA
                                                                          ADVAPI32.dllGetFileSecurityA, RegCloseKey, RegSetValueA, RegOpenKeyA, RegQueryValueExA, RegOpenKeyExA, RegDeleteKeyA, RegEnumKeyA, RegQueryValueA, RegCreateKeyExA, RegSetValueExA, RegDeleteValueA, RegCreateKeyA, SetFileSecurityW, SetFileSecurityA
                                                                          SHELL32.dllSHGetFileInfoA, DragFinish, DragQueryFileA, ExtractIconA
                                                                          COMCTL32.dllImageList_Draw, ImageList_GetImageInfo, ImageList_Read, ImageList_Write, ImageList_Destroy, ImageList_Create, ImageList_LoadImageA, ImageList_Merge
                                                                          SHLWAPI.dllPathRemoveExtensionA, PathFindFileNameA, PathStripToRootA, PathFindExtensionA, PathIsUNCA
                                                                          ole32.dllWriteClassStg, OleRegGetUserType, SetConvertStg, CoTaskMemFree, ReadFmtUserTypeStg, ReadClassStg, StringFromCLSID, CoTreatAsClass, CreateBindCtx, CoTaskMemAlloc, ReleaseStgMedium, OleDuplicateData, CoDisconnectObject, CoCreateInstance, StringFromGUID2, CLSIDFromString, WriteFmtUserTypeStg
                                                                          OLEAUT32.dllVariantClear, VariantChangeType, VariantInit, SysAllocStringLen, SysFreeString, SysStringLen, SysAllocStringByteLen, SysStringByteLen, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetElemsize, SafeArrayGetDim, SafeArrayCreate, SafeArrayRedim, VariantCopy, SafeArrayAllocData, SafeArrayAllocDescriptor, SafeArrayCopy, SafeArrayGetElement, SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayLock, SafeArrayUnlock, SafeArrayDestroy, SafeArrayDestroyData, SafeArrayDestroyDescriptor, VariantTimeToSystemTime, SystemTimeToVariantTime, SysAllocString, SysReAllocStringLen, VarDateFromStr, VarBstrFromDec, VarDecFromStr, VarCyFromStr, VarBstrFromCy, VarBstrFromDate

                                                                          Exports

                                                                          NameOrdinalAddress
                                                                          mcfGvgupamvngNBNmgO10x401e04

                                                                          Possible Origin

                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States

                                                                          Network Behavior

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Mar 26, 2021 12:15:13.856343985 CET49714443192.168.2.545.33.54.74
                                                                          Mar 26, 2021 12:15:14.022622108 CET4434971445.33.54.74192.168.2.5
                                                                          Mar 26, 2021 12:15:14.533005953 CET49714443192.168.2.545.33.54.74
                                                                          Mar 26, 2021 12:15:14.699125051 CET4434971445.33.54.74192.168.2.5
                                                                          Mar 26, 2021 12:15:15.204783916 CET49714443192.168.2.545.33.54.74
                                                                          Mar 26, 2021 12:15:15.372411013 CET4434971445.33.54.74192.168.2.5
                                                                          Mar 26, 2021 12:15:19.258178949 CET497178080192.168.2.5209.141.41.136
                                                                          Mar 26, 2021 12:15:22.257272959 CET497178080192.168.2.5209.141.41.136
                                                                          Mar 26, 2021 12:15:28.364118099 CET497178080192.168.2.5209.141.41.136
                                                                          Mar 26, 2021 12:15:45.480190039 CET497268080192.168.2.5104.236.246.93
                                                                          Mar 26, 2021 12:15:48.662617922 CET497268080192.168.2.5104.236.246.93
                                                                          Mar 26, 2021 12:15:54.663077116 CET497268080192.168.2.5104.236.246.93
                                                                          Mar 26, 2021 12:16:10.887083054 CET497278080192.168.2.5198.199.114.69
                                                                          Mar 26, 2021 12:16:13.883450985 CET497278080192.168.2.5198.199.114.69
                                                                          Mar 26, 2021 12:16:19.883981943 CET497278080192.168.2.5198.199.114.69
                                                                          Mar 26, 2021 12:16:37.280674934 CET497308080192.168.2.5152.89.236.214
                                                                          Mar 26, 2021 12:16:37.298701048 CET808049730152.89.236.214192.168.2.5
                                                                          Mar 26, 2021 12:16:37.808387041 CET497308080192.168.2.5152.89.236.214
                                                                          Mar 26, 2021 12:16:37.826337099 CET808049730152.89.236.214192.168.2.5
                                                                          Mar 26, 2021 12:16:38.338735104 CET497308080192.168.2.5152.89.236.214
                                                                          Mar 26, 2021 12:16:38.357024908 CET808049730152.89.236.214192.168.2.5
                                                                          Mar 26, 2021 12:16:44.243448973 CET497318080192.168.2.587.106.136.232
                                                                          Mar 26, 2021 12:16:44.263411045 CET80804973187.106.136.232192.168.2.5
                                                                          Mar 26, 2021 12:16:44.776601076 CET497318080192.168.2.587.106.136.232
                                                                          Mar 26, 2021 12:16:44.796765089 CET80804973187.106.136.232192.168.2.5
                                                                          Mar 26, 2021 12:16:45.307971954 CET497318080192.168.2.587.106.136.232
                                                                          Mar 26, 2021 12:16:45.328773975 CET80804973187.106.136.232192.168.2.5
                                                                          Mar 26, 2021 12:16:49.226500034 CET497328080192.168.2.5178.210.51.222
                                                                          Mar 26, 2021 12:16:52.230490923 CET497328080192.168.2.5178.210.51.222
                                                                          Mar 26, 2021 12:16:58.230922937 CET497328080192.168.2.5178.210.51.222

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Mar 26, 2021 12:14:41.512866974 CET5430253192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:41.525654078 CET53543028.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:41.585858107 CET5378453192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:41.598005056 CET53537848.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:41.610990047 CET6530753192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:41.615739107 CET6434453192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:41.623008013 CET53653078.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:41.627897024 CET53643448.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:42.167435884 CET6206053192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:42.180625916 CET53620608.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:43.448725939 CET6180553192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:43.461241007 CET53618058.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:44.423804998 CET5479553192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:44.436858892 CET53547958.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:45.104419947 CET4955753192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:45.117428064 CET53495578.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:46.996332884 CET6173353192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:47.010894060 CET53617338.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:48.214711905 CET6544753192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:48.228995085 CET53654478.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:49.268984079 CET5244153192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:49.283057928 CET53524418.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:50.040528059 CET6217653192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:50.053486109 CET53621768.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:51.121691942 CET5959653192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:51.135163069 CET53595968.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:51.804497004 CET6529653192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:51.819228888 CET53652968.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:14:53.942034006 CET6318353192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:14:53.955611944 CET53631838.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:15:09.783927917 CET6015153192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:15:09.802167892 CET53601518.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:15:17.823621988 CET5696953192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:15:17.836400986 CET53569698.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:15:37.598907948 CET5516153192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:15:37.611623049 CET53551618.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:15:39.159313917 CET5475753192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:15:39.192080975 CET53547578.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:15:44.632929087 CET4999253192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:15:44.651496887 CET53499928.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:16:18.667603016 CET6007553192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:16:18.680677891 CET53600758.8.8.8192.168.2.5
                                                                          Mar 26, 2021 12:16:18.968331099 CET5501653192.168.2.58.8.8.8
                                                                          Mar 26, 2021 12:16:19.002011061 CET53550168.8.8.8192.168.2.5

                                                                          Code Manipulations

                                                                          Statistics

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:12:14:48
                                                                          Start date:26/03/2021
                                                                          Path:C:\Users\user\Desktop\aEdlObiYav.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\Desktop\aEdlObiYav.exe'
                                                                          Imagebase:0x400000
                                                                          File size:516346 bytes
                                                                          MD5 hash:AE03A6F8FB74D401B403647D28E21574
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.221393603.00000000022C0000.00000040.00000001.sdmp, Author: kevoreilly
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.221405204.00000000022D1000.00000020.00000001.sdmp, Author: kevoreilly
                                                                          Reputation:low

                                                                          General

                                                                          Start time:12:14:48
                                                                          Start date:26/03/2021
                                                                          Path:C:\Users\user\Desktop\aEdlObiYav.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:--79fd8b32
                                                                          Imagebase:0x400000
                                                                          File size:516346 bytes
                                                                          MD5 hash:AE03A6F8FB74D401B403647D28E21574
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.241329316.0000000002180000.00000040.00000001.sdmp, Author: kevoreilly
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.241344979.0000000002191000.00000020.00000001.sdmp, Author: kevoreilly
                                                                          Reputation:low

                                                                          General

                                                                          Start time:12:14:57
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\SysWOW64\picturerus.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\SysWOW64\picturerus.exe
                                                                          Imagebase:0x400000
                                                                          File size:516346 bytes
                                                                          MD5 hash:AE03A6F8FB74D401B403647D28E21574
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.240281211.0000000000E21000.00000020.00000001.sdmp, Author: kevoreilly
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.240268046.0000000000E10000.00000040.00000001.sdmp, Author: kevoreilly
                                                                          Reputation:low

                                                                          General

                                                                          Start time:12:14:57
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\SysWOW64\picturerus.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:--b743c2a4
                                                                          Imagebase:0x400000
                                                                          File size:516346 bytes
                                                                          MD5 hash:AE03A6F8FB74D401B403647D28E21574
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000004.00000002.488250881.0000000000ED1000.00000020.00000001.sdmp, Author: kevoreilly
                                                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: Emotet, Description: Emotet Payload, Source: 00000004.00000002.487903177.0000000000600000.00000040.00000001.sdmp, Author: kevoreilly
                                                                          Reputation:low

                                                                          General

                                                                          Start time:12:15:06
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                          Imagebase:0x7ff797770000
                                                                          File size:51288 bytes
                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:15:16
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                          Imagebase:0x7ff797770000
                                                                          File size:51288 bytes
                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:15:17
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                          Imagebase:0x7ff797770000
                                                                          File size:51288 bytes
                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:15:17
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                          Imagebase:0x7ff797770000
                                                                          File size:51288 bytes
                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:15:18
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\SgrmBroker.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                          Imagebase:0x7ff744c80000
                                                                          File size:163336 bytes
                                                                          MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:15:18
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                          Imagebase:0x7ff797770000
                                                                          File size:51288 bytes
                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:16:20
                                                                          Start date:26/03/2021
                                                                          Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
                                                                          Imagebase:0x7ff668430000
                                                                          File size:455656 bytes
                                                                          MD5 hash:A267555174BFA53844371226F482B86B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:12:16:21
                                                                          Start date:26/03/2021
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7ecfc0000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >