Loading ...

Play interactive tourEdit tour

Analysis Report YF4dF4w2Cr

Overview

General Information

Sample Name:YF4dF4w2Cr (renamed file extension from none to exe)
Analysis ID:376398
MD5:f4d1470af3a7d82560b38558b132d468
SHA1:0c45cf4e32116eae8d73b52c140f5d91a19ee8ea
SHA256:6fa0dd6002d4b4e7ebabefc7f4f90f36fc53069e0cf4e845f683fb087d476e90
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Emotet e-Banking trojan
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • YF4dF4w2Cr.exe (PID: 6836 cmdline: 'C:\Users\user\Desktop\YF4dF4w2Cr.exe' MD5: F4D1470AF3A7D82560B38558B132D468)
    • YF4dF4w2Cr.exe (PID: 6856 cmdline: --5c8d8ab7 MD5: F4D1470AF3A7D82560B38558B132D468)
  • fwdrrebrand.exe (PID: 6912 cmdline: C:\Windows\SysWOW64\fwdrrebrand.exe MD5: F4D1470AF3A7D82560B38558B132D468)
    • fwdrrebrand.exe (PID: 6928 cmdline: --1cbc15eb MD5: F4D1470AF3A7D82560B38558B132D468)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
    • 0xfad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 07 E8 00 85 C0
    • 0x50d4:$snippet6: 33 C0 21 05 FC 26 E8 00 A3 F8 26 E8 00 39 05 90 F3 E7 00 74 18 40 A3 F8 26 E8 00 83 3C C5 90 F3 ...
    00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
      • 0xfad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 07 3F 02 85 C0
      • 0x50d4:$snippet6: 33 C0 21 05 FC 26 3F 02 A3 F8 26 3F 02 39 05 90 F3 3E 02 74 18 40 A3 F8 26 3F 02 83 3C C5 90 F3 ...
      00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        Click to see the 11 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        1.2.YF4dF4w2Cr.exe.22f053f.2.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
        • 0x2577:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
        • 0x255d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
        1.2.YF4dF4w2Cr.exe.22f053f.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          1.2.YF4dF4w2Cr.exe.22f053f.2.unpackEmotetEmotet Payloadkevoreilly
          • 0x7ad:$snippet2: 6A 13 68 01 00 01 00 FF 15 48 07 41 00 85 C0
          • 0x48d4:$snippet6: 33 C0 21 05 FC 26 41 00 A3 F8 26 41 00 39 05 90 F3 40 00 74 18 40 A3 F8 26 41 00 83 3C C5 90 F3 ...
          2.2.fwdrrebrand.exe.e4053f.2.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
          • 0x2577:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
          • 0x255d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
          1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
          • 0x3177:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
          • 0x315d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
          Click to see the 23 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: YF4dF4w2Cr.exeAvira: detected
          Multi AV Scanner detection for submitted fileShow sources
          Source: YF4dF4w2Cr.exeMetadefender: Detection: 41%Perma Link
          Source: YF4dF4w2Cr.exeReversingLabs: Detection: 86%
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 2.0.fwdrrebrand.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.ddim
          Source: 0.0.YF4dF4w2Cr.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.ddim
          Source: 2.2.fwdrrebrand.exe.e4053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.0.YF4dF4w2Cr.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.ddim
          Source: 3.2.fwdrrebrand.exe.e4053f.2.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 3.0.fwdrrebrand.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.ddim
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E207B CryptDuplicateHash,CryptEncrypt,CryptDestroyHash,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E215A CryptDuplicateHash,CryptDecrypt,CryptVerifySignatureW,CryptDestroyHash,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1F11 CryptExportKey,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1F56 CryptGetHashParam,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1FFC CryptGenKey,CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E7207B CryptDuplicateHash,CryptEncrypt,CryptDestroyHash,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71FFC CryptGenKey,CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71F75 CryptAcquireContextW,CryptDecodeObjectEx,CryptImportKey,LocalFree,CryptReleaseContext,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71F11 CryptExportKey,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71F56 CryptGetHashParam,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E7215A CryptDuplicateHash,CryptDecrypt,CryptVerifySignatureW,CryptDestroyHash,
          Source: YF4dF4w2Cr.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0042E202 lstrlenA,FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00429112 __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0042E202 lstrlenA,FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00429112 __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
          Source: global trafficTCP traffic: 192.168.2.4:49739 -> 200.55.168.82:20
          Source: global trafficTCP traffic: 192.168.2.4:49747 -> 70.32.94.58:8080
          Source: global trafficTCP traffic: 192.168.2.4:49748 -> 213.138.100.98:8080
          Source: global trafficTCP traffic: 192.168.2.4:49751 -> 144.76.62.10:8080
          Source: global trafficTCP traffic: 192.168.2.4:49752 -> 203.99.188.203:990
          Source: global trafficTCP traffic: 192.168.2.4:49753 -> 201.196.15.79:990
          Source: Joe Sandbox ViewIP Address: 190.117.206.153 190.117.206.153
          Source: unknownTCP traffic detected without corresponding DNS query: 190.117.206.153
          Source: unknownTCP traffic detected without corresponding DNS query: 190.117.206.153
          Source: unknownTCP traffic detected without corresponding DNS query: 190.117.206.153
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.187.137
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.187.137
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.187.137
          Source: unknownTCP traffic detected without corresponding DNS query: 200.55.168.82
          Source: unknownTCP traffic detected without corresponding DNS query: 200.55.168.82
          Source: unknownTCP traffic detected without corresponding DNS query: 200.55.168.82
          Source: unknownTCP traffic detected without corresponding DNS query: 70.32.94.58
          Source: unknownTCP traffic detected without corresponding DNS query: 70.32.94.58
          Source: unknownTCP traffic detected without corresponding DNS query: 70.32.94.58
          Source: unknownTCP traffic detected without corresponding DNS query: 213.138.100.98
          Source: unknownTCP traffic detected without corresponding DNS query: 213.138.100.98
          Source: unknownTCP traffic detected without corresponding DNS query: 213.138.100.98
          Source: unknownTCP traffic detected without corresponding DNS query: 144.76.62.10
          Source: unknownTCP traffic detected without corresponding DNS query: 144.76.62.10
          Source: unknownTCP traffic detected without corresponding DNS query: 144.76.62.10
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.188.203
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.188.203
          Source: unknownTCP traffic detected without corresponding DNS query: 203.99.188.203
          Source: unknownTCP traffic detected without corresponding DNS query: 201.196.15.79
          Source: unknownTCP traffic detected without corresponding DNS query: 201.196.15.79
          Source: unknownTCP traffic detected without corresponding DNS query: 201.196.15.79
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71383 InternetReadFile,
          Source: fwdrrebrand.exe, 00000003.00000002.911061816.0000000000199000.00000004.00000001.sdmpString found in binary or memory: http://201.196.15.79/pnp/splash/loadan/merge/
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: YF4dF4w2Cr.exe, 00000000.00000002.646439364.00000000007DA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00424B11 GetKeyState,GetKeyState,GetKeyState,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0042EEC9 __EH_prolog3,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,_memset,SendMessageA,GetParent,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0040F3F3 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0040963B SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00421E22 ScreenToClient,_memset,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00424B11 GetKeyState,GetKeyState,GetKeyState,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0042EEC9 __EH_prolog3,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,_memset,SendMessageA,GetParent,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0040F3F3 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0040963B SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00421E22 ScreenToClient,_memset,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,

          E-Banking Fraud:

          barindex
          Detected Emotet e-Banking trojanShow sources
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023ED229
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E7D229
          Yara detected EmotetShow sources
          Source: Yara matchFile source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPE
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71F75 CryptAcquireContextW,CryptDecodeObjectEx,CryptImportKey,LocalFree,CryptReleaseContext,

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 2.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
          Source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
          Source: 3.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023ED3F5 GetModuleFileNameW,lstrlenW,OpenServiceW,DeleteService,CloseServiceHandle,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1D2B CreateProcessAsUserW,CreateProcessW,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeFile deleted: C:\Windows\SysWOW64\fwdrrebrand.exe:Zone.IdentifierJump to behavior
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_004110C4
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00403470
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00432286
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_004445DA
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043A5F0
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043265A
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043C699
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_004468E1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00432A66
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00444B1E
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00432E86
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00445062
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0042B39D
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0044575A
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00431DB1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F28C1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F30E8
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F30E4
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_023137A5
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_023137A9
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_02312F82
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_004110C4
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00403470
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00432286
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_004445DA
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043A5F0
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043265A
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043C699
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_004468E1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00432A66
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00444B1E
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00432E86
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00445062
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0042B39D
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0044575A
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00431DB1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F28C1
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F30E8
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F30E4
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E37A9
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E37A5
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E2F82
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E430E4
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E430E8
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E428C1
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E537A5
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E537A9
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E52F82
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E430E4
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E430E8
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E428C1
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E737A5
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E737A9
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E72F82
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00431A9B appears 430 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 004015A0 appears 56 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00439FE5 appears 52 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00431818 appears 142 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00431ACE appears 50 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00401170 appears 34 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 0041F363 appears 42 times
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: String function: 00431B04 appears 52 times
          Source: YF4dF4w2Cr.exe, 00000000.00000002.646492673.00000000022D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs YF4dF4w2Cr.exe
          Source: YF4dF4w2Cr.exe, 00000001.00000002.659892079.0000000002710000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs YF4dF4w2Cr.exe
          Source: YF4dF4w2Cr.exe, 00000001.00000002.659567664.00000000022D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs YF4dF4w2Cr.exe
          Source: YF4dF4w2Cr.exe, 00000001.00000002.659959901.0000000002770000.00000002.00000001.sdmpBinary or memory string: originalfilename vs YF4dF4w2Cr.exe
          Source: YF4dF4w2Cr.exe, 00000001.00000002.659959901.0000000002770000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs YF4dF4w2Cr.exe
          Source: YF4dF4w2Cr.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
          Source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 2.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 2.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
          Source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
          Source: 3.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
          Source: 3.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
          Source: classification engineClassification label: mal92.bank.troj.evad.winEXE@6/0@0/8
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0041D7DD __EH_prolog3_GS,GetDiskFreeSpaceA,GetFullPathNameA,GetTempFileNameA,GetFileTime,SetFileTime,GetFileSecurityA,GetFileSecurityA,GetFileSecurityA,SetFileSecurityA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: OpenSCManagerW,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: OpenSCManagerW,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_02311943 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0042B11B __EH_prolog3_GS,_memset,GetVersionExA,_malloc,_memset,CoInitializeEx,CoCreateInstance,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00402500 FindResourceA,WideCharToMultiByte,WideCharToMultiByte,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023ED4C5 OpenSCManagerW,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ID1A8F11D
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeMutant created: \BaseNamedObjects\Global\ID1A8F11D
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\MD1A8F11D
          Source: YF4dF4w2Cr.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: YF4dF4w2Cr.exeMetadefender: Detection: 41%
          Source: YF4dF4w2Cr.exeReversingLabs: Detection: 86%
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcess
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcess
          Source: unknownProcess created: C:\Users\user\Desktop\YF4dF4w2Cr.exe 'C:\Users\user\Desktop\YF4dF4w2Cr.exe'
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess created: C:\Users\user\Desktop\YF4dF4w2Cr.exe --5c8d8ab7
          Source: unknownProcess created: C:\Windows\SysWOW64\fwdrrebrand.exe C:\Windows\SysWOW64\fwdrrebrand.exe
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess created: C:\Windows\SysWOW64\fwdrrebrand.exe --1cbc15eb
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess created: C:\Users\user\Desktop\YF4dF4w2Cr.exe --5c8d8ab7
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess created: C:\Windows\SysWOW64\fwdrrebrand.exe --1cbc15eb
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_CURSOR
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_BITMAP
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_ICON
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_MENU
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_DIALOG
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_STRING
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_ACCELERATOR
          Source: YF4dF4w2Cr.exeStatic PE information: section name: RT_GROUP_ICON
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00442426 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043185D push ecx; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00431B73 push ecx; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022FE932 pushad ; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022FE9EA pushad ; iretd
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043185D push ecx; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00431B73 push ecx; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022FE932 pushad ; ret
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022FE9EA pushad ; iretd
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E4E9EA pushad ; iretd
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E4E932 pushad ; ret
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E4E9EA pushad ; iretd
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E4E932 pushad ; ret

          Persistence and Installation Behavior:

          barindex
          Drops executables to the windows directory (C:\Windows) and starts themShow sources
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeExecutable created and started: C:\Windows\SysWOW64\fwdrrebrand.exe
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exePE file moved: C:\Windows\SysWOW64\fwdrrebrand.exeJump to behavior
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023ED4C5 OpenSCManagerW,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeFile opened: C:\Windows\SysWOW64\fwdrrebrand.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0040C49C IsIconic,GetWindowPlacement,GetWindowRect,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00418BD1 GetParent,GetParent,IsIconic,GetParent,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00409E32 IsWindowVisible,IsIconic,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00427FD5 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,__EH_prolog3,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0040C49C IsIconic,GetWindowPlacement,GetWindowRect,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00418BD1 GetParent,GetParent,IsIconic,GetParent,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00409E32 IsWindowVisible,IsIconic,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00427FD5 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,__EH_prolog3,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Found evasive API chain (may stop execution after checking mutex)Show sources
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,GetTickCount,OpenServiceW,QueryServiceConfig2W,GetLastError,QueryServiceConfig2W,CloseServiceHandle,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,GetTickCount,OpenServiceW,QueryServiceConfig2W,GetLastError,QueryServiceConfig2W,CloseServiceHandle,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeAPI coverage: 7.8 %
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeAPI coverage: 9.1 %
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeFile Volume queried: C:\ FullSizeInformation
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0042E202 lstrlenA,FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00429112 __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0042E202 lstrlenA,FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00429112 __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00430650 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00442426 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00401AF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F0467 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F0C0C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022F1743 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_023112CD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_02311E04 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00401AF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F0467 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F0C0C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_022F1743 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E12CD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_023E1E04 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E40467 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E40C0C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E41743 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E512CD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 2_2_00E51E04 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E40467 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E40C0C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E41743 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E712CD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeCode function: 3_2_00E71E04 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_023114F2 GetProcessHeap,RtlAllocateHeap,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_00430650 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_004366C1 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043B152 SetUnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043BF7D __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_00430650 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_004366C1 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043B152 SetUnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 1_2_0043BF7D __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_022FD587 cpuid
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043BA29 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_0043EB76 __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,
          Source: C:\Users\user\Desktop\YF4dF4w2Cr.exeCode function: 0_2_004016F0 GetVersion,GetVersion,GetVersion,DragAcceptFiles,UpdateWindow,
          Source: C:\Windows\SysWOW64\fwdrrebrand.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected EmotetShow sources
          Source: Yara matchFile source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.YF4dF4w2Cr.exe.22f053f.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.fwdrrebrand.exe.e4053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.YF4dF4w2Cr.exe.22f053f.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fwdrrebrand.exe.e4053f.2.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1Native API121Valid Accounts1Valid Accounts1Deobfuscate/Decode Files or Information1Input Capture2System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
          Default AccountsCommand and Scripting Interpreter2Windows Service12Access Token Manipulation1Obfuscated Files or Information2LSASS MemorySystem Service Discovery1Remote Desktop ProtocolInput Capture2Exfiltration Over BluetoothEncrypted Channel22Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsService Execution12Logon Script (Windows)Windows Service12Software Packing1Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Process Injection1File Deletion1NTDSSystem Information Discovery36Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading12LSA SecretsSecurity Software Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsVirtualization/Sandbox Evasion1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          YF4dF4w2Cr.exe41%MetadefenderBrowse
          YF4dF4w2Cr.exe86%ReversingLabsWin32.Trojan.Emotet
          YF4dF4w2Cr.exe100%AviraTR/AD.Emotet.ddim

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          1.2.YF4dF4w2Cr.exe.22f053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
          0.2.YF4dF4w2Cr.exe.22f053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
          2.0.fwdrrebrand.exe.400000.0.unpack100%AviraTR/AD.Emotet.ddimDownload File
          0.2.YF4dF4w2Cr.exe.400000.0.unpack100%AviraHEUR/AGEN.1137917Download File
          0.0.YF4dF4w2Cr.exe.400000.0.unpack100%AviraTR/AD.Emotet.ddimDownload File
          3.2.fwdrrebrand.exe.400000.0.unpack100%AviraHEUR/AGEN.1137917Download File
          2.2.fwdrrebrand.exe.400000.0.unpack100%AviraHEUR/AGEN.1137917Download File
          2.2.fwdrrebrand.exe.e4053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.0.YF4dF4w2Cr.exe.400000.0.unpack100%AviraTR/AD.Emotet.ddimDownload File
          1.2.YF4dF4w2Cr.exe.400000.0.unpack100%AviraHEUR/AGEN.1137917Download File
          3.2.fwdrrebrand.exe.e4053f.2.unpack100%AviraTR/Patched.Ren.GenDownload File
          3.0.fwdrrebrand.exe.400000.0.unpack100%AviraTR/AD.Emotet.ddimDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://201.196.15.79/pnp/splash/loadan/merge/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://201.196.15.79/pnp/splash/loadan/merge/fwdrrebrand.exe, 00000003.00000002.911061816.0000000000199000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          144.76.62.10
          unknownGermany
          24940HETZNER-ASDEfalse
          203.99.188.203
          unknownPakistan
          45595PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPKfalse
          201.196.15.79
          unknownCosta Rica
          11830InstitutoCostarricensedeElectricidadyTelecomCRfalse
          200.55.168.82
          unknownCuba
          27725EmpresadeTelecomunicacionesdeCubaSACUfalse
          213.138.100.98
          unknownUnited Kingdom
          35425BYTEMARK-ASGBfalse
          190.117.206.153
          unknownPeru
          12252AmericaMovilPeruSACPEfalse
          203.99.187.137
          unknownPakistan
          45595PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPKfalse
          70.32.94.58
          unknownUnited States
          398110GO-DADDY-COM-LLCUSfalse

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:376398
          Start date:26.03.2021
          Start time:13:31:05
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 1s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:YF4dF4w2Cr (renamed file extension from none to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal92.bank.troj.evad.winEXE@6/0@0/8
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 60.2% (good quality ratio 59%)
          • Quality average: 84.1%
          • Quality standard deviation: 23.5%
          HCA Information:
          • Successful, ratio: 72%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/376398/sample/YF4dF4w2Cr.exe

          Simulations

          Behavior and APIs

          No simulations

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          144.76.62.10Payment+Summary+-+Ref+Id-+Q82.docGet hashmaliciousBrowse
          • 144.76.62.10:8080/codec/img/loadan/merge/
          201.196.15.79KjYa5KetGb.exeGet hashmaliciousBrowse
            200.55.168.82Payment+Summary+-+Ref+Id-+Q82.docGet hashmaliciousBrowse
              213.138.100.98Payment+Summary+-+Ref+Id-+Q82.docGet hashmaliciousBrowse
                190.117.206.153Payment Summary - Ref Id- Q82.docGet hashmaliciousBrowse
                • 190.117.206.153:443/json/vermont/jit/
                description October 2019.docGet hashmaliciousBrowse
                • 190.117.206.153:443/walk/results/xian/merge/
                N.282 UPN 11.10.2019.docGet hashmaliciousBrowse
                • 190.117.206.153:443/enabled/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/pdf/stubs/loadan/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/odbc/usbccid/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/sess/
                548.exeGet hashmaliciousBrowse
                • 190.117.206.153:443/add/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/stubs/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/codec/badge/
                20190918_90139353.docGet hashmaliciousBrowse
                • 190.117.206.153:443/child/mult/
                9003-09202019912.docGet hashmaliciousBrowse
                • 190.117.206.153:443/srvc/badge/jit/merge/
                9003-09202019912.docGet hashmaliciousBrowse
                • 190.117.206.153:443/sess/
                9003-09202019912.docGet hashmaliciousBrowse
                • 190.117.206.153:443/enabled/balloon/jit/merge/
                message_3392059.docGet hashmaliciousBrowse
                • 190.117.206.153:443/forced/arizona/loadan/
                message_3392059.docGet hashmaliciousBrowse
                • 190.117.206.153:443/splash/splash/pdf/
                message_3392059.docGet hashmaliciousBrowse
                • 190.117.206.153:443/nsip/jit/loadan/merge/
                Documents-09_18_2019-Q212286.docGet hashmaliciousBrowse
                • 190.117.206.153:443/vermont/enable/
                Documents-09_18_2019-Q212286.docGet hashmaliciousBrowse
                • 190.117.206.153:443/nsip/free/jit/merge/
                Documents-09_18_2019-Q212286.docGet hashmaliciousBrowse
                • 190.117.206.153:443/sym/img/loadan/merge/
                Soumissions_19092019-5002924.docGet hashmaliciousBrowse
                • 190.117.206.153:443/publish/enable/jit/merge/

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                InstitutoCostarricensedeElectricidadyTelecomCR1.shGet hashmaliciousBrowse
                • 190.171.2.203
                7mB0FoVcSn.exeGet hashmaliciousBrowse
                • 201.203.99.129
                rJz6SePuqu.dllGet hashmaliciousBrowse
                • 201.203.96.60
                KjYa5KetGb.exeGet hashmaliciousBrowse
                • 201.196.15.79
                68Faktura_VAT_8263562736.jsGet hashmaliciousBrowse
                • 200.91.115.40
                68Faktura_VAT_837478883422.jsGet hashmaliciousBrowse
                • 200.91.115.40
                INV-DK7408221-609.docGet hashmaliciousBrowse
                • 181.193.115.50
                http://nowley-rus.ru/administrator/cache/En_us/Black-FridayGet hashmaliciousBrowse
                • 181.193.115.50
                Invoice_WCO5655_file.docGet hashmaliciousBrowse
                • 181.193.115.50
                INVOICE_NN6267_FILE.docGet hashmaliciousBrowse
                • 181.193.115.50
                dark.armGet hashmaliciousBrowse
                • 201.206.147.94
                vnc.exeGet hashmaliciousBrowse
                • 201.197.138.2
                qwerty2.exeGet hashmaliciousBrowse
                • 200.91.115.40
                9ZtszOkjm.exeGet hashmaliciousBrowse
                • 201.237.32.61
                6520188910_891086.jpg.jsGet hashmaliciousBrowse
                • 200.91.115.40
                Phot.exeGet hashmaliciousBrowse
                • 181.193.42.2
                INV_201901_FXJ47525663-991.docGet hashmaliciousBrowse
                • 201.194.127.211
                INV_201901_FXJ47525663-991.docGet hashmaliciousBrowse
                • 201.194.127.211
                adminsvcs.exeGet hashmaliciousBrowse
                • 201.194.127.211
                FA_25012019_91386378.docGet hashmaliciousBrowse
                • 201.194.127.211
                HETZNER-ASDEY79FTQtEqG.exeGet hashmaliciousBrowse
                • 144.76.242.196
                2sOfVsf40V.exeGet hashmaliciousBrowse
                • 88.99.66.31
                mIkTGifBOr.exeGet hashmaliciousBrowse
                • 195.201.225.248
                JJvkhWtyEm.exeGet hashmaliciousBrowse
                • 195.201.225.248
                ajESKcIz8f.exeGet hashmaliciousBrowse
                • 88.99.66.31
                ed8a7ffec56f450a365e758012db092883bbd23565f3f.exeGet hashmaliciousBrowse
                • 78.46.142.223
                KsNar1S9Ao.exeGet hashmaliciousBrowse
                • 78.46.142.223
                81e32711095862add92b6628569a86fad212e146dc41b.exeGet hashmaliciousBrowse
                • 78.46.142.223
                3688975dcd3f7829cfe55f7dd46166e0d6bd46c842c16.exeGet hashmaliciousBrowse
                • 78.46.142.223
                uLVu6RlD4i.exeGet hashmaliciousBrowse
                • 195.201.225.248
                hLOTlwUNup.exeGet hashmaliciousBrowse
                • 88.99.66.31
                vZzN8hoqnD.exeGet hashmaliciousBrowse
                • 88.99.66.31
                lm2LHApR75.exeGet hashmaliciousBrowse
                • 195.201.225.248
                06607b04da0cd27e4a7abff3df7ee0be86df8226e81a5.exeGet hashmaliciousBrowse
                • 78.46.142.223
                ZYKk8dtiEk.exeGet hashmaliciousBrowse
                • 78.46.142.223
                FileZilla_3.53.0_win64_sponsored-setup.exeGet hashmaliciousBrowse
                • 49.12.121.47
                dUVOxpQFkT.exeGet hashmaliciousBrowse
                • 78.46.142.223
                RsApxCz3YQ.exeGet hashmaliciousBrowse
                • 195.201.225.248
                l59qWeKoK3.exeGet hashmaliciousBrowse
                • 195.201.225.248
                83f723bc00bdf9847f4c2940332ef62253dd09d4b324b.exeGet hashmaliciousBrowse
                • 78.46.142.223
                PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK1.shGet hashmaliciousBrowse
                • 182.186.35.164
                Payment TT Copy. PDF.exeGet hashmaliciousBrowse
                • 182.180.156.51
                PDFXCview.exeGet hashmaliciousBrowse
                • 39.41.93.184
                mssecsvc.exeGet hashmaliciousBrowse
                • 182.190.53.85
                iuE5dYsTLd.exeGet hashmaliciousBrowse
                • 182.186.127.118
                iGet hashmaliciousBrowse
                • 119.157.148.99
                JaQ0skAudI.exeGet hashmaliciousBrowse
                • 182.186.89.232
                Y9UrMMIwN8.exeGet hashmaliciousBrowse
                • 39.52.155.1
                SALES AND EXPENSES.xlsGet hashmaliciousBrowse
                • 182.186.224.209
                FhqpDjkst.exeGet hashmaliciousBrowse
                • 182.180.143.39
                INV-XVH-O086312.docGet hashmaliciousBrowse
                • 182.180.77.215
                INV-XVH-O086312.docGet hashmaliciousBrowse
                • 182.180.77.215
                17Bill of lading Status_pdf.exeGet hashmaliciousBrowse
                • 182.176.115.69
                mssecsvr.exeGet hashmaliciousBrowse
                • 39.36.213.233
                zilla.exeGet hashmaliciousBrowse
                • 182.182.230.248
                MP3Rocket.exeGet hashmaliciousBrowse
                • 182.186.105.125
                a0UaSwRbSm.exeGet hashmaliciousBrowse
                • 119.158.43.166
                41messag.exeGet hashmaliciousBrowse
                • 39.58.46.97
                formneutral.exeGet hashmaliciousBrowse
                • 182.180.170.72
                http://svai-nkt.ru/En/corporation/Invoice_number/jQxe-VGfy_PVswUKb-ZLxGet hashmaliciousBrowse
                • 39.61.49.128

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                No created / dropped files found

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.584976742352093
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:YF4dF4w2Cr.exe
                File size:502272
                MD5:f4d1470af3a7d82560b38558b132d468
                SHA1:0c45cf4e32116eae8d73b52c140f5d91a19ee8ea
                SHA256:6fa0dd6002d4b4e7ebabefc7f4f90f36fc53069e0cf4e845f683fb087d476e90
                SHA512:1f45093e1509d86ab03ee2c6f15a6dbc3ed4f41cac3c8faf5ae66445b787b58bf9e69d047d7ead3d1d22284d351fbb739a7a7eb73180f746f3d4f621859206c8
                SSDEEP:12288:x1n6BAlECcMIR4WlptZ2uOIR4bi6/Myw52BLhDG5Fq:x16SbcMMlpLLOS
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8...V...V...V..s;...V..s-...V...W...V.......V.......V.....X.V.......V.......V.......V.Rich..V.........................PE..L..

                File Icon

                Icon Hash:64e4c4e4e4c4e4f0

                Static PE Info

                General

                Entrypoint:0x4316ec
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                DLL Characteristics:TERMINAL_SERVER_AWARE
                Time Stamp:0x5D99FBDA [Sun Oct 6 14:36:10 2019 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:0
                File Version Major:5
                File Version Minor:0
                Subsystem Version Major:5
                Subsystem Version Minor:0
                Import Hash:9f251661407b9fa6502b6b65d148504e

                Entrypoint Preview

                Instruction
                call 00007FBC6C9E301Dh
                jmp 00007FBC6C9D8B5Dh
                push 0000000Ch
                push 0045DF00h
                call 00007FBC6C9D8DFBh
                mov esi, dword ptr [ebp+08h]
                test esi, esi
                je 00007FBC6C9D8D57h
                cmp dword ptr [00468784h], 03h
                jne 00007FBC6C9D8D25h
                push 00000004h
                call 00007FBC6C9E168Bh
                pop ecx
                and dword ptr [ebp-04h], 00000000h
                push esi
                call 00007FBC6C9E16B3h
                pop ecx
                mov dword ptr [ebp-1Ch], eax
                test eax, eax
                je 00007FBC6C9D8CEBh
                push esi
                push eax
                call 00007FBC6C9E16D4h
                pop ecx
                pop ecx
                mov dword ptr [ebp-04h], FFFFFFFEh
                call 00007FBC6C9D8CF0h
                cmp dword ptr [ebp-1Ch], 00000000h
                jne 00007FBC6C9D8D19h
                push dword ptr [ebp+08h]
                jmp 00007FBC6C9D8CECh
                push 00000004h
                call 00007FBC6C9E1577h
                pop ecx
                ret
                push esi
                push 00000000h
                push dword ptr [00466EACh]
                call dword ptr [0044E22Ch]
                test eax, eax
                jne 00007FBC6C9D8CF8h
                call 00007FBC6C9D92B6h
                mov esi, eax
                call dword ptr [0044E3ACh]
                push eax
                call 00007FBC6C9D9266h
                mov dword ptr [esi], eax
                pop ecx
                call 00007FBC6C9D8DBFh
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                push 00000000h
                push dword ptr [ebp+14h]
                push dword ptr [ebp+10h]
                push dword ptr [ebp+0Ch]
                push dword ptr [ebp+08h]
                call 00007FBC6C9E3008h
                add esp, 14h
                pop ebp
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                push ebx
                xor ebx, ebx
                push esi
                push edi
                cmp eax, ebx
                je 00007FBC6C9D8CE9h
                mov edi, dword ptr [ebp+00h]

                Rich Headers

                Programming Language:
                • [ C ] VS2008 build 21022
                • [LNK] VS2008 build 21022
                • [ C ] VS2005 build 50727
                • [ASM] VS2008 build 21022
                • [IMP] VS2005 build 50727
                • [RES] VS2008 build 21022
                • [EXP] VS2008 build 21022
                • [C++] VS2008 build 21022

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x610800x45.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x5eb040xdc.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x182e2.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x57c600x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x4e0000x704.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5ea540x40.rdata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x4c25b0x4c400False0.565689036885data6.53895852223IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x4e0000x130c50x13200False0.320606107026data5.00400278699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x620000x67b80x2c00False0.302379261364data4.20689124117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x690000x182e20x18400False0.639839722938data6.84520055945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_CURSOR0x6a6bc0x134dataEnglishUnited States
                RT_CURSOR0x6a7f00xb4dataEnglishUnited States
                RT_CURSOR0x6a8a40x134dataEnglishUnited States
                RT_CURSOR0x6a9d80xb4dataEnglishUnited States
                RT_CURSOR0x6aa8c0x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6abc00xb4dataEnglishUnited States
                RT_CURSOR0x6ac740x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6ada80xb4dataEnglishUnited States
                RT_CURSOR0x6ae5c0x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6af900xb4dataEnglishUnited States
                RT_CURSOR0x6b0440x200AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6b2440xb4dataEnglishUnited States
                RT_CURSOR0x6b2f80x200AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6b4f80xb4dataEnglishUnited States
                RT_CURSOR0x6b5ac0x200AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6b7ac0xb4dataEnglishUnited States
                RT_CURSOR0x6b8600x200AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6ba600xb4dataEnglishUnited States
                RT_CURSOR0x6bb140x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6bc480xb4dataEnglishUnited States
                RT_CURSOR0x6bcfc0x134dataEnglishUnited States
                RT_CURSOR0x6be300xb4dataEnglishUnited States
                RT_CURSOR0x6bee40x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6c0180x134dataEnglishUnited States
                RT_CURSOR0x6c14c0x134dataEnglishUnited States
                RT_CURSOR0x6c2800x134dataEnglishUnited States
                RT_CURSOR0x6c3b40x134dataEnglishUnited States
                RT_CURSOR0x6c4e80x134dataEnglishUnited States
                RT_CURSOR0x6c61c0x134dataEnglishUnited States
                RT_CURSOR0x6c7500x134dataEnglishUnited States
                RT_CURSOR0x6c8840x134dataEnglishUnited States
                RT_CURSOR0x6c9b80x134dataEnglishUnited States
                RT_CURSOR0x6caec0x134AmigaOS bitmap fontEnglishUnited States
                RT_CURSOR0x6cc200x134dataEnglishUnited States
                RT_CURSOR0x6cd540x134dataEnglishUnited States
                RT_CURSOR0x6ce880x134dataEnglishUnited States
                RT_CURSOR0x6cfbc0x134dataEnglishUnited States
                RT_CURSOR0x6d0f00xb4dataEnglishUnited States
                RT_BITMAP0x6d1a40x4a0dataEnglishUnited States
                RT_BITMAP0x6d6440xb8dataEnglishUnited States
                RT_BITMAP0x6d6fc0x144dataEnglishUnited States
                RT_ICON0x6d8400x2e8data
                RT_MENU0x6db280x12cdataEnglishUnited States
                RT_MENU0x6dc540x3acdataEnglishUnited States
                RT_DIALOG0x6e0000x184dataEnglishUnited States
                RT_DIALOG0x6e1840x164dataEnglishUnited States
                RT_DIALOG0x6e2e80xf2dataEnglishUnited States
                RT_DIALOG0x6e3dc0xdcdataEnglishUnited States
                RT_DIALOG0x6e4b80xe8dataEnglishUnited States
                RT_DIALOG0x6e5a00x1a2dataEnglishUnited States
                RT_DIALOG0x6e7440x15adataEnglishUnited States
                RT_DIALOG0x6e8a00x34dataEnglishUnited States
                RT_STRING0x6e8d40x10edataEnglishUnited States
                RT_STRING0x6e9e40x204dataEnglishUnited States
                RT_STRING0x6ebe80x60dataEnglishUnited States
                RT_STRING0x6ec480x34dataEnglishUnited States
                RT_STRING0x6ec7c0x34dataEnglishUnited States
                RT_STRING0x6ecb00x358dataEnglishUnited States
                RT_STRING0x6f0080x3adataEnglishUnited States
                RT_STRING0x6f0440x208dataEnglishUnited States
                RT_STRING0x6f24c0xb0dataEnglishUnited States
                RT_STRING0x6f2fc0x298dataEnglishUnited States
                RT_STRING0x6f5940x1eadataEnglishUnited States
                RT_STRING0x6f7800xf0dataEnglishUnited States
                RT_STRING0x6f8700xaadataEnglishUnited States
                RT_STRING0x6f91c0x46dataEnglishUnited States
                RT_STRING0x6f9640x86dataEnglishUnited States
                RT_STRING0x6f9ec0x1f8dataEnglishUnited States
                RT_STRING0x6fbe40xaedataEnglishUnited States
                RT_STRING0x6fc940xb2dataEnglishUnited States
                RT_STRING0x6fd480x2adataEnglishUnited States
                RT_STRING0x6fd740x184dataEnglishUnited States
                RT_STRING0x6fef80x124dataEnglishUnited States
                RT_STRING0x7001c0x4adataEnglishUnited States
                RT_STRING0x700680x4e6dataEnglishUnited States
                RT_STRING0x705500x264dataEnglishUnited States
                RT_STRING0x707b40x2dadataEnglishUnited States
                RT_STRING0x70a900x8adataEnglishUnited States
                RT_STRING0x70b1c0x19adataEnglishUnited States
                RT_STRING0x70cb80xdedataEnglishUnited States
                RT_STRING0x70d980x4a8dataEnglishUnited States
                RT_STRING0x712400x228dataEnglishUnited States
                RT_STRING0x714680x2cdataEnglishUnited States
                RT_STRING0x714940x42dataEnglishUnited States
                RT_ACCELERATOR0x714d80x78dataEnglishUnited States
                RT_ACCELERATOR0x715500x18dataEnglishUnited States
                RT_RCDATA0x715680xf944data
                RT_GROUP_CURSOR0x80eac0x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80ed00x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80ef40x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80f180x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80f3c0x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80f600x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80f840x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80fa80x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80fcc0x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x80ff00x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x810140x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x810380x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                RT_GROUP_CURSOR0x8105c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810e80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x810fc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x811100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x811240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x811380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x8114c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x811600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_ICON0x811740x14data
                RT_MANIFEST0x811880x15aASCII text, with CRLF line terminatorsEnglishUnited States

                Imports

                DLLImport
                KERNEL32.dllGetACP, IsValidCodePage, LCMapStringW, VirtualFree, HeapCreate, GetStdHandle, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, IsDebuggerPresent, GetConsoleCP, GetConsoleMode, LCMapStringA, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetLocaleInfoW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CompareStringW, SetEnvironmentVariableA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SetEvent, TerminateProcess, HeapSize, CreateThread, ExitThread, ExitProcess, HeapReAlloc, VirtualAlloc, HeapFree, GetStartupInfoA, GetCommandLineA, HeapAlloc, RaiseException, RtlUnwind, GetTickCount, SetErrorMode, GetFileSizeEx, LocalFileTimeToFileTime, FileTimeToLocalFileTime, CreateFileA, GetShortPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, lstrcmpiA, GetStringTypeExA, DeleteFileA, MoveFileA, GetCurrentDirectoryA, GetPrivateProfileStringA, WritePrivateProfileStringA, GetPrivateProfileIntA, SystemTimeToFileTime, FileTimeToSystemTime, GetThreadLocale, GetOEMCP, GetCPInfo, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GetModuleHandleW, GlobalFlags, InterlockedDecrement, GetModuleFileNameW, GetDiskFreeSpaceA, GetFullPathNameA, GetTempFileNameA, GetFileTime, SetFileTime, GetFileAttributesA, SuspendThread, ResumeThread, SetThreadPriority, CloseHandle, GetCurrentThread, ConvertDefaultLocale, EnumResourceLanguagesA, GetModuleFileNameA, GetLocaleInfoA, InterlockedExchange, lstrcmpA, GetCurrentThreadId, GlobalFindAtomA, GlobalDeleteAtom, FreeLibrary, CompareStringA, lstrcmpW, GetVersionExA, GetCurrentProcessId, GlobalGetAtomNameA, GlobalAddAtomA, GetProcAddress, GetModuleHandleA, LoadLibraryA, FreeResource, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, MultiByteToWideChar, MulDiv, lstrlenA, GetLastError, SetLastError, Sleep, GetExitCodeThread, CreateEventA, WideCharToMultiByte, FindResourceA, LoadResource, LockResource, SizeofResource, GetVersion, WaitForSingleObject, ResetEvent, GetTimeZoneInformation
                USER32.dllRegisterClipboardFormatA, GetDCEx, EndPaint, BeginPaint, GetWindowDC, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, WindowFromPoint, GetSysColorBrush, GetMenuItemInfoA, InflateRect, DestroyCursor, SetRect, LoadCursorA, SetCapture, KillTimer, SetTimer, ClientToScreen, SetWindowRgn, DrawIcon, FillRect, CreateDialogIndirectParamA, GetNextDlgTabItem, EndDialog, ShowOwnedPopups, GetMessageA, TranslateMessage, GetCursorPos, ValidateRect, PostQuitMessage, SetParent, GetSystemMenu, DeleteMenu, IsRectEmpty, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, ModifyMenuA, EnableMenuItem, CheckMenuItem, RegisterWindowMessageA, SendDlgItemMessageA, IsChild, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, GetPropA, RemovePropA, GetFocus, GetWindowTextA, GetForegroundWindow, BeginDeferWindowPos, EndDeferWindowPos, GetTopWindow, DestroyWindow, UnhookWindowsHookEx, GetMessageTime, GetMessagePos, MapWindowPoints, ScrollWindow, TrackPopupMenu, SetScrollRange, GetScrollRange, SetScrollPos, GetScrollPos, SetForegroundWindow, ShowScrollBar, MessageBoxA, GetClassInfoExA, RegisterClassA, ScreenToClient, DeferWindowPos, GetScrollInfo, SetScrollInfo, DefWindowProcA, CallWindowProcA, SystemParametersInfoA, GetWindowPlacement, IsZoomed, GetClassNameA, UnpackDDElParam, ReuseDDElParam, LoadMenuA, DestroyMenu, WinHelpA, SetFocus, GetWindowThreadProcessId, IsWindowEnabled, EqualRect, GetDlgItem, GetDlgCtrlID, GetKeyState, LoadIconA, SetCursor, PeekMessageA, GetCapture, ReleaseCapture, LoadAcceleratorsA, SetActiveWindow, IsWindowVisible, IsIconic, InsertMenuItemA, CreatePopupMenu, GetClassInfoA, IntersectRect, OffsetRect, CopyRect, GetLastActivePopup, SetMenu, GetDesktopWindow, GetWindow, ShowWindow, GetSysColor, InvalidateRect, UnregisterClassA, GetTabbedTextExtentA, PostThreadMessageA, CreateMenu, CopyAcceleratorTableA, CharUpperA, DestroyIcon, GetWindowTextLengthA, LockWindowUpdate, GetWindowRect, SetRectEmpty, PtInRect, GetDC, GetSystemMetrics, ReleaseDC, GetMenuState, GetMenuStringA, AppendMenuA, InsertMenuA, RemoveMenu, AdjustWindowRectEx, RedrawWindow, SetWindowPos, GetClientRect, GetWindowLongA, SetWindowLongA, IsWindow, TranslateAcceleratorA, TranslateMDISysAccel, BringWindowToTop, GetActiveWindow, DrawMenuBar, CreateWindowExA, GetParent, GetMenuItemCount, GetSubMenu, GetMenuItemID, DefMDIChildProcA, GetMenu, DefFrameProcA, SendMessageA, LoadStringW, EnableWindow, UpdateWindow, PostMessageA, DispatchMessageA
                GDI32.dllSelectClipRgn, CreateRectRgn, GetViewportExtEx, GetWindowExtEx, GetPixel, PtVisible, RectVisible, SetPolyFillMode, TextOutA, Escape, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetCurrentPositionEx, CreatePatternBrush, CreateSolidBrush, CreateRectRgnIndirect, SetRectRgn, CombineRgn, GetNearestColor, GetBkMode, GetPolyFillMode, GetROP2, GetStretchBltMode, GetTextColor, GetTextAlign, GetTextFaceA, GetTextExtentPointA, GetWindowOrgEx, SetBkMode, RestoreDC, SaveDC, GetBkColor, ExtTextOutA, SetTextAlign, MoveToEx, LineTo, IntersectClipRect, ExcludeClipRect, SetMapMode, SetStretchBltMode, GetDeviceCaps, BitBlt, CreateFontIndirectA, GetStockObject, PatBlt, Rectangle, GetViewportOrgEx, CreatePen, EndDoc, AbortDoc, SetAbortProc, EndPage, StartPage, StartDocA, Ellipse, LPtoDP, DPtoLP, CreateEllipticRgn, CreateBitmap, SetBkColor, SetTextColor, GetClipBox, GetTextExtentPoint32A, GetTextMetricsA, CreateCompatibleBitmap, CreateCompatibleDC, StretchDIBits, DeleteDC, GetObjectA, CreateFontA, SelectObject, GetCharWidthA, DeleteObject, CreateDCA, SetROP2
                COMDLG32.dllGetFileTitleA
                WINSPOOL.DRVClosePrinter, OpenPrinterA, GetJobA, DocumentPropertiesA
                ADVAPI32.dllRegSetValueExA, RegCreateKeyA, RegCreateKeyExA, GetFileSecurityA, SetFileSecurityA, RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegSetValueA, RegCloseKey, RegDeleteValueA
                SHELL32.dllDragFinish, DragQueryFileA, ExtractIconA, SHGetFileInfoA, DragAcceptFiles
                SHLWAPI.dllPathRemoveExtensionA, PathFindFileNameA, PathStripToRootA, PathIsUNCA, PathFindExtensionA, PathRemoveFileSpecW
                ole32.dllOleDestroyMenuDescriptor, OleCreateMenuDescriptor, IsAccelerator, OleTranslateAccelerator, CoInitializeEx, CoUninitialize, CoCreateInstance, CoTaskMemFree
                OLEAUT32.dllSysAllocStringLen, VariantChangeType, VariantClear, VariantInit

                Exports

                NameOrdinalAddress
                Run10x4037c0

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Mar 26, 2021 13:32:21.149575949 CET49726443192.168.2.4190.117.206.153
                Mar 26, 2021 13:32:24.137447119 CET49726443192.168.2.4190.117.206.153
                Mar 26, 2021 13:32:30.138016939 CET49726443192.168.2.4190.117.206.153
                Mar 26, 2021 13:32:46.299501896 CET49738443192.168.2.4203.99.187.137
                Mar 26, 2021 13:32:46.539707899 CET44349738203.99.187.137192.168.2.4
                Mar 26, 2021 13:32:47.045715094 CET49738443192.168.2.4203.99.187.137
                Mar 26, 2021 13:32:47.283056974 CET44349738203.99.187.137192.168.2.4
                Mar 26, 2021 13:32:47.795870066 CET49738443192.168.2.4203.99.187.137
                Mar 26, 2021 13:32:48.117441893 CET44349738203.99.187.137192.168.2.4
                Mar 26, 2021 13:32:52.279159069 CET4973920192.168.2.4200.55.168.82
                Mar 26, 2021 13:32:55.280688047 CET4973920192.168.2.4200.55.168.82
                Mar 26, 2021 13:33:01.296782970 CET4973920192.168.2.4200.55.168.82
                Mar 26, 2021 13:33:18.696319103 CET497478080192.168.2.470.32.94.58
                Mar 26, 2021 13:33:18.809274912 CET80804974770.32.94.58192.168.2.4
                Mar 26, 2021 13:33:19.314100027 CET497478080192.168.2.470.32.94.58
                Mar 26, 2021 13:33:19.425592899 CET80804974770.32.94.58192.168.2.4
                Mar 26, 2021 13:33:19.939344883 CET497478080192.168.2.470.32.94.58
                Mar 26, 2021 13:33:20.051001072 CET80804974770.32.94.58192.168.2.4
                Mar 26, 2021 13:33:23.146354914 CET497488080192.168.2.4213.138.100.98
                Mar 26, 2021 13:33:23.184562922 CET808049748213.138.100.98192.168.2.4
                Mar 26, 2021 13:33:23.689268112 CET497488080192.168.2.4213.138.100.98
                Mar 26, 2021 13:33:23.727399111 CET808049748213.138.100.98192.168.2.4
                Mar 26, 2021 13:33:24.236388922 CET497488080192.168.2.4213.138.100.98
                Mar 26, 2021 13:33:24.274235964 CET808049748213.138.100.98192.168.2.4
                Mar 26, 2021 13:33:28.601304054 CET497518080192.168.2.4144.76.62.10
                Mar 26, 2021 13:33:28.625920057 CET808049751144.76.62.10192.168.2.4
                Mar 26, 2021 13:33:29.127257109 CET497518080192.168.2.4144.76.62.10
                Mar 26, 2021 13:33:29.152199984 CET808049751144.76.62.10192.168.2.4
                Mar 26, 2021 13:33:29.658544064 CET497518080192.168.2.4144.76.62.10
                Mar 26, 2021 13:33:29.680944920 CET808049751144.76.62.10192.168.2.4
                Mar 26, 2021 13:33:33.485486031 CET49752990192.168.2.4203.99.188.203
                Mar 26, 2021 13:33:33.705632925 CET99049752203.99.188.203192.168.2.4
                Mar 26, 2021 13:33:34.221575022 CET49752990192.168.2.4203.99.188.203
                Mar 26, 2021 13:33:34.439589024 CET99049752203.99.188.203192.168.2.4
                Mar 26, 2021 13:33:34.940423965 CET49752990192.168.2.4203.99.188.203
                Mar 26, 2021 13:33:35.159921885 CET99049752203.99.188.203192.168.2.4
                Mar 26, 2021 13:33:38.379935980 CET49753990192.168.2.4201.196.15.79
                Mar 26, 2021 13:33:41.378377914 CET49753990192.168.2.4201.196.15.79
                Mar 26, 2021 13:33:47.378798962 CET49753990192.168.2.4201.196.15.79

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:13:31:52
                Start date:26/03/2021
                Path:C:\Users\user\Desktop\YF4dF4w2Cr.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\YF4dF4w2Cr.exe'
                Imagebase:0x400000
                File size:502272 bytes
                MD5 hash:F4D1470AF3A7D82560B38558B132D468
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.646512151.0000000002311000.00000020.00000001.sdmp, Author: kevoreilly
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.646499888.00000000022F0000.00000040.00000001.sdmp, Author: kevoreilly
                Reputation:low

                General

                Start time:13:31:52
                Start date:26/03/2021
                Path:C:\Users\user\Desktop\YF4dF4w2Cr.exe
                Wow64 process (32bit):true
                Commandline:--5c8d8ab7
                Imagebase:0x400000
                File size:502272 bytes
                MD5 hash:F4D1470AF3A7D82560B38558B132D468
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.659738344.00000000023E1000.00000020.00000001.sdmp, Author: kevoreilly
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.659583488.00000000022F0000.00000040.00000001.sdmp, Author: kevoreilly
                Reputation:low

                General

                Start time:13:31:57
                Start date:26/03/2021
                Path:C:\Windows\SysWOW64\fwdrrebrand.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\fwdrrebrand.exe
                Imagebase:0x400000
                File size:502272 bytes
                MD5 hash:F4D1470AF3A7D82560B38558B132D468
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000002.00000002.658516120.0000000000E51000.00000020.00000001.sdmp, Author: kevoreilly
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000002.00000002.658502869.0000000000E40000.00000040.00000001.sdmp, Author: kevoreilly
                Reputation:low

                General

                Start time:13:31:58
                Start date:26/03/2021
                Path:C:\Windows\SysWOW64\fwdrrebrand.exe
                Wow64 process (32bit):true
                Commandline:--1cbc15eb
                Imagebase:0x400000
                File size:502272 bytes
                MD5 hash:F4D1470AF3A7D82560B38558B132D468
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.911351133.0000000000E71000.00000020.00000001.sdmp, Author: kevoreilly
                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.911329225.0000000000E40000.00000040.00000001.sdmp, Author: kevoreilly
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >