Loading ...

Play interactive tourEdit tour

Analysis Report lK8vF3n2e7.exe

Overview

General Information

Sample Name:lK8vF3n2e7.exe
Analysis ID:383022
MD5:d7cd602eb9e9ad8272d4ad0910815835
SHA1:cefae0fd990a5491e893796ab8ab56fc9edc015b
SHA256:bca575b21c8b02010cde26b2bd7b2e8cdc313f135f97363b34f8bf0f389a990b
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Emotet e-Banking trojan
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • lK8vF3n2e7.exe (PID: 460 cmdline: 'C:\Users\user\Desktop\lK8vF3n2e7.exe' MD5: D7CD602EB9E9AD8272D4AD0910815835)
    • lK8vF3n2e7.exe (PID: 4144 cmdline: --b0af2bca MD5: D7CD602EB9E9AD8272D4AD0910815835)
  • svchost.exe (PID: 3708 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • corsangle.exe (PID: 6128 cmdline: C:\Windows\SysWOW64\corsangle.exe MD5: D7CD602EB9E9AD8272D4AD0910815835)
    • corsangle.exe (PID: 5496 cmdline: --2e5419fc MD5: D7CD602EB9E9AD8272D4AD0910815835)
  • svchost.exe (PID: 4280 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1540 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2440 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 244 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2592 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1140 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6008 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3012 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 5248 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 4276 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 5836 cmdline: 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 3892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
    • 0xfad:$snippet2: 6A 13 68 01 00 01 00 FF 15 D8 1B 23 02 85 C0
    • 0x5066:$snippet6: 33 C0 21 05 0C 3C 23 02 A3 08 3C 23 02 39 05 60 03 23 02 74 18 40 A3 08 3C 23 02 83 3C C5 60 03 ...
    00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmpEmotetEmotet Payloadkevoreilly
      • 0x18ec:$snippet2: 6A 13 68 01 00 01 00 FF 15 D8 1B 41 00 85 C0
      • 0x59a5:$snippet6: 33 C0 21 05 0C 3C 41 00 A3 08 3C 41 00 39 05 60 03 41 00 74 18 40 A3 08 3C 41 00 83 3C C5 60 03 ...
      00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        Click to see the 11 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        4.2.corsangle.exe.70053f.1.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
        • 0x2577:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
        • 0x255d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
        4.2.corsangle.exe.70053f.1.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          4.2.corsangle.exe.70053f.1.unpackEmotetEmotet Payloadkevoreilly
          • 0x7ad:$snippet2: 6A 13 68 01 00 01 00 FF 15 D8 1B 41 00 85 C0
          • 0x4866:$snippet6: 33 C0 21 05 0C 3C 41 00 A3 08 3C 41 00 39 05 60 03 41 00 74 18 40 A3 08 3C 41 00 83 3C C5 60 03 ...
          3.2.corsangle.exe.e3053f.1.raw.unpackMAL_Emotet_Jan20_1Detects Emotet malwareFlorian Roth
          • 0x3177:$op1: 03 FE 66 39 07 0F 85 2A FF FF FF 8B 4D F0 6A 20
          • 0x315d:$op2: 8B 7D FC 0F 85 49 FF FF FF 85 DB 0F 84 D1
          3.2.corsangle.exe.e3053f.1.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
            Click to see the 23 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: lK8vF3n2e7.exeAvira: detected
            Multi AV Scanner detection for submitted fileShow sources
            Source: lK8vF3n2e7.exeVirustotal: Detection: 71%Perma Link
            Source: lK8vF3n2e7.exeReversingLabs: Detection: 90%
            Source: 0.0.lK8vF3n2e7.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.dzjt
            Source: 2.0.lK8vF3n2e7.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.dzjt
            Source: 3.0.corsangle.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.dzjt
            Source: 4.0.corsangle.exe.400000.0.unpackAvira: Label: TR/AD.Emotet.dzjt
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222207B CryptDuplicateHash,CryptEncrypt,CryptDestroyHash,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222215A CryptDuplicateHash,CryptDecrypt,CryptVerifySignatureW,CryptDestroyHash,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221F11 CryptExportKey,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221F56 CryptGetHashParam,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221FFC CryptGenKey,CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
            Source: lK8vF3n2e7.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_004290C4 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_004290C4 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: global trafficTCP traffic: 192.168.2.3:49729 -> 104.236.137.72:8080
            Source: global trafficTCP traffic: 192.168.2.3:49740 -> 213.189.36.51:8080
            Source: global trafficTCP traffic: 192.168.2.3:49741 -> 85.234.143.94:8080
            Source: global trafficTCP traffic: 192.168.2.3:49744 -> 119.59.124.163:8080
            Source: global trafficTCP traffic: 192.168.2.3:49745 -> 190.146.131.105:8080
            Source: Joe Sandbox ViewIP Address: 119.59.124.163 119.59.124.163
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.137.72
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.137.72
            Source: unknownTCP traffic detected without corresponding DNS query: 104.236.137.72
            Source: unknownTCP traffic detected without corresponding DNS query: 172.104.233.225
            Source: unknownTCP traffic detected without corresponding DNS query: 172.104.233.225
            Source: unknownTCP traffic detected without corresponding DNS query: 172.104.233.225
            Source: unknownTCP traffic detected without corresponding DNS query: 213.189.36.51
            Source: unknownTCP traffic detected without corresponding DNS query: 213.189.36.51
            Source: unknownTCP traffic detected without corresponding DNS query: 213.189.36.51
            Source: unknownTCP traffic detected without corresponding DNS query: 85.234.143.94
            Source: unknownTCP traffic detected without corresponding DNS query: 85.234.143.94
            Source: unknownTCP traffic detected without corresponding DNS query: 85.234.143.94
            Source: unknownTCP traffic detected without corresponding DNS query: 119.59.124.163
            Source: unknownTCP traffic detected without corresponding DNS query: 119.59.124.163
            Source: unknownTCP traffic detected without corresponding DNS query: 119.59.124.163
            Source: unknownTCP traffic detected without corresponding DNS query: 190.146.131.105
            Source: unknownTCP traffic detected without corresponding DNS query: 190.146.131.105
            Source: unknownTCP traffic detected without corresponding DNS query: 190.146.131.105
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbs
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbs$
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsI
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsT
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://119.59.124.163:8080/7gWpLeeuBCj
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://119.59.124.163:8080/7gWpLeeuBCjW
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://172.104.233.225:8080/coIxQuMWPxi
            Source: corsangle.exe, 00000004.00000002.454210782.0000000000199000.00000004.00000001.sdmp, corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105/K1dG1qa5hXkSLaRnHQw
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105/K1dG1qa5hXkSLaRnHQww
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw80/7gWpLeeuBCj
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQws
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw~
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://213.189.36.51/u0gALfm0zDZMJ
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://213.189.36.51:8080/u0gALfm0zDZMJ
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://213.189.36.51:8080/u0gALfm0zDZMJ4
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://213.189.36.51:8080/u0gALfm0zDZMJW
            Source: corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpString found in binary or memory: http://213.189.36.51:8080/u0gALfm0zDZMJm32
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://85.234.143.94:8080/hroFtzD6dRMJ
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://85.234.143.94:8080/hroFtzD6dRMJ4
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://85.234.143.94:8080/hroFtzD6dRh
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpString found in binary or memory: http://85.234.143.94:8080/hroFtzD6dRxi
            Source: svchost.exe, 00000009.00000002.459340968.0000026126C16000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: svchost.exe, 00000009.00000002.459340968.0000026126C16000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: svchost.exe, 00000009.00000002.459340968.0000026126C16000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: svchost.exe, 00000009.00000002.455590105.000002612149F000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/0
            Source: svchost.exe, 00000009.00000002.459027918.0000026126B70000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
            Source: svchost.exe, 00000011.00000002.309158276.000002B714A13000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
            Source: svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
            Source: svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
            Source: svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
            Source: svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
            Source: svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
            Source: svchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
            Source: svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
            Source: svchost.exe, 00000011.00000002.309238217.000002B714A52000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
            Source: svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
            Source: svchost.exe, 00000011.00000003.308782224.000002B714A41000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
            Source: svchost.exe, 00000011.00000003.308782224.000002B714A41000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
            Source: svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
            Source: svchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
            Source: svchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
            Source: svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
            Source: svchost.exe, 00000011.00000002.309158276.000002B714A13000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
            Source: svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
            Source: svchost.exe, 00000011.00000002.309238217.000002B714A52000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_004267FF GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_004267FF GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

            E-Banking Fraud:

            barindex
            Detected Emotet e-Banking trojanShow sources
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222DE9C
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 4.2.corsangle.exe.70053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lK8vF3n2e7.exe.21e053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.corsangle.exe.e3053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lK8vF3n2e7.exe.57053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221F75 CryptAcquireContextW,CryptImportKey,LocalFree,CryptReleaseContext,

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
            Source: 4.2.corsangle.exe.70053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 3.2.corsangle.exe.e3053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet Author: ReversingLabs
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0040215A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0040215A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222E068 GetModuleFileNameW,lstrlenW,OpenServiceW,DeleteService,CloseServiceHandle,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221D2B CreateProcessAsUserW,CreateProcessW,
            Source: C:\Windows\SysWOW64\corsangle.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile deleted: C:\Windows\SysWOW64\corsangle.exe:Zone.IdentifierJump to behavior
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00401117
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0042787E
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00412BF0
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00414EDC
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0040EF2E
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00401117
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0042787E
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00412BF0
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00414EDC
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0040EF2E
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E30E8
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E30E4
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E28C1
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_022237A5
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_022237A9
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02222F82
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E330E4
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E330E8
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E328C1
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E537A5
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E537A9
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E52F82
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 004128A0 appears 334 times
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 00412BA4 appears 128 times
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 00416254 appears 50 times
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 00424E33 appears 62 times
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 00414843 appears 52 times
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: String function: 0042D179 appears 50 times
            Source: lK8vF3n2e7.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: lK8vF3n2e7.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: lK8vF3n2e7.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: lK8vF3n2e7.exe, 00000000.00000002.194191938.000000000045C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMSADODLG.EXE vs lK8vF3n2e7.exe
            Source: lK8vF3n2e7.exe, 00000002.00000002.232381898.000000000045C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMSADODLG.EXE vs lK8vF3n2e7.exe
            Source: lK8vF3n2e7.exe, 00000002.00000002.235071054.0000000003110000.00000002.00000001.sdmpBinary or memory string: originalfilename vs lK8vF3n2e7.exe
            Source: lK8vF3n2e7.exe, 00000002.00000002.235071054.0000000003110000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs lK8vF3n2e7.exe
            Source: lK8vF3n2e7.exe, 00000002.00000002.234823605.0000000003010000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs lK8vF3n2e7.exe
            Source: lK8vF3n2e7.exeBinary or memory string: OriginalFilenameMSADODLG.EXE vs lK8vF3n2e7.exe
            Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
            Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
            Source: lK8vF3n2e7.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 4.2.corsangle.exe.70053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 4.2.corsangle.exe.70053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 3.2.corsangle.exe.e3053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 3.2.corsangle.exe.e3053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Emotet_Jan20_1 date = 2020-01-29, hash1 = e7c22ccdb1103ee6bd15c528270f56913bb2f47345b360802b74084563f1b73d, author = Florian Roth, description = Detects Emotet malware, reference = https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
            Source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Trojan_Emotet tc_detection_name = Emotet, author = ReversingLabs, tc_detection_factor = , tc_detection_type = Trojan
            Source: classification engineClassification label: mal96.bank.troj.evad.winEXE@20/10@0/8
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221943 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_004070AE CoCreateInstance,OleRun,CoCreateInstance,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00428065 FindResourceA,LoadResource,LockResource,FreeResource,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222E138 OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3892:120:WilError_01
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\I8B93DEAF
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\M8B93DEAF
            Source: lK8vF3n2e7.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: lK8vF3n2e7.exeVirustotal: Detection: 71%
            Source: lK8vF3n2e7.exeReversingLabs: Detection: 90%
            Source: lK8vF3n2e7.exeString found in binary or memory: E4aXdlyDax6W5yGUiK+zzQuWwVX3LQqecci4Bees2GBp2ZfSbW1N/xyzbDoL5kOQMKqS6lAS2/WhX9uuPN5/wbyYciuvEhs8ykVZDbTGjBH91qRxKvGQ5GYH3N9xEy/V2mEBZ62Z02jtwgYTBKhCC0h0lehcWwrv9Qjn2XVFR5GMc/+duWl4uL7VE3z/4aSrX3sdAXeY75/vn7/r/aDDHEJfkkMt1sZprUyeoJcSBqisgyi6dXzPHz5Ec9N7ohNSzkTK
            Source: lK8vF3n2e7.exeString found in binary or memory: E4aXdlyDax6W5yGUiK+zzQuWwVX3LQqecci4Bees2GBp2ZfSbW1N/xyzbDoL5kOQMKqS6lAS2/WhX9uuPN5/wbyYciuvEhs8ykVZDbTGjBH91qRxKvGQ5GYH3N9xEy/V2mEBZ62Z02jtwgYTBKhCC0h0lehcWwrv9Qjn2XVFR5GMc/+duWl4uL7VE3z/4aSrX3sdAXeY75/vn7/r/aDDHEJfkkMt1sZprUyeoJcSBqisgyi6dXzPHz5Ec9N7ohNSzkTK
            Source: lK8vF3n2e7.exeString found in binary or memory: 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
            Source: C:\Windows\SysWOW64\corsangle.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcess
            Source: unknownProcess created: C:\Users\user\Desktop\lK8vF3n2e7.exe 'C:\Users\user\Desktop\lK8vF3n2e7.exe'
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess created: C:\Users\user\Desktop\lK8vF3n2e7.exe --b0af2bca
            Source: unknownProcess created: C:\Windows\SysWOW64\corsangle.exe C:\Windows\SysWOW64\corsangle.exe
            Source: C:\Windows\SysWOW64\corsangle.exeProcess created: C:\Windows\SysWOW64\corsangle.exe --2e5419fc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
            Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess created: C:\Users\user\Desktop\lK8vF3n2e7.exe --b0af2bca
            Source: C:\Windows\SysWOW64\corsangle.exeProcess created: C:\Windows\SysWOW64\corsangle.exe --2e5419fc
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00401784 LoadLibraryW,GetProcAddress,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00412260 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00412260 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_004128A0 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00412BDF push ecx; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00412260 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00412260 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_004128A0 push eax; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00412BDF push ecx; ret
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFAD3 push edx; iretd
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFAF1 push edx; retf
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFB1A push edx; retf
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFB0F push edx; retf
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFB77 push edx; iretd
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFD52 push edx; iretd
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EFD71 push edx; retf
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FAF1 push edx; retf
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FAD3 push edx; iretd
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FD71 push edx; retf
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FB77 push edx; iretd
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FD52 push edx; iretd
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FB0F push edx; retf
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E3FB1A push edx; retf

            Persistence and Installation Behavior:

            barindex
            Drops executables to the windows directory (C:\Windows) and starts themShow sources
            Source: C:\Windows\SysWOW64\corsangle.exeExecutable created and started: C:\Windows\SysWOW64\corsangle.exe
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exePE file moved: C:\Windows\SysWOW64\corsangle.exeJump to behavior
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0222E138 OpenSCManagerW,_snwprintf,CreateServiceW,OpenServiceW,ChangeServiceConfig2W,StartServiceW,CloseServiceHandle,CloseServiceHandle,

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile opened: C:\Windows\SysWOW64\corsangle.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0040921B IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0040658E IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0040921B IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_0040658E IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Found evasive API chain (may stop execution after checking mutex)Show sources
            Source: C:\Windows\SysWOW64\corsangle.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,GetTickCount,OpenServiceW,QueryServiceConfig2W,GetLastError,QueryServiceConfig2W,CloseServiceHandle,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeAPI coverage: 3.7 %
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeAPI coverage: 7.3 %
            Source: C:\Windows\SysWOW64\corsangle.exeAPI coverage: 9.2 %
            Source: C:\Windows\System32\svchost.exe TID: 5628Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_004290C4 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_004290C4 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00412ABE VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW8
            Source: lK8vF3n2e7.exeBinary or memory string: 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
            Source: svchost.exe, 00000001.00000002.196850072.0000029294540000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.262909344.000001B354940000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.288780129.00000244C3AC0000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.458125183.000001B859D90000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: corsangle.exe, 00000004.00000003.237988000.00000000012BC000.00000004.00000001.sdmpBinary or memory string: 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
            Source: svchost.exe, 00000009.00000002.459529652.0000026126C61000.00000004.00000001.sdmpBinary or memory string: @Hyper-V RAW
            Source: lK8vF3n2e7.exeBinary or memory string: I8oKGytdP622n9WmGxbgmPhIfDzm3srNwnaDwLHaPuaIqKpKHJ+haXU4Lc/uxCygu3VYhfJXxbxfrqdeVt4kZAyaSSnVvXW0zfVXghGFS0LXjfmFDY7skNksCX66umEr8XOIxu8DVf/SLy0Y+CoBz14kYiA8CK3s/p/RPI/LVlsM47LNREhppES52ibX8zLNfqvGlsGDuvFvpXwN8FkJRxlJhksfuNqWAaun7Qgh0yyvLtn88xpWIzGLITTamiabjmuL
            Source: lK8vF3n2e7.exeBinary or memory string: Ssqj+A77eGYtJq8ICEcGHdOAF8zZ/g+lz66vQgUol6twX/hZSXEQhn/P2i+iLwrXI+afbu5s41pTPUk/zpU2fSBxplNRL7EdT8M9SolAnFpa4BtbPcZKxQhxc3BpZiUhXY8wowA3xHMp7vT/hdkN8ybdR5SQ7TZ431qX+GG7n/xLXAcYfozyvRb6gE7S04VNvLKch31pEJrlB1uo7dcrNPIQmxejicPSa7MiCCNtjFQU3W7j3GhgfSrD45h9wj+TNfkZ
            Source: lK8vF3n2e7.exeBinary or memory string: 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
            Source: corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmp, svchost.exe, 00000009.00000002.455342615.0000026121429000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
            Source: svchost.exe, 0000000D.00000002.455110546.000001E07A202000.00000004.00000001.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
            Source: lK8vF3n2e7.exe, 00000000.00000003.190971964.000000000235C000.00000004.00000001.sdmpBinary or memory string: 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
            Source: lK8vF3n2e7.exe, 00000000.00000003.190971964.000000000235C000.00000004.00000001.sdmp, lK8vF3n2e7.exe, 00000002.00000003.200863845.000000000237C000.00000004.00000001.sdmp, corsangle.exe, 00000003.00000003.225948136.000000000129C000.00000004.00000001.sdmp, corsangle.exe, 00000004.00000003.237988000.00000000012BC000.00000004.00000001.sdmpBinary or memory string: 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
            Source: svchost.exe, 00000001.00000002.196850072.0000029294540000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.262909344.000001B354940000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.288780129.00000244C3AC0000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.458125183.000001B859D90000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: svchost.exe, 00000001.00000002.196850072.0000029294540000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.262909344.000001B354940000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.288780129.00000244C3AC0000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.458125183.000001B859D90000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: svchost.exe, 0000000D.00000002.455406725.000001E07A23E000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.455121527.00000242A942A000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: svchost.exe, 00000001.00000002.196850072.0000029294540000.00000002.00000001.sdmp, svchost.exe, 00000007.00000002.262909344.000001B354940000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.288780129.00000244C3AC0000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.458125183.000001B859D90000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\corsangle.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\corsangle.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00401784 LoadLibraryW,GetProcAddress,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00401693 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00401693 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E1743 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E0467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021E0C0C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_022212CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_02221E04 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E30467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E30C0C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E31743 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E512CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\corsangle.exeCode function: 3_2_00E51E04 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_022214F2 GetProcessHeap,RtlAllocateHeap,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00416EBA SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00416ECE SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00416EBA SetUnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_00416ECE SetUnhandledExceptionFilter,
            Source: svchost.exe, 0000000F.00000002.455972537.000002466C660000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: svchost.exe, 0000000F.00000002.455972537.000002466C660000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: svchost.exe, 0000000F.00000002.455972537.000002466C660000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: svchost.exe, 0000000F.00000002.455972537.000002466C660000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 2_2_021EE1F7 cpuid
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,_strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,_TranslateName,_TranslateName,IsValidCodePage,IsValidLocale,_strcat,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,_strncpy,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,_strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,_TranslateName,_TranslateName,IsValidCodePage,IsValidLocale,_strcat,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: _strlen,EnumSystemLocalesA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoA,_strncpy,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\corsangle.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00418520 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_0041A554 __lock,_strlen,_strcat,_strncpy,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,_strncpy,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeCode function: 0_2_00409088 GetVersionExA,
            Source: C:\Users\user\Desktop\lK8vF3n2e7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Lowering of HIPS / PFW / Operating System Security Settings:

            barindex
            Changes security center settings (notifications, updates, antivirus, firewall)Show sources
            Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
            Source: svchost.exe, 00000013.00000002.455118908.000001E666C3D000.00000004.00000001.sdmpBinary or memory string: "@\REGISTRY\USER\S-1-5-19ws Defender\MsMpeng.exe
            Source: svchost.exe, 00000013.00000002.455313869.000001E666D02000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 4.2.corsangle.exe.70053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.corsangle.exe.e3053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lK8vF3n2e7.exe.21e053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.corsangle.exe.e3053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lK8vF3n2e7.exe.57053f.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.corsangle.exe.70053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lK8vF3n2e7.exe.21e053f.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lK8vF3n2e7.exe.57053f.1.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1Windows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
            Default AccountsNative API111Valid Accounts1Valid Accounts1Deobfuscate/Decode Files or Information1LSASS MemorySystem Service Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsCommand and Scripting Interpreter3Windows Service12Access Token Manipulation1Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsService Execution12Logon Script (Mac)Windows Service12Software Packing1NTDSSystem Information Discovery46Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptProcess Injection2DLL Side-Loading1LSA SecretsSecurity Software Discovery51SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonFile Deletion1Cached Domain CredentialsVirtualization/Sandbox Evasion3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading121DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobValid Accounts1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Virtualization/Sandbox Evasion3Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronProcess Injection2Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
            Compromise Software Supply ChainUnix ShellLaunchdLaunchdHidden Files and Directories1KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            lK8vF3n2e7.exe71%VirustotalBrowse
            lK8vF3n2e7.exe90%ReversingLabsWin32.Trojan.Emotet
            lK8vF3n2e7.exe100%AviraTR/AD.Emotet.dzjt

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.0.lK8vF3n2e7.exe.400000.0.unpack100%AviraTR/AD.Emotet.dzjtDownload File
            4.2.corsangle.exe.70053f.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.lK8vF3n2e7.exe.400000.0.unpack100%AviraHEUR/AGEN.1124047Download File
            2.2.lK8vF3n2e7.exe.400000.0.unpack100%AviraHEUR/AGEN.1124047Download File
            2.2.lK8vF3n2e7.exe.21e053f.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.lK8vF3n2e7.exe.57053f.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            3.2.corsangle.exe.e3053f.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            3.2.corsangle.exe.400000.0.unpack100%AviraHEUR/AGEN.1124047Download File
            4.2.corsangle.exe.400000.0.unpack100%AviraHEUR/AGEN.1124047Download File
            2.0.lK8vF3n2e7.exe.400000.0.unpack100%AviraTR/AD.Emotet.dzjtDownload File
            3.0.corsangle.exe.400000.0.unpack100%AviraTR/AD.Emotet.dzjtDownload File
            4.0.corsangle.exe.400000.0.unpack100%AviraTR/AD.Emotet.dzjtDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw0%Avira URL Cloudsafe
            http://213.189.36.51:8080/u0gALfm0zDZMJm320%Avira URL Cloudsafe
            http://85.234.143.94:8080/hroFtzD6dRMJ40%Avira URL Cloudsafe
            http://85.234.143.94:8080/hroFtzD6dRxi0%Avira URL Cloudsafe
            http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbs$0%Avira URL Cloudsafe
            http://213.189.36.51:8080/u0gALfm0zDZMJW0%Avira URL Cloudsafe
            http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw~0%Avira URL Cloudsafe
            http://213.189.36.51:8080/u0gALfm0zDZMJ0%Avira URL Cloudsafe
            http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQws0%Avira URL Cloudsafe
            http://85.234.143.94:8080/hroFtzD6dRh0%Avira URL Cloudsafe
            http://119.59.124.163:8080/7gWpLeeuBCj0%Avira URL Cloudsafe
            http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbs0%Avira URL Cloudsafe
            http://172.104.233.225:8080/coIxQuMWPxi0%Avira URL Cloudsafe
            http://213.189.36.51/u0gALfm0zDZMJ0%Avira URL Cloudsafe
            http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsT0%Avira URL Cloudsafe
            http://119.59.124.163:8080/7gWpLeeuBCjW0%Avira URL Cloudsafe
            http://190.146.131.105/K1dG1qa5hXkSLaRnHQw0%Avira URL Cloudsafe
            https://%s.xboxlive.com0%URL Reputationsafe
            https://%s.xboxlive.com0%URL Reputationsafe
            https://%s.xboxlive.com0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            https://dynamic.t0%URL Reputationsafe
            http://190.146.131.105/K1dG1qa5hXkSLaRnHQww0%Avira URL Cloudsafe
            http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw80/7gWpLeeuBCj0%Avira URL Cloudsafe
            http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsI0%Avira URL Cloudsafe
            http://85.234.143.94:8080/hroFtzD6dRMJ0%Avira URL Cloudsafe
            http://213.189.36.51:8080/u0gALfm0zDZMJ40%Avira URL Cloudsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe
            https://%s.dnet.xboxlive.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpfalse
              high
              https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                high
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpfalse
                  high
                  http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQwcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000011.00000002.309238217.000002B714A52000.00000004.00000001.sdmpfalse
                    high
                    http://213.189.36.51:8080/u0gALfm0zDZMJm32corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                      high
                      https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000011.00000003.308782224.000002B714A41000.00000004.00000001.sdmpfalse
                        high
                        http://85.234.143.94:8080/hroFtzD6dRMJ4corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://85.234.143.94:8080/hroFtzD6dRxicorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbs$corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                          high
                          https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpfalse
                            high
                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpfalse
                              high
                              http://213.189.36.51:8080/u0gALfm0zDZMJWcorsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw~corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000011.00000003.308782224.000002B714A41000.00000004.00000001.sdmpfalse
                                high
                                http://213.189.36.51:8080/u0gALfm0zDZMJcorsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQwscorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://85.234.143.94:8080/hroFtzD6dRhcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://119.59.124.163:8080/7gWpLeeuBCjcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://appexmapsappupdate.blob.core.windows.netsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                                  high
                                  http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbscorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://172.104.233.225:8080/coIxQuMWPxicorsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://213.189.36.51/u0gALfm0zDZMJcorsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.bingmapsportal.comsvchost.exe, 00000011.00000002.309158276.000002B714A13000.00000004.00000001.sdmpfalse
                                    high
                                    https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpfalse
                                      high
                                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpfalse
                                            high
                                            http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsTcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpfalse
                                              high
                                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.308754094.000002B714A40000.00000004.00000001.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2004/0svchost.exe, 00000009.00000002.455590105.000002612149F000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000011.00000002.309158276.000002B714A13000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.309206913.000002B714A3D000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://119.59.124.163:8080/7gWpLeeuBCjWcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://190.146.131.105/K1dG1qa5hXkSLaRnHQwcorsangle.exe, 00000004.00000002.454210782.0000000000199000.00000004.00000001.sdmp, corsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://%s.xboxlive.comsvchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    low
                                                    https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000011.00000002.309238217.000002B714A52000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.svchost.exe, 00000009.00000002.459027918.0000026126B70000.00000002.00000001.sdmpfalse
                                                                high
                                                                https://dynamic.tsvchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000011.00000003.286829183.000002B714A31000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://190.146.131.105/K1dG1qa5hXkSLaRnHQwwcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://190.146.131.105:8080/K1dG1qa5hXkSLaRnHQw80/7gWpLeeuBCjcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://104.236.137.72:8080/NuFfY0fKFWZKA4NUbsIcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000011.00000002.309251737.000002B714A5C000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://85.234.143.94:8080/hroFtzD6dRMJcorsangle.exe, 00000004.00000002.456309381.00000000007B9000.00000004.00000020.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://activity.windows.comsvchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000011.00000003.308702175.000002B714A60000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          http://213.189.36.51:8080/u0gALfm0zDZMJ4corsangle.exe, 00000004.00000003.359738057.00000000007E3000.00000004.00000001.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://%s.dnet.xboxlive.comsvchost.exe, 0000000E.00000002.455681474.000001B859242000.00000004.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          • URL Reputation: safe
                                                                          • URL Reputation: safe
                                                                          low
                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000011.00000003.308726736.000002B714A49000.00000004.00000001.sdmpfalse
                                                                            high

                                                                            Contacted IPs

                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs

                                                                            Public

                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            190.146.131.105
                                                                            unknownColombia
                                                                            10620TelmexColombiaSACOfalse
                                                                            85.234.143.94
                                                                            unknownUnited Kingdom
                                                                            29550SIMPLYTRANSITGBfalse
                                                                            119.59.124.163
                                                                            unknownThailand
                                                                            56067METRABYTE-TH453LadplacoutJorakhaebuaTHfalse
                                                                            104.236.137.72
                                                                            unknownUnited States
                                                                            14061DIGITALOCEAN-ASNUSfalse
                                                                            172.104.233.225
                                                                            unknownUnited States
                                                                            63949LINODE-APLinodeLLCUSfalse
                                                                            213.189.36.51
                                                                            unknownPoland
                                                                            15694ATMAN-ISP-ASATMSAPLfalse

                                                                            Private

                                                                            IP
                                                                            192.168.2.1
                                                                            127.0.0.1

                                                                            General Information

                                                                            Joe Sandbox Version:31.0.0 Emerald
                                                                            Analysis ID:383022
                                                                            Start date:07.04.2021
                                                                            Start time:06:49:03
                                                                            Joe Sandbox Product:CloudBasic
                                                                            Overall analysis duration:0h 9m 19s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:light
                                                                            Sample file name:lK8vF3n2e7.exe
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                            Number of analysed new started processes analysed:30
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • HDC enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal96.bank.troj.evad.winEXE@20/10@0/8
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HDC Information:
                                                                            • Successful, ratio: 92.9% (good quality ratio 89.4%)
                                                                            • Quality average: 82.9%
                                                                            • Quality standard deviation: 25.8%
                                                                            HCA Information:
                                                                            • Successful, ratio: 70%
                                                                            • Number of executed functions: 0
                                                                            • Number of non-executed functions: 0
                                                                            Cookbook Comments:
                                                                            • Adjust boot time
                                                                            • Enable AMSI
                                                                            • Found application associated with file extension: .exe
                                                                            Warnings:
                                                                            Show All
                                                                            • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, UsoClient.exe
                                                                            • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.43.139.144, 20.50.102.62, 52.255.188.83, 23.54.113.104, 23.10.249.26, 23.10.249.43, 13.64.90.137, 20.54.26.129, 20.82.209.183
                                                                            • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.

                                                                            Simulations

                                                                            Behavior and APIs

                                                                            TimeTypeDescription
                                                                            06:50:17API Interceptor2x Sleep call for process: svchost.exe modified
                                                                            06:51:32API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                            Joe Sandbox View / Context

                                                                            IPs

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            85.234.143.94http://www.rcmf.co.ukGet hashmaliciousBrowse
                                                                            • www.rcmf.co.uk/4um/cron.php?ts=1599132255
                                                                            119.59.124.163emotet_36.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet_36.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Vos-factures-impayees.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Vos-factures-impayees.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet_11.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet_11.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.exeGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.exeGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            emotet.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            RechnungRechnung.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            RechnungRechnung.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Corrections.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Corrections.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Plumb_Masters_Inc.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/
                                                                            Plumb_Masters_Inc.docGet hashmaliciousBrowse
                                                                            • 119.59.124.163:4143/

                                                                            Domains

                                                                            No context

                                                                            ASN

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            TelmexColombiaSACO1.shGet hashmaliciousBrowse
                                                                            • 190.157.182.219
                                                                            A8853453.exeGet hashmaliciousBrowse
                                                                            • 181.58.152.36
                                                                            bG9Yg328jP.exeGet hashmaliciousBrowse
                                                                            • 181.52.108.177
                                                                            EKXZTGOAZ7.exeGet hashmaliciousBrowse
                                                                            • 181.58.152.36
                                                                            2ZvJay1Y4x.exeGet hashmaliciousBrowse
                                                                            • 181.58.152.36
                                                                            MV9tCJw8Xr.exeGet hashmaliciousBrowse
                                                                            • 190.144.18.198
                                                                            descargar el archivo adjunto para visualizar las #U00f3rdenes de comparendo de dicha ciudad.exeGet hashmaliciousBrowse
                                                                            • 181.52.108.177
                                                                            f6TW7Ob4aY.dllGet hashmaliciousBrowse
                                                                            • 181.48.190.78
                                                                            #U10e1#U10d0#U10e4#U10e0#U10d0#U10dc#U10d2#U10d4#U10d7#U10d8.exeGet hashmaliciousBrowse
                                                                            • 190.144.89.82
                                                                            Arch_05_222-3139.docGet hashmaliciousBrowse
                                                                            • 186.147.237.3
                                                                            MENSAJE 2021.docGet hashmaliciousBrowse
                                                                            • 186.147.237.3
                                                                            Documento_0501_012021.docGet hashmaliciousBrowse
                                                                            • 186.147.237.3
                                                                            Datos_019_9251.docGet hashmaliciousBrowse
                                                                            • 186.147.237.3
                                                                            Mensaje K-158701.docGet hashmaliciousBrowse
                                                                            • 186.147.237.3
                                                                            Mozi.mGet hashmaliciousBrowse
                                                                            • 186.85.54.171
                                                                            7mB0FoVcSn.exeGet hashmaliciousBrowse
                                                                            • 190.85.206.228
                                                                            VOWhmy4Q0q.exeGet hashmaliciousBrowse
                                                                            • 181.52.113.7
                                                                            xJbFpiVs1lGet hashmaliciousBrowse
                                                                            • 181.51.98.126
                                                                            MULTA 5874614910 VIOLACION A LAS NORMAS SANITARIAS.exeGet hashmaliciousBrowse
                                                                            • 181.48.139.42
                                                                            I4M07KTPqQ.exeGet hashmaliciousBrowse
                                                                            • 190.85.46.52
                                                                            METRABYTE-TH453LadplacoutJorakhaebuaTHZGNbR8E726.exeGet hashmaliciousBrowse
                                                                            • 119.59.120.8
                                                                            PO032321.exeGet hashmaliciousBrowse
                                                                            • 119.59.96.105
                                                                            payment proof.xlsxGet hashmaliciousBrowse
                                                                            • 119.59.120.8
                                                                            2ojdmC51As.exeGet hashmaliciousBrowse
                                                                            • 119.59.116.21
                                                                            NEW PURCHASE030421.exeGet hashmaliciousBrowse
                                                                            • 119.59.96.105
                                                                            IU-8549 Medical report COVID-19.docGet hashmaliciousBrowse
                                                                            • 119.59.116.21
                                                                            HUNL5V-011220.docGet hashmaliciousBrowse
                                                                            • 119.59.116.174
                                                                            RFQ-1225 BE285-20-B-1-SMcS - Easi-Clip Project.exeGet hashmaliciousBrowse
                                                                            • 119.59.120.8
                                                                            IKT7vWaI2V.exeGet hashmaliciousBrowse
                                                                            • 119.59.120.8
                                                                            KP5ESTzrF8.exeGet hashmaliciousBrowse
                                                                            • 119.59.120.8
                                                                            https://dusitserve.com/gethits/o3A/Get hashmaliciousBrowse
                                                                            • 119.59.125.211
                                                                            http://danngoschool.net/modules/infodata.php?r=bD1odHRwczovL3VzcHNzZXJ2aWNlcy5zZWNseXNldGV0dXIudGs=Get hashmaliciousBrowse
                                                                            • 119.59.125.245
                                                                            am466VjPsQ.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            dDRELyqiAv.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            uNT7DNjADG.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            drShXqqDnG.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            bTdtMozsr7.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            tFkAGsKsL2.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            2skSjKc71E.docGet hashmaliciousBrowse
                                                                            • 119.59.121.95
                                                                            SIMPLYTRANSITGBpkmo.exeGet hashmaliciousBrowse
                                                                            • 94.76.218.18
                                                                            tS9P6wPz9x.exeGet hashmaliciousBrowse
                                                                            • 85.234.145.174
                                                                            ransomware.exeGet hashmaliciousBrowse
                                                                            • 85.234.145.174
                                                                            ransomware.exeGet hashmaliciousBrowse
                                                                            • 85.234.145.174
                                                                            New Purchase Order NoI-701-PDF.exeGet hashmaliciousBrowse
                                                                            • 151.236.56.175
                                                                            rib.exeGet hashmaliciousBrowse
                                                                            • 185.17.252.199
                                                                            malware1.exeGet hashmaliciousBrowse
                                                                            • 94.76.218.18
                                                                            vrhiyc.exeGet hashmaliciousBrowse
                                                                            • 92.48.84.109
                                                                            ucrcdh.exeGet hashmaliciousBrowse
                                                                            • 92.48.84.109
                                                                            lrbwh.exeGet hashmaliciousBrowse
                                                                            • 92.48.84.109
                                                                            http://www.spginecologia.pt/Get hashmaliciousBrowse
                                                                            • 213.229.91.13
                                                                            https://fax-dfc26d.webflow.io/Get hashmaliciousBrowse
                                                                            • 213.229.66.214
                                                                            zG8cVHvxat.exeGet hashmaliciousBrowse
                                                                            • 94.76.218.18
                                                                            IwYu6X7Hv0.exeGet hashmaliciousBrowse
                                                                            • 85.234.143.94
                                                                            http://www.cnctrainingcentre.comGet hashmaliciousBrowse
                                                                            • 185.17.252.200
                                                                            https://owaadimss.000webhostapp.com/Service-dassistance-informatique.htmGet hashmaliciousBrowse
                                                                            • 213.229.74.253
                                                                            http://read.emailr.com/click.aspx?uid=928c4914-4761-4ea1-9446-52176f395940&fw=https%3A%2F%2Fpiantumazioneselvaggia.it%2Fwp-content%2FAp3dX.html#daniel.keelan@windstream.comGet hashmaliciousBrowse
                                                                            • 151.236.34.168
                                                                            http://www.rcmf.co.ukGet hashmaliciousBrowse
                                                                            • 85.234.143.94
                                                                            _093924.exeGet hashmaliciousBrowse
                                                                            • 94.76.247.61
                                                                            _093926.exeGet hashmaliciousBrowse
                                                                            • 94.76.247.61

                                                                            JA3 Fingerprints

                                                                            No context

                                                                            Dropped Files

                                                                            No context

                                                                            Created / dropped Files

                                                                            C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\1942f959aae25ff5e177f0a0e912022f_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                                                                            Process:C:\Windows\SysWOW64\corsangle.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):57
                                                                            Entropy (8bit):2.062967662624547
                                                                            Encrypted:false
                                                                            SSDEEP:3:/lEltfgnwT:yvT
                                                                            MD5:B5D2B9D74D52DAC47A3F3CB1D065305F
                                                                            SHA1:41A4742BC23F3A6FF61C60884604DA6448FFF274
                                                                            SHA-256:6359A4FCB0DABE70B88913A6A03CC21385459B8A924A6B3688A2E185C54DAAFA
                                                                            SHA-512:01EA77C5972D33494C10D6ADB47CB3F30EAC1AA4B93D6BAAFB75299AA99FED818A6275801BAAE92C18AC5D3C64443BB631A63C2B39B1B88BCD774218BB2B990F
                                                                            Malicious:false
                                                                            Preview: ........................................computer$.
                                                                            C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):4096
                                                                            Entropy (8bit):0.5995382577512959
                                                                            Encrypted:false
                                                                            SSDEEP:6:baPMk1GaD0JOCEfMuaaD0JOCEfMKQmDWpr+1Al/gz2cE0fMbhEZolrRSQ2hyYIIT:bGGaD0JcaaD0JwQQo6Ag/0bjSQJ
                                                                            MD5:EE33D31FF892664207CCEE077BC0DA79
                                                                            SHA1:76344E225B25AA8FE2584E88573AC064F16ED9A0
                                                                            SHA-256:42847F4E3B3FAD67FF583317573DADB548FCD5BDDDABF52BA48C055B4808CA60
                                                                            SHA-512:9ABFDF71D25B1A0F89C3DC83ACE301723D4204297A30313667E1E2D96CC59283EA43FE1B949D53A54E4DD57ACCB6EA0D4A134620E242504B1CB6E853D870BD81
                                                                            Malicious:false
                                                                            Preview: ....E..h..(......2...y{.............. ..1C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................2...y{...........&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G............................................................................................................................................................................................................
                                                                            C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0xed946bec, page size 16384, DirtyShutdown, Windows version 10.0
                                                                            Category:dropped
                                                                            Size (bytes):32768
                                                                            Entropy (8bit):0.09633512358928906
                                                                            Encrypted:false
                                                                            SSDEEP:12:MV0+w1O4blvctVuvUKqV0+w1O4blvctVuvUK:M2Wgi2Wg
                                                                            MD5:72C62EED75E947FD4F5C02C8754C617F
                                                                            SHA1:3A219E17B34703056103C80AE4DF358CB9FD901F
                                                                            SHA-256:BFAFB13DB37CC356454D9D2FCA9C47D16B4B41A99B327FD7750AA25C320AEC90
                                                                            SHA-512:B6EF780DBEBDAE9C249D49A38A3E32CA6C0CA7789D025DBB54402CF36C80F9475E1FEB41E6A4C7033F2C9643422B8D6097156A741DEE070741E75D125FE391EA
                                                                            Malicious:false
                                                                            Preview: .k.... ................e.f.3...w........................&..........w...2...y..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w.........................................................................................................................................................................................................................................(.2...y.k.................AB}.2...y..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):8192
                                                                            Entropy (8bit):0.11227145912104357
                                                                            Encrypted:false
                                                                            SSDEEP:3:zW/l7Ev0XwxXl/bJdAtil0XofO/All:zGli0Et4Y0XofO/A
                                                                            MD5:299061F0C8B90EF6008852D1A202C96C
                                                                            SHA1:06FF5DEA569AAB763896569B61080DFAEB9A391C
                                                                            SHA-256:83C03C421693C7747E6B4BB7E26DFE7C7711B5B89759F9754769F5CAD1181795
                                                                            SHA-512:AB0A509CEBAB9369A63A0E0303608444ABC60F96091DE0011EE296B93A65F0956C8D58D1C06C523FBCF64787A666AC0138E74775E1B310420896245268064DDF
                                                                            Malicious:false
                                                                            Preview: ..4......................................3...w...2...y.......w...............w.......w....:O.....w...................AB}.2...y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):65536
                                                                            Entropy (8bit):0.10977056583082812
                                                                            Encrypted:false
                                                                            SSDEEP:12:26LVXm/Ey6q9995GjSq3qQ10nMCldimE8eawHjc59d:26L4l68uLyMCldzE9BHjc59d
                                                                            MD5:356ED824D17C6734D7692DEB0C729C6D
                                                                            SHA1:BEED0339DA6E4BE12FE5F660F699FE4DB84B9B46
                                                                            SHA-256:A1EBD349905CBCBB8FF3CE369627B426E504B2ED557FE9BF394781EF6361F6D6
                                                                            SHA-512:47BA2CBCD1F0FD13716FA186931A4B81DAAAEB79B9570A4F37AF326A42541F7B7F0153F32A9CAE6E57FA8B92CF82A996DF215D31A1112BC1A5DEA3A1E9D7E049
                                                                            Malicious:false
                                                                            Preview: ................................................................................(...t....Z.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................M.10..... .........+..........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.(...t....b......................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):65536
                                                                            Entropy (8bit):0.11234195729199309
                                                                            Encrypted:false
                                                                            SSDEEP:12:OXm/Ey6q9995Gjt1miM3qQ10nMCldimE8eawHza1miItY:bl68Q1tMLyMCldzE9BHza1tIS
                                                                            MD5:16F7720BEA0C5A0F5A1752B8987B6389
                                                                            SHA1:DDD97BD847C44ABF2EEE27CDB19480125E14CE9D
                                                                            SHA-256:BB22FE8174EAC43C8E3712AABB3387AA61221F9D289677C1D7E848C31FF30BFF
                                                                            SHA-512:4F754837AC5CAF17F52F6F942D9E6D4F86EEE965E7DB5F2E5B1C06E780F587AE5EFC685C1C9116AABD0A136F333430E147A220E1295B50526C4CBA23BB566A1D
                                                                            Malicious:false
                                                                            Preview: ................................................................................(...t....A.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................M.10..... ......e...+..........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P.(...t....d......................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):65536
                                                                            Entropy (8bit):0.1122591146794691
                                                                            Encrypted:false
                                                                            SSDEEP:12:EXm/Ey6q9995GjZkL1mK2P3qQ10nMCldimE8eawHza1mKyn:Nl68X1iPLyMCldzE9BHza1U
                                                                            MD5:92A832C33E993A27A4642B0CB90C9278
                                                                            SHA1:6CCE3DFD7A34E4054902A2A6759CDE3055F6D7F5
                                                                            SHA-256:EF5A296E6A22D5D7A829EA10D7F17BA4DC1543633C1F4786A89417B5A659106B
                                                                            SHA-512:C7459280897D1A6CA910DF865BAA8804FBB3262E6DF9FFBA6D6BD89081EE1BDAD6D8402C0422E5090799BB4385E0C18333E059317BD5073F20D74FB28A742F55
                                                                            Malicious:false
                                                                            Preview: ................................................................................(...t....\.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................M.10..... ......>...+..........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P.(...t...Rl......................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                                                                            Process:C:\Users\user\Desktop\lK8vF3n2e7.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):46
                                                                            Entropy (8bit):1.0424600748477153
                                                                            Encrypted:false
                                                                            SSDEEP:3:/lbON:u
                                                                            MD5:89CA7E02D8B79ED50986F098D5686EC9
                                                                            SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
                                                                            SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
                                                                            SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
                                                                            Malicious:false
                                                                            Preview: ........................................user.
                                                                            C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                                                            Process:C:\Windows\System32\svchost.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):55
                                                                            Entropy (8bit):4.306461250274409
                                                                            Encrypted:false
                                                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                            Malicious:false
                                                                            Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                            C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                            Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                            File Type:data
                                                                            Category:modified
                                                                            Size (bytes):906
                                                                            Entropy (8bit):3.1539991825586835
                                                                            Encrypted:false
                                                                            SSDEEP:12:58KRBubdpkoF1AG3rlsrfuKRk9+MlWlLehB4yAq7ejCEsrfuPO:OaqdmuF3rlp+kWReH4yJ7MNVO
                                                                            MD5:CE4B18BBA8B894A0D4C6EE141395DAC7
                                                                            SHA1:7B2C06A4E267DBCB28514DB6859A08BF8F7F2952
                                                                            SHA-256:0A5B1FDCB57000156122272E9F8514F8D2A6D691CEECABA3C9938820A44B4133
                                                                            SHA-512:261D967E11487B08B309282BA2E3697810E2A7A84F5D77D0BD03D5FD9211A37C7F030E068ED0CF7F6AEEBE3DA26CBFD403BC52BB15D12665E6A57A31CDD1686A
                                                                            Malicious:false
                                                                            Preview: ........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. W.e.d. .. A.p.r. .. 0.7. .. 2.0.2.1. .0.6.:.5.1.:.3.2.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. W.e.d. .. A.p.r. .. 0.7. .. 2.0.2.1. .0.6.:.5.1.:.3.3.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....

                                                                            Static File Info

                                                                            General

                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):6.555351362517709
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:lK8vF3n2e7.exe
                                                                            File size:397714
                                                                            MD5:d7cd602eb9e9ad8272d4ad0910815835
                                                                            SHA1:cefae0fd990a5491e893796ab8ab56fc9edc015b
                                                                            SHA256:bca575b21c8b02010cde26b2bd7b2e8cdc313f135f97363b34f8bf0f389a990b
                                                                            SHA512:2500a694e1690a9f4bd62f83a713a0e47892d12f81bafb49f079a43e7425b65bdc0f420da30cfb002e53c4d15dcb0cf977a59b4a8f343dfc0ddfed25478071d7
                                                                            SSDEEP:6144:7KIHCIcX4WScpdOQRFSFRxc0gmKMBISphOxkTtsHNnL4BjxAtI0pjfK89J:7xCTX4WrhFSF3c8KwJEL4BjCI0xz7
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../...Nh..Nh..Nh.CF7..Nh.:mq..Nh..F5..Nh.CF5..Nh..Ni..Lh..Bg..Nh..B7.WNh..oO..Nh..B..DNh.,E6..Nh..B2..Nh.Rich.Nh.........PE..L..

                                                                            File Icon

                                                                            Icon Hash:f88e693369ed86e8

                                                                            Static PE Info

                                                                            General

                                                                            Entrypoint:0x412d5e
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                            DLL Characteristics:
                                                                            Time Stamp:0x5DDEB77A [Wed Nov 27 17:50:50 2019 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:5259dc71126b302fc5049844cd581e18

                                                                            Entrypoint Preview

                                                                            Instruction
                                                                            push 00000060h
                                                                            push 0044BC68h
                                                                            call 00007FD634D635EFh
                                                                            mov edi, 00000094h
                                                                            mov eax, edi
                                                                            call 00007FD634D62C9Fh
                                                                            mov dword ptr [ebp-18h], esp
                                                                            mov esi, esp
                                                                            mov dword ptr [esi], edi
                                                                            push esi
                                                                            call dword ptr [004322A0h]
                                                                            mov ecx, dword ptr [esi+10h]
                                                                            mov dword ptr [0045A3F0h], ecx
                                                                            mov eax, dword ptr [esi+04h]
                                                                            mov dword ptr [0045A3FCh], eax
                                                                            mov edx, dword ptr [esi+08h]
                                                                            mov dword ptr [0045A400h], edx
                                                                            mov esi, dword ptr [esi+0Ch]
                                                                            and esi, 00007FFFh
                                                                            mov dword ptr [0045A3F4h], esi
                                                                            cmp ecx, 02h
                                                                            je 00007FD634D637BEh
                                                                            or esi, 00008000h
                                                                            mov dword ptr [0045A3F4h], esi
                                                                            shl eax, 08h
                                                                            add eax, edx
                                                                            mov dword ptr [0045A3F8h], eax
                                                                            xor esi, esi
                                                                            push esi
                                                                            mov edi, dword ptr [00432268h]
                                                                            call edi
                                                                            cmp word ptr [eax], 5A4Dh
                                                                            jne 00007FD634D637D1h
                                                                            mov ecx, dword ptr [eax+3Ch]
                                                                            add ecx, eax
                                                                            cmp dword ptr [ecx], 00004550h
                                                                            jne 00007FD634D637C4h
                                                                            movzx eax, word ptr [ecx+18h]
                                                                            cmp eax, 0000010Bh
                                                                            je 00007FD634D637D1h
                                                                            cmp eax, 0000020Bh
                                                                            je 00007FD634D637B7h
                                                                            mov dword ptr [ebp-1Ch], esi
                                                                            jmp 00007FD634D637D9h
                                                                            cmp dword ptr [ecx+00000084h], 0Eh
                                                                            jbe 00007FD634D637A4h
                                                                            xor eax, eax
                                                                            cmp dword ptr [ecx+000000F8h], esi
                                                                            jmp 00007FD634D637C0h
                                                                            cmp dword ptr [ecx+74h], 0Eh
                                                                            jbe 00007FD634D63794h
                                                                            xor eax, eax
                                                                            cmp dword ptr [ecx+000000E8h], esi
                                                                            setne al
                                                                            mov dword ptr [ebp-1Ch], eax

                                                                            Rich Headers

                                                                            Programming Language:
                                                                            • [RES] VS2003 (.NET) build 3077
                                                                            • [ASM] VS2003 (.NET) build 3077
                                                                            • [C++] VS2003 (.NET) build 3077
                                                                            • [ C ] VS2003 (.NET) build 3077
                                                                            • [LNK] VS2003 (.NET) build 3077

                                                                            Data Directories

                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x537a80xf0.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x7d80.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4e8680x48.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x320000x56c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x537200x40.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                            Sections

                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x308a80x31000False0.575145487883data6.56819222522IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x320000x2342c0x24000False0.605360243056data6.07417496341IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x560000x5e940x3000False0.257161458333data3.7389632599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x5c0000x7d800x8000False0.405975341797data4.87336804688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                            Resources

                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_CURSOR0x60f200x134dataEnglishUnited States
                                                                            RT_CURSOR0x610580xb4dataEnglishUnited States
                                                                            RT_CURSOR0x611380x134AmigaOS bitmap fontEnglishUnited States
                                                                            RT_CURSOR0x612880x134dataEnglishUnited States
                                                                            RT_CURSOR0x613d80x134dataEnglishUnited States
                                                                            RT_CURSOR0x615280x134dataEnglishUnited States
                                                                            RT_CURSOR0x616780x134dataEnglishUnited States
                                                                            RT_CURSOR0x617c80x134dataEnglishUnited States
                                                                            RT_CURSOR0x619180x134dataEnglishUnited States
                                                                            RT_CURSOR0x61a680x134dataEnglishUnited States
                                                                            RT_CURSOR0x61bb80x134dataEnglishUnited States
                                                                            RT_CURSOR0x61d080x134dataEnglishUnited States
                                                                            RT_CURSOR0x61e580x134AmigaOS bitmap fontEnglishUnited States
                                                                            RT_CURSOR0x61fa80x134dataEnglishUnited States
                                                                            RT_CURSOR0x620f80x134dataEnglishUnited States
                                                                            RT_CURSOR0x622480x134dataEnglishUnited States
                                                                            RT_BITMAP0x624800xb8dataEnglishUnited States
                                                                            RT_BITMAP0x625380x144dataEnglishUnited States
                                                                            RT_ICON0x5d5300x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2576456089, next used block 7374869ArabicSaudi Arabia
                                                                            RT_ICON0x5d8180x1e8dataArabicSaudi Arabia
                                                                            RT_ICON0x5da000x128GLS_BINARY_LSB_FIRSTArabicSaudi Arabia
                                                                            RT_ICON0x5db280x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 15985900, next used block 16771047ArabicSaudi Arabia
                                                                            RT_ICON0x5e3d00x6c8dataArabicSaudi Arabia
                                                                            RT_ICON0x5ea980x568GLS_BINARY_LSB_FIRSTArabicSaudi Arabia
                                                                            RT_ICON0x5f0000x10a8dataArabicSaudi Arabia
                                                                            RT_ICON0x600a80x988dataArabicSaudi Arabia
                                                                            RT_ICON0x60a300x468GLS_BINARY_LSB_FIRSTArabicSaudi Arabia
                                                                            RT_DIALOG0x5cbe00x5a2dataEnglishUnited States
                                                                            RT_DIALOG0x623980xe8dataEnglishUnited States
                                                                            RT_STRING0x626800x82dataEnglishUnited States
                                                                            RT_STRING0x627080x2adataEnglishUnited States
                                                                            RT_STRING0x627380x192dataEnglishUnited States
                                                                            RT_STRING0x628d00x4e2dataEnglishUnited States
                                                                            RT_STRING0x631480x31adataEnglishUnited States
                                                                            RT_STRING0x62e680x2dcdataEnglishUnited States
                                                                            RT_STRING0x63ca80x8adataEnglishUnited States
                                                                            RT_STRING0x62db80xacdataEnglishUnited States
                                                                            RT_STRING0x63b980xdedataEnglishUnited States
                                                                            RT_STRING0x634680x4c4dataEnglishUnited States
                                                                            RT_STRING0x639300x264dataEnglishUnited States
                                                                            RT_STRING0x63c780x2cdataEnglishUnited States
                                                                            RT_STRING0x63d380x42dataEnglishUnited States
                                                                            RT_GROUP_CURSOR0x611100x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                                                                            RT_GROUP_CURSOR0x619000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x612700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x617b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x616600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x61f900x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x615100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x61ba00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x613c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x61a500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x61cf00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x61e400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x620e00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x622300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_CURSOR0x623800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                                            RT_GROUP_ICON0x60e980x84dataArabicSaudi Arabia
                                                                            RT_VERSION0x5d1880x3a4dataEnglishUnited States

                                                                            Imports

                                                                            DLLImport
                                                                            KERNEL32.dllVirtualQuery, GetStartupInfoA, GetCommandLineA, ExitProcess, TerminateProcess, HeapReAlloc, HeapSize, HeapDestroy, HeapCreate, VirtualFree, IsBadWritePtr, LCMapStringA, LCMapStringW, SetUnhandledExceptionFilter, GetStdHandle, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetSystemInfo, SetHandleCount, GetFileType, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetStringTypeA, GetStringTypeW, GetTimeZoneInformation, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, IsValidCodePage, IsBadReadPtr, IsBadCodePtr, SetStdHandle, GetLocaleInfoW, SetEnvironmentVariableA, GetProcAddress, VirtualAlloc, VirtualProtect, HeapFree, RtlUnwind, HeapAlloc, GetTickCount, GetFileTime, GetFileAttributesA, FileTimeToLocalFileTime, SetErrorMode, FileTimeToSystemTime, GetOEMCP, GetCPInfo, CreateFileA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, TlsGetValue, EnterCriticalSection, GlobalHandle, GlobalReAlloc, LeaveCriticalSection, LocalAlloc, DeleteCriticalSection, InitializeCriticalSection, RaiseException, GlobalFlags, InterlockedIncrement, WritePrivateProfileStringA, GlobalGetAtomNameA, GlobalFindAtomA, lstrcatA, lstrcmpW, SetLastError, MulDiv, FormatMessageA, lstrcpynA, LocalFree, GlobalUnlock, GlobalFree, FreeResource, CloseHandle, GlobalAddAtomA, FindResourceA, LoadResource, LockResource, SizeofResource, GetCurrentThread, GetCurrentThreadId, GlobalLock, GlobalAlloc, FreeLibrary, GlobalDeleteAtom, lstrcmpA, GetModuleFileNameA, GetModuleHandleA, ConvertDefaultLocale, EnumResourceLanguagesA, lstrcpyA, LoadLibraryA, CompareStringW, CompareStringA, lstrlenA, lstrcmpiA, GetVersion, GetLastError, MultiByteToWideChar, InterlockedDecrement, WideCharToMultiByte, GetVersionExA, GetThreadLocale, GetLocaleInfoA, GetACP, InterlockedExchange, GetModuleHandleW, LoadLibraryW, GetEnvironmentStringsW
                                                                            USER32.dllDestroyMenu, MessageBeep, GetNextDlgGroupItem, InvalidateRgn, InvalidateRect, CopyAcceleratorTableA, SetRect, IsRectEmpty, CharNextA, GetSysColorBrush, ReleaseCapture, LoadCursorA, SetCapture, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, ShowWindow, MoveWindow, IsDialogMessageA, RegisterWindowMessageA, WinHelpA, GetCapture, CreateWindowExA, GetClassLongA, GetClassInfoExA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SendDlgItemMessageA, IsChild, GetForegroundWindow, GetTopWindow, GetMessageTime, GetMessagePos, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, GetSysColor, AdjustWindowRectEx, EqualRect, GetClassInfoA, RegisterClassA, UnregisterClassA, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, MessageBoxA, DrawIcon, SendMessageA, IsIconic, GetClientRect, EnableWindow, GetSystemMetrics, LoadIconA, CharUpperA, PostMessageA, SetWindowTextA, OffsetRect, IntersectRect, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, CopyRect, PtInRect, wsprintfA, GetWindowTextLengthA, GetWindowTextA, SetFocus, UnhookWindowsHookEx, PostThreadMessageA, GetMenuItemID, GetMenuItemCount, GetSubMenu, GetWindow, SetWindowContextHelpId, MapDialogRect, SetWindowPos, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, RegisterClipboardFormatA, PostQuitMessage, SetCursor, IsWindowEnabled, GetLastActivePopup, GetWindowLongA, GetParent, ValidateRect, GetCursorPos, PeekMessageA, GetKeyState, IsWindowVisible, GetActiveWindow, DispatchMessageA, TranslateMessage, GetMessageA, CallNextHookEx, SetWindowsHookExA, LoadBitmapA, GetMenuCheckMarkDimensions, CheckMenuItem, EnableMenuItem, GetMenuState, ModifyMenuA, GetFocus, SetMenuItemBitmaps, EndDialog, GetNextDlgTabItem, GetDlgItem, IsWindow, DestroyWindow
                                                                            GDI32.dllGetBkColor, GetTextColor, CreateRectRgnIndirect, GetRgnBox, GetMapMode, GetStockObject, DeleteDC, ExtSelectClipRgn, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateBitmap, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetWindowExtEx, GetViewportExtEx, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, GetDeviceCaps, SetViewportOrgEx
                                                                            comdlg32.dllGetFileTitleA
                                                                            WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
                                                                            ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegOpenKeyExA, RegDeleteKeyA, RegEnumKeyA, RegOpenKeyA, RegQueryValueA, RegCreateKeyExA, RegSetValueExA, SetFileSecurityW
                                                                            COMCTL32.dll
                                                                            SHLWAPI.dllPathFindFileNameA, PathStripToRootA, PathFindExtensionA, PathIsUNCA
                                                                            oledlg.dll
                                                                            ole32.dllStgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CoTaskMemAlloc, CreateILockBytesOnHGlobal, CoTaskMemFree, CLSIDFromString, CLSIDFromProgID, CoInitialize, CoCreateInstance, OleRun, CoUninitialize, OleUninitialize, CoFreeUnusedLibraries, OleInitialize, CoRegisterMessageFilter, OleFlushClipboard, OleIsCurrentClipboard, CoRevokeClassObject
                                                                            OLEAUT32.dllSysAllocString, SysAllocStringByteLen, SysStringByteLen, SysFreeString, VariantInit, VariantCopy, VariantChangeType, VariantClear, SysAllocStringLen, SysStringLen, OleCreateFontIndirect, SystemTimeToVariantTime, SafeArrayDestroy, GetErrorInfo

                                                                            Version Infos

                                                                            DescriptionData
                                                                            LegalCopyrightCopyright (C) 2003
                                                                            InternalNameMSADODLG
                                                                            FileVersion1, 0, 0, 1
                                                                            CompanyNameMAFIA
                                                                            PrivateBuild
                                                                            LegalTrademarks
                                                                            Commentsby: Haitham hamed/The_Pharoh
                                                                            ProductNameMSADODLG Application
                                                                            SpecialBuild
                                                                            ProductVersion1, 0, 0, 1
                                                                            FileDescriptionMSADODLG MFC Application
                                                                            OriginalFilenameMSADODLG.EXE
                                                                            Translation0x0409 0x04b0

                                                                            Possible Origin

                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            ArabicSaudi Arabia

                                                                            Network Behavior

                                                                            Network Port Distribution

                                                                            TCP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 7, 2021 06:50:30.022336960 CEST497298080192.168.2.3104.236.137.72
                                                                            Apr 7, 2021 06:50:30.202459097 CEST808049729104.236.137.72192.168.2.3
                                                                            Apr 7, 2021 06:50:30.734514952 CEST497298080192.168.2.3104.236.137.72
                                                                            Apr 7, 2021 06:50:30.915384054 CEST808049729104.236.137.72192.168.2.3
                                                                            Apr 7, 2021 06:50:31.422058105 CEST497298080192.168.2.3104.236.137.72
                                                                            Apr 7, 2021 06:50:31.601778030 CEST808049729104.236.137.72192.168.2.3
                                                                            Apr 7, 2021 06:50:35.322638035 CEST497308080192.168.2.3172.104.233.225
                                                                            Apr 7, 2021 06:50:38.328885078 CEST497308080192.168.2.3172.104.233.225
                                                                            Apr 7, 2021 06:50:44.329427004 CEST497308080192.168.2.3172.104.233.225
                                                                            Apr 7, 2021 06:51:00.585378885 CEST497408080192.168.2.3213.189.36.51
                                                                            Apr 7, 2021 06:51:00.622391939 CEST808049740213.189.36.51192.168.2.3
                                                                            Apr 7, 2021 06:51:01.127821922 CEST497408080192.168.2.3213.189.36.51
                                                                            Apr 7, 2021 06:51:01.165400028 CEST808049740213.189.36.51192.168.2.3
                                                                            Apr 7, 2021 06:51:01.674595118 CEST497408080192.168.2.3213.189.36.51
                                                                            Apr 7, 2021 06:51:01.711533070 CEST808049740213.189.36.51192.168.2.3
                                                                            Apr 7, 2021 06:51:05.357662916 CEST497418080192.168.2.385.234.143.94
                                                                            Apr 7, 2021 06:51:08.362636089 CEST497418080192.168.2.385.234.143.94
                                                                            Apr 7, 2021 06:51:14.378770113 CEST497418080192.168.2.385.234.143.94
                                                                            Apr 7, 2021 06:51:30.671153069 CEST497448080192.168.2.3119.59.124.163
                                                                            Apr 7, 2021 06:51:30.854068995 CEST808049744119.59.124.163192.168.2.3
                                                                            Apr 7, 2021 06:51:31.364742041 CEST497448080192.168.2.3119.59.124.163
                                                                            Apr 7, 2021 06:51:31.546861887 CEST808049744119.59.124.163192.168.2.3
                                                                            Apr 7, 2021 06:51:32.052309036 CEST497448080192.168.2.3119.59.124.163
                                                                            Apr 7, 2021 06:51:32.234468937 CEST808049744119.59.124.163192.168.2.3
                                                                            Apr 7, 2021 06:51:36.327295065 CEST497458080192.168.2.3190.146.131.105
                                                                            Apr 7, 2021 06:51:39.334032059 CEST497458080192.168.2.3190.146.131.105
                                                                            Apr 7, 2021 06:51:45.334573030 CEST497458080192.168.2.3190.146.131.105

                                                                            UDP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 7, 2021 06:49:38.551395893 CEST6015253192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:49:38.564142942 CEST53601528.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:49:43.946746111 CEST5754453192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:49:43.960174084 CEST53575448.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:49:45.708499908 CEST5598453192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:49:45.721539021 CEST53559848.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:49:46.493990898 CEST6418553192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:49:46.507539034 CEST53641858.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:49:47.644478083 CEST6511053192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:49:47.658668041 CEST53651108.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:10.202346087 CEST5836153192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:10.241022110 CEST53583618.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:13.217879057 CEST6349253192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:13.231161118 CEST53634928.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:13.891305923 CEST6083153192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:13.904072046 CEST53608318.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:14.647017956 CEST6010053192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:14.660334110 CEST53601008.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:15.517189026 CEST5319553192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:15.531023026 CEST53531958.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:16.806775093 CEST5014153192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:16.819835901 CEST53501418.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:18.904903889 CEST5302353192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:18.919095993 CEST53530238.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:19.660454035 CEST4956353192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:19.673875093 CEST53495638.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:20.446872950 CEST5135253192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:20.458775997 CEST53513528.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:20.761080980 CEST5934953192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:20.780473948 CEST53593498.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:21.239820957 CEST5708453192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:21.253297091 CEST53570848.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:22.039150000 CEST5882353192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:22.051822901 CEST53588238.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:22.803833961 CEST5756853192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:22.816128016 CEST53575688.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:23.726583958 CEST5054053192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:23.740210056 CEST53505408.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:24.402729034 CEST5436653192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:24.421847105 CEST53543668.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:25.968115091 CEST5303453192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:25.981112003 CEST53530348.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:38.439985037 CEST5776253192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:38.466201067 CEST53577628.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:45.559355021 CEST5543553192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:45.572110891 CEST53554358.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:50:48.867105961 CEST5071353192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:50:48.888035059 CEST53507138.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:51:20.705039024 CEST5613253192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:51:20.719325066 CEST53561328.8.8.8192.168.2.3
                                                                            Apr 7, 2021 06:51:22.271953106 CEST5898753192.168.2.38.8.8.8
                                                                            Apr 7, 2021 06:51:22.307223082 CEST53589878.8.8.8192.168.2.3

                                                                            Code Manipulations

                                                                            Statistics

                                                                            Behavior

                                                                            Click to jump to process

                                                                            System Behavior

                                                                            General

                                                                            Start time:06:49:42
                                                                            Start date:07/04/2021
                                                                            Path:C:\Users\user\Desktop\lK8vF3n2e7.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Users\user\Desktop\lK8vF3n2e7.exe'
                                                                            Imagebase:0x400000
                                                                            File size:397714 bytes
                                                                            MD5 hash:D7CD602EB9E9AD8272D4AD0910815835
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.194289287.0000000000591000.00000020.00000001.sdmp, Author: kevoreilly
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.194269122.0000000000570000.00000040.00000001.sdmp, Author: kevoreilly
                                                                            Reputation:low

                                                                            General

                                                                            Start time:06:49:42
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:49:47
                                                                            Start date:07/04/2021
                                                                            Path:C:\Users\user\Desktop\lK8vF3n2e7.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:--b0af2bca
                                                                            Imagebase:0x400000
                                                                            File size:397714 bytes
                                                                            MD5 hash:D7CD602EB9E9AD8272D4AD0910815835
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000002.00000002.233128075.0000000002221000.00000020.00000001.sdmp, Author: kevoreilly
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000002.00000002.233094123.00000000021E0000.00000040.00000001.sdmp, Author: kevoreilly
                                                                            Reputation:low

                                                                            General

                                                                            Start time:06:49:58
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\SysWOW64\corsangle.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\SysWOW64\corsangle.exe
                                                                            Imagebase:0x400000
                                                                            File size:397714 bytes
                                                                            MD5 hash:D7CD602EB9E9AD8272D4AD0910815835
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.229558668.0000000000E30000.00000040.00000001.sdmp, Author: kevoreilly
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000003.00000002.229583434.0000000000E51000.00000020.00000001.sdmp, Author: kevoreilly
                                                                            Reputation:low

                                                                            General

                                                                            Start time:06:50:03
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\SysWOW64\corsangle.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:--2e5419fc
                                                                            Imagebase:0x400000
                                                                            File size:397714 bytes
                                                                            MD5 hash:D7CD602EB9E9AD8272D4AD0910815835
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000004.00000002.456108284.0000000000700000.00000040.00000001.sdmp, Author: kevoreilly
                                                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Emotet, Description: Emotet Payload, Source: 00000004.00000002.456134629.0000000000721000.00000020.00000001.sdmp, Author: kevoreilly
                                                                            Reputation:low

                                                                            General

                                                                            Start time:06:50:11
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:17
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:25
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:28
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:29
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:29
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:29
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:30
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:31
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\SgrmBroker.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                            Imagebase:0x7ff759a20000
                                                                            File size:163336 bytes
                                                                            MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:50:31
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\svchost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                            Imagebase:0x7ff7488e0000
                                                                            File size:51288 bytes
                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:51:32
                                                                            Start date:07/04/2021
                                                                            Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
                                                                            Imagebase:0x7ff6a38a0000
                                                                            File size:455656 bytes
                                                                            MD5 hash:A267555174BFA53844371226F482B86B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:06:51:32
                                                                            Start date:07/04/2021
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6b2800000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Disassembly

                                                                            Code Analysis

                                                                            Reset < >