Loading ...

Play interactive tourEdit tour

Analysis Report w73FtMA4ZTl9NFm.exe

Overview

General Information

Sample Name:w73FtMA4ZTl9NFm.exe
Analysis ID:403703
MD5:ff44bfe6955f4d11f915b4a0b818fc7c
SHA1:3e094caff011346ad02aeafcb5769a519cf10dc0
SHA256:929fd55e632471f4f35295e574c6814a3de9662398b7a606e352ecba9c52de7e
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: CMSTP Execution Process Creation
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • w73FtMA4ZTl9NFm.exe (PID: 3764 cmdline: 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe' MD5: FF44BFE6955F4D11F915B4A0B818FC7C)
    • w73FtMA4ZTl9NFm.exe (PID: 1168 cmdline: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe MD5: FF44BFE6955F4D11F915B4A0B818FC7C)
      • explorer.exe (PID: 3292 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmstp.exe (PID: 6400 cmdline: C:\Windows\SysWOW64\cmstp.exe MD5: 4833E65ED211C7F118D4A11E6FB58A09)
          • cmd.exe (PID: 6804 cmdline: /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.naiping8.com/blm/"], "decoy": ["basilaws.com", "laesses.com", "isematsudai.com", "cafperfect.com", "listocalistoanimation.com", "bikesofthefuture.com", "sweette.com", "instagramhelpsnow.com", "wuxians.com", "canadianpayday.loans", "tiklaulan.xyz", "marketingbuddhi.com", "centrocaninopochs.com", "doodletrends.com", "praiship.com", "alghuta.com", "kompramania.com", "thenewdawncompany.com", "shopthegoodbar.com", "emergencyuavsolutions.com", "mayratienecasas.com", "gitaffiliate.com", "jdanielfit.com", "raisingarrowsbirthservices.com", "shirleyvansteenis.com", "jrlsports.com", "untiedpockets.com", "dingdongpaw.com", "skytrustconstruction.com", "shainamgmtsolns.com", "findinkjams.com", "erisedu.com", "marikell.com", "nelivo.com", "nyatigroupera.net", "herbyvet.com", "satviksumi.com", "earthnetic.com", "coronamimos.com", "neurologistaandreialamberti.com", "tom-kiesel.com", "creativegrowthllc.com", "unitrackerindo.com", "bgetaway.com", "humanmarijuana.com", "somuch2dohere.com", "gpt4every.com", "hunandanei.com", "honu360vr.com", "abn-co-host-listing-46731.xyz", "sitewebinfo.com", "iqiongtian.com", "evolvecommpr.com", "4980061061670012.xyz", "checkoutmyimages.com", "shifamedico.com", "tonygwynnclassic.com", "shopalndrinks.com", "nawabebiryanis.com", "productionlads.com", "zhjuku.com", "hbchuangjie.com", "fleurdelyshospitality.net", "tiffanybluandyou.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x183f9:$sqlite3step: 68 34 1C 7B E1
      • 0x1850c:$sqlite3step: 68 34 1C 7B E1
      • 0x18428:$sqlite3text: 68 38 2A 90 C5
      • 0x1854d:$sqlite3text: 68 38 2A 90 C5
      • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
      00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 18 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x183f9:$sqlite3step: 68 34 1C 7B E1
          • 0x1850c:$sqlite3step: 68 34 1C 7B E1
          • 0x18428:$sqlite3text: 68 38 2A 90 C5
          • 0x1854d:$sqlite3text: 68 38 2A 90 C5
          • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
          3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1a517:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1b51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 4 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: CMSTP Execution Process CreationShow sources
            Source: Process startedAuthor: Nik Seetharaman: Data: Command: /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe', CommandLine: /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe', CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\SysWOW64\cmstp.exe, ParentImage: C:\Windows\SysWOW64\cmstp.exe, ParentProcessId: 6400, ProcessCommandLine: /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe', ProcessId: 6804
            Sigma detected: System File Execution Location AnomalyShow sources
            Source: Process startedAuthor: Florian Roth, Patrick Bareiss, Anton Kutepov, oscd.community: Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe, ParentImage: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe, ParentProcessId: 1168, ProcessCommandLine: , ProcessId: 3292

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.naiping8.com/blm/"], "decoy": ["basilaws.com", "laesses.com", "isematsudai.com", "cafperfect.com", "listocalistoanimation.com", "bikesofthefuture.com", "sweette.com", "instagramhelpsnow.com", "wuxians.com", "canadianpayday.loans", "tiklaulan.xyz", "marketingbuddhi.com", "centrocaninopochs.com", "doodletrends.com", "praiship.com", "alghuta.com", "kompramania.com", "thenewdawncompany.com", "shopthegoodbar.com", "emergencyuavsolutions.com", "mayratienecasas.com", "gitaffiliate.com", "jdanielfit.com", "raisingarrowsbirthservices.com", "shirleyvansteenis.com", "jrlsports.com", "untiedpockets.com", "dingdongpaw.com", "skytrustconstruction.com", "shainamgmtsolns.com", "findinkjams.com", "erisedu.com", "marikell.com", "nelivo.com", "nyatigroupera.net", "herbyvet.com", "satviksumi.com", "earthnetic.com", "coronamimos.com", "neurologistaandreialamberti.com", "tom-kiesel.com", "creativegrowthllc.com", "unitrackerindo.com", "bgetaway.com", "humanmarijuana.com", "somuch2dohere.com", "gpt4every.com", "hunandanei.com", "honu360vr.com", "abn-co-host-listing-46731.xyz", "sitewebinfo.com", "iqiongtian.com", "evolvecommpr.com", "4980061061670012.xyz", "checkoutmyimages.com", "shifamedico.com", "tonygwynnclassic.com", "shopalndrinks.com", "nawabebiryanis.com", "productionlads.com", "zhjuku.com", "hbchuangjie.com", "fleurdelyshospitality.net", "tiffanybluandyou.com"]}
            Multi AV Scanner detection for submitted fileShow sources
            Source: w73FtMA4ZTl9NFm.exeVirustotal: Detection: 30%Perma Link
            Source: w73FtMA4ZTl9NFm.exeReversingLabs: Detection: 44%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPE
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cmstp.pdbGCTL source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.288143631.0000000001910000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdbUGP source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.287846325.00000000016BF000.00000040.00000001.sdmp, cmstp.exe, 00000007.00000002.508499448.00000000045D0000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.287846325.00000000016BF000.00000040.00000001.sdmp, cmstp.exe
            Source: Binary string: cmstp.pdb source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.288143631.0000000001910000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49736 -> 64.190.62.111:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49736 -> 64.190.62.111:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49736 -> 64.190.62.111:80
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.naiping8.com/blm/
            Source: global trafficHTTP traffic detected: GET /blm/?v4=jT8U/4hmrcCGqX5zF6RLU3xaP16cys1ENKtgh6K33uf7HOVcxmeLoGjIinA45QceqzYG68+/fQ==&Jr=V48DzvNH HTTP/1.1Host: www.kompramania.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 198.54.117.212 198.54.117.212
            Source: global trafficHTTP traffic detected: GET /blm/?v4=jT8U/4hmrcCGqX5zF6RLU3xaP16cys1ENKtgh6K33uf7HOVcxmeLoGjIinA45QceqzYG68+/fQ==&Jr=V48DzvNH HTTP/1.1Host: www.kompramania.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: unknownDNS traffic detected: queries for: clientconfig.passport.net
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246739537.00000000035E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: explorer.exe, 00000004.00000002.524154545.000000000686B000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: w73FtMA4ZTl9NFm.exeString found in binary or memory: https://github.com/unguest
            Source: w73FtMA4ZTl9NFm.exeString found in binary or memory: https://github.com/unguest9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptionGProperty
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419D50 NtCreateFile,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419E00 NtReadFile,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419E80 NtClose,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419F30 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419D4A NtCreateFile,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419DFA NtReadFile,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419E7A NtClose,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00419F2A NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046395D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046399A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046396E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046396D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046398F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046398A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639560 NtWriteFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046395F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046399D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04639B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046397A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699D50 NtCreateFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699E00 NtReadFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699E80 NtClose,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699F30 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699D4A NtCreateFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699DFA NtReadFile,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699E7A NtClose,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00699F2A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_033BC3A0
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_033BA758
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C146484
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C141CC8
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C1417F8
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C148B30
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C141CB7
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C146503
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C145EB3
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C145EB8
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C140F10
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C140F09
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C141FB0
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C141FAD
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C1417E8
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C143823
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C1408D3
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C140908
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C143205
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C143208
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C1462B0
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_0C1462AD
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00401030
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041DB46
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041D357
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041D5DD
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00409DEB
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00402D90
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041DE05
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00409E30
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041DE9C
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041D701
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041DFE3
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00402FB0
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1002
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460841F
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C28EC
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C20A8
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460B090
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C1D55
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FF900
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C2D07
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F0D20
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460D5E0
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C25DD
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622581
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04616E30
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C2EF7
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C22AE
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C2B28
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C1FF1
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BDBD2
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462EBB0
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069DB46
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00689DEB
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069D5D7
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00682D90
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00689E30
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069DE05
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069DE9C
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069D702
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069DFE3
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00682FB0
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 045FB150 appears 35 times
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: w73FtMA4ZTl9NFm.exeBinary or memory string: OriginalFilename vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000003.241311005.0000000004753000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exeBinary or memory string: OriginalFilename vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.288143631.0000000001910000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.287846325.00000000016BF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exeBinary or memory string: OriginalFilenameImporterCallback.exe6 vs w73FtMA4ZTl9NFm.exe
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
            Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/1
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\w73FtMA4ZTl9NFm.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6860:120:WilError_01
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
            Source: w73FtMA4ZTl9NFm.exeVirustotal: Detection: 30%
            Source: w73FtMA4ZTl9NFm.exeReversingLabs: Detection: 44%
            Source: unknownProcess created: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess created: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
            Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess created: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
            Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: w73FtMA4ZTl9NFm.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cmstp.pdbGCTL source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.288143631.0000000001910000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdbUGP source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.287846325.00000000016BF000.00000040.00000001.sdmp, cmstp.exe, 00000007.00000002.508499448.00000000045D0000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.287846325.00000000016BF000.00000040.00000001.sdmp, cmstp.exe
            Source: Binary string: cmstp.pdb source: w73FtMA4ZTl9NFm.exe, 00000003.00000002.288143631.0000000001910000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_00FD94E5 push cs; iretd
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 1_2_00FD9485 push cs; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00404A36 push edi; iretd
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00417296 push ebx; iretd
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00409BAC push es; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041CEF2 push eax; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041CEFB push eax; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041CEA5 push eax; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0041CF5C push eax; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00B09485 push cs; ret
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00B094E5 push cs; iretd
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0464D0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00684A36 push edi; iretd
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00697296 push ebx; iretd
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069D3F6 pushad ; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_00689BAC push es; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069D51B pushfd ; retf
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069CEFB push eax; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069CEF2 push eax; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069CEA5 push eax; ret
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0069CF5C push eax; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 7.93272076919

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x85 0x5E 0xED
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: w73FtMA4ZTl9NFm.exe PID: 3764, type: MEMORY
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 00000000006898E4 second address: 00000000006898EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 0000000000689B4E second address: 0000000000689B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00409A80 rdtsc
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe TID: 4828Thread sleep time: -103651s >= -30000s
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe TID: 4660Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exe TID: 5112Thread sleep count: 36 > 30
            Source: C:\Windows\explorer.exe TID: 5112Thread sleep time: -72000s >= -30000s
            Source: C:\Windows\SysWOW64\cmstp.exe TID: 6404Thread sleep time: -65000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeThread delayed: delay time: 103651
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeThread delayed: delay time: 922337203685477
            Source: explorer.exe, 00000004.00000000.272467225.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 00000004.00000000.272467225.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000004.00000000.272641165.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000004.00000002.523676868.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000004.00000000.272641165.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: explorer.exe, 00000004.00000000.260612943.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
            Source: explorer.exe, 00000004.00000000.272641165.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
            Source: explorer.exe, 00000004.00000000.272543308.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
            Source: explorer.exe, 00000004.00000000.272467225.0000000008A32000.00000004.00000001.sdmpBinary or memory string: 30d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: explorer.exe, 00000004.00000000.272543308.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000004.00000000.265973100.00000000069DA000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 00000004.00000002.523676868.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: explorer.exe, 00000004.00000002.523676868.00000000059C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: w73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: explorer.exe, 00000004.00000002.523676868.00000000059C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_00409A80 rdtsc
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeCode function: 3_2_0040ACC0 LdrLoadDll,
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B2073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C1074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04610050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04610050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B14FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F58EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046220A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046390AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04673884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04673884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04633D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04673540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04617D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FC962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04614120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0467A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BE539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04603D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FAD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046841E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046A8DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04676DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046769A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046261A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046261A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046235A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04621DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04621DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04621DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046751BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046751BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046751BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046751BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046AB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046AB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0463927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04607E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046BEA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04684257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04634A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04634A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F5210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046AFE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04628E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B1608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04608A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04613A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FE620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046216E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046076E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04638EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046AFEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046236CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046746A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FF358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04623B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04623B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FDB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0460EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C8B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045FDB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_045F4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0468FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046203E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0461DBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046337F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046753CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046753CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046C5BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04624BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046B138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_046AD380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04601B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04601B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_0462B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04677794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04608794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmstp.exeCode function: 7_2_04622397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\cmstp.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.kompramania.com
            Source: C:\Windows\explorer.exeDomain query: www.findinkjams.com
            Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.212 80
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeMemory written: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe base: 400000 value starts with: 4D5A
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeThread register set: target process: 3292
            Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 3292
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeThread APC queued: target process: C:\Windows\explorer.exe
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: A30000
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeProcess created: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
            Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
            Source: explorer.exe, 00000004.00000002.505989523.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 00000007.00000002.505513553.0000000002E80000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
            Source: explorer.exe, 00000004.00000000.265786976.0000000005F40000.00000004.00000001.sdmp, cmstp.exe, 00000007.00000002.505513553.0000000002E80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000004.00000002.505989523.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 00000007.00000002.505513553.0000000002E80000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000004.00000002.505989523.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 00000007.00000002.505513553.0000000002E80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000004.00000002.503355168.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
            Source: explorer.exe, 00000004.00000000.272543308.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.w73FtMA4ZTl9NFm.exe.46875f8.3.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 403703 Sample: w73FtMA4ZTl9NFm.exe Startdate: 04/05/2021 Architecture: WINDOWS Score: 100 31 www.sweette.com 2->31 33 clientconfig.passport.net 2->33 35 prda.aadg.msidentity.com 2->35 43 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 8 other signatures 2->49 11 w73FtMA4ZTl9NFm.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\w73FtMA4ZTl9NFm.exe.log, ASCII 11->29 dropped 59 Tries to detect virtualization through RDTSC time measurements 11->59 61 Injects a PE file into a foreign processes 11->61 15 w73FtMA4ZTl9NFm.exe 11->15         started        signatures6 process7 signatures8 63 Modifies the context of a thread in another process (thread injection) 15->63 65 Maps a DLL or memory area into another process 15->65 67 Sample uses process hollowing technique 15->67 69 Queues an APC in another process (thread injection) 15->69 18 explorer.exe 15->18 injected process9 dnsIp10 37 www.kompramania.com 18->37 39 www.findinkjams.com 18->39 41 parkingpage.namecheap.com 198.54.117.212, 49722, 80 NAMECHEAP-NETUS United States 18->41 51 System process connects to network (likely due to code injection or exploit) 18->51 22 cmstp.exe 18->22         started        signatures11 process12 signatures13 53 Modifies the context of a thread in another process (thread injection) 22->53 55 Maps a DLL or memory area into another process 22->55 57 Tries to detect virtualization through RDTSC time measurements 22->57 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            w73FtMA4ZTl9NFm.exe30%VirustotalBrowse
            w73FtMA4ZTl9NFm.exe45%ReversingLabsByteCode-MSIL.Trojan.Agentesla

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            3.2.w73FtMA4ZTl9NFm.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            SourceDetectionScannerLabelLink
            www.sweette.com0%VirustotalBrowse
            clientconfig.passport.net0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            www.naiping8.com/blm/0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.kompramania.com/blm/?v4=jT8U/4hmrcCGqX5zF6RLU3xaP16cys1ENKtgh6K33uf7HOVcxmeLoGjIinA45QceqzYG68+/fQ==&Jr=V48DzvNH0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.sweette.com
            64.190.62.111
            truetrueunknown
            parkingpage.namecheap.com
            198.54.117.212
            truefalse
              high
              www.kompramania.com
              unknown
              unknowntrue
                unknown
                clientconfig.passport.net
                unknown
                unknowntrueunknown
                www.findinkjams.com
                unknown
                unknowntrue
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  www.naiping8.com/blm/true
                  • Avira URL Cloud: safe
                  low
                  http://www.kompramania.com/blm/?v4=jT8U/4hmrcCGqX5zF6RLU3xaP16cys1ENKtgh6K33uf7HOVcxmeLoGjIinA45QceqzYG68+/fQ==&Jr=V48DzvNHtrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000004.00000002.524154545.000000000686B000.00000004.00000001.sdmpfalse
                    high
                    http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTheexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                              high
                              http://www.tiro.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                high
                                http://www.goodfont.co.krexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssw73FtMA4ZTl9NFm.exe, 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.carterandcone.comlexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8explorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.fonts.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.sandoll.co.krexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.urwpp.deDPleaseexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namew73FtMA4ZTl9NFm.exe, 00000001.00000002.246739537.00000000035E1000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.sakkal.comexplorer.exe, 00000004.00000000.273388451.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://github.com/unguestw73FtMA4ZTl9NFm.exefalse
                                              high
                                              https://github.com/unguest9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptionGPropertyw73FtMA4ZTl9NFm.exefalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                198.54.117.212
                                                parkingpage.namecheap.comUnited States
                                                22612NAMECHEAP-NETUSfalse

                                                General Information

                                                Joe Sandbox Version:32.0.0 Black Diamond
                                                Analysis ID:403703
                                                Start date:04.05.2021
                                                Start time:10:37:42
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 11m 29s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:w73FtMA4ZTl9NFm.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:27
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:1
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@7/1@4/1
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 18.4% (good quality ratio 16.5%)
                                                • Quality average: 70.1%
                                                • Quality standard deviation: 32.5%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                10:38:36API Interceptor1x Sleep call for process: w73FtMA4ZTl9NFm.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                198.54.117.212MRQUolkoK7.exeGet hashmaliciousBrowse
                                                • www.blazerplanning.com/8u3b/?o2=iN68aFPHs&9rwxC4Lh=JlLpmPAzMmQyvHQwr5UMVliwPWakpnfQ1/iZiKdXRC0gvSv7c7ocKU7ECD3d27LqzKr0tNAMaQ==
                                                Bank Details.xlsxGet hashmaliciousBrowse
                                                • www.thesixteenthround.net/aqu2/?NP=s0A+R2zuZA1+LPHAc9M/AmUzyN8aP2GBLv9J4fG53S1jdbvs3uSd9usyNyOEpwpEqUbLdg==&Yzrt=nN6d4T
                                                New order.exeGet hashmaliciousBrowse
                                                • www.milestonesrls.online/n30n/?GdIH=4/VSTdRgjoHrn+qSdMCKVXShlJLaSm84jLgodp9buoZ+qe3slXHJ+FG3aXuYEDG1TdkG&Ajn=6lNDphQHVxzXvzn0
                                                Shinshin Machinery.exe.exeGet hashmaliciousBrowse
                                                • www.bakoroast.coffee/g7b/?Bzu=X+rBV3VeTRPsG/IiwPgAjJR7FEhfgRdscRWTA3Iua2yUCn27Cctf8aE4Tun6k6kIXyXe&Rxo=M6hD4jnx_05t
                                                INV-210318L.exeGet hashmaliciousBrowse
                                                • www.owe.pink/vsk9/?EvI=CR-0dB&YV805PL=lPye3ad5VliS0kw2YotKykUI/f06ulyVlr48O2QWPrzqY2uuE1iv1/UVrBfqkmRpTwF2mwsV5g==
                                                1LHKlbcoW3.exeGet hashmaliciousBrowse
                                                • www.boogerstv.com/p2io/?rN=d8VD7828W8N&CR=fW2NkW2j278wyrs6d/m+egXTc5dWq8qtohQAL+tQrXSmfdetyJ3HBVVg7gxb9s6RBL4M
                                                PO# 4510175687.exeGet hashmaliciousBrowse
                                                • www.owe.pink/vsk9/?I6A=lPye3ad5VliS0kw2YotKykUI/f06ulyVlr48O2QWPrzqY2uuE1iv1/UVrCzQnn9SQHkn&ofutZl=xVMtGJhp
                                                LrJiu5vv1t.exeGet hashmaliciousBrowse
                                                • www.ifdca.com/m0rc/?9rspeh=lbR5C4q/Bs6c3SKeepmv0Da9hIgPOrZf3Ut381rRSdXn0224bmGUGa2i5otESCz2qCMY&Ppd=_6g8CdsPd2MHu
                                                1nmYiiE0nY.exeGet hashmaliciousBrowse
                                                • www.toplevelsealcoating.net/njo/?CZ=8pBxZbI&w2=mxuHlFV7ZpSkuYg6Lcwsp6DcsuxeedOYcKnp3vLhruQtfiblvIYsgHAA5V0E6fjYQA2BXcpyvw==
                                                KK7wD2vDmF.exeGet hashmaliciousBrowse
                                                • www.toplevelsealcoating.net/njo/?nRYxC8=mxuHlFV7ZpSkuYg6Lcwsp6DcsuxeedOYcKnp3vLhruQtfiblvIYsgHAA5WYUmu/jX1fQ&Lh38=ZTdtG87X0j
                                                PO 213409701.xlsxGet hashmaliciousBrowse
                                                • www.304shaughnessygreen.info/oean/?rFQt=d8/ljYFal4PMYfvauWUnApMkbVV7hvzPIdajggbW2e5rOGYmCrO1nFh35A2MgOnQN9VHwA==&rF=9rbPKz
                                                SAMSUNG C&T UPCOMING PROJECTS19-MP.exe.exeGet hashmaliciousBrowse
                                                • www.marcellelizabeth.life/cdl/?Mfg=M/zpEzS8W9oCfIylLsSUMmJUovgo5PqMMB6b2NznY4m/oZHGIJjoAjEmtsxcvBVMY/Td&uVxpj=ojO0dJYX1B
                                                KROS Sp. z.o.o.exeGet hashmaliciousBrowse
                                                • www.angermgmtathome.com/kio8/?9rj0DvY=e6NOpdhu6GIIdtRIIRGR8dBI9mtGur58S+UqNMdGsY3OVbM2U6HgcHgaHwr7dyfFZUjr&v4=Ch6Lm
                                                SAMSUNG C&T UPCOMING PROJECTS19-027-MP-010203.exe.exeGet hashmaliciousBrowse
                                                • www.marcellelizabeth.life/cdl/?Et08qv=M/zpEzS8W9oCfIylLsSUMmJUovgo5PqMMB6b2NznY4m/oZHGIJjoAjEmtsxcvBVMY/Td&uXK=hpgd6NmPQLRDNXK
                                                IMG_1107.EXEGet hashmaliciousBrowse
                                                • www.inifinityapps.net/bf3/?DXOX-=swuzFfgzYDLB3Bi4piS9eAlbkrlhpvPYJEwernceI/wmg54lN6WJu/MxY2tI0Dh/A+Qh&KzuH=XPjDi0j0G
                                                Bank details.exeGet hashmaliciousBrowse
                                                • www.nuevasantatecla.com/ehxh/?DVBh=2SjzOZmHZnnKS6lUkurSin0GpOD0orQTIR1dgfvJrCJBvqRU2lp5oKty/puKetsuF8gN&1b0hlT=gvRpjb_Xgb6xvP
                                                in.exeGet hashmaliciousBrowse
                                                • www.seak.xyz/uds2/?Y4spQFW=vIE1ET6pQu49m+QHY7YrZ7t2bRuoKngw2h26Ua5bu/NnC6rxsHDfr4DpunyQx1XamxAZm7X6xg==&Ezu=VTChCL_ht2spUrI
                                                SKM_C258201001130020005057.exeGet hashmaliciousBrowse
                                                • www.nmsu.red/qef6/?D0G=dK6pc5Oo00TZ1lrwhWBq4bcwDNmrs3+St52Ej8uVu8gxg21O2w9JytjpowhKGLTyrptJ&Q2J=fjlpdDePPPndHZ
                                                SecuriteInfo.com.Heur.16160.xlsGet hashmaliciousBrowse
                                                • www.amionyoutube.com/p2he/?cF=xs0ZKR14962ZgwK/QWp0JFwCibQKs8mKtb995OflH30hWAUvABOJR7m/kpvGi8TCnZzAYQ==&SBZ=epg8b
                                                n41pVXkYCe.exeGet hashmaliciousBrowse
                                                • www.swavhca.com/jskg/?8pJPDtoX=d8LPYq+5Arayfm1vXo3Q9MeTj0bruQyaWpvdMQHKTdQ1FO0+Z34o/nFcLA/t2X2IEXB72feptg==&CvL0=inCTmHzH

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                parkingpage.namecheap.comRemittance Advice pdf.exeGet hashmaliciousBrowse
                                                • 198.54.117.212
                                                d801e424_by_Libranalysis.docxGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                MRQUolkoK7.exeGet hashmaliciousBrowse
                                                • 198.54.117.212
                                                REVISED PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                • 198.54.117.217
                                                z5Wqivscwd.exeGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                AL-IEDAHINV.No09876543.exeGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                register.jpg.dllGet hashmaliciousBrowse
                                                • 198.54.117.217
                                                24032130395451.pdf .exeGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                PO17439.exeGet hashmaliciousBrowse
                                                • 198.54.117.215
                                                pdf Re revised PI 900tons.exeGet hashmaliciousBrowse
                                                • 198.54.117.216
                                                YJgdGYWCni.exeGet hashmaliciousBrowse
                                                • 198.54.117.211
                                                Passport_ID_jpg.exeGet hashmaliciousBrowse
                                                • 198.54.117.211
                                                Taekwang Quote - 210421_001.exeGet hashmaliciousBrowse
                                                • 198.54.117.211
                                                Ac5RA9R99F.exeGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                SA-NQAW12n-NC9W03-pdf.exeGet hashmaliciousBrowse
                                                • 198.54.117.218
                                                1400000004-arrival.exeGet hashmaliciousBrowse
                                                • 198.54.117.211
                                                qmhFLhRoEc.exeGet hashmaliciousBrowse
                                                • 198.54.117.217
                                                uNttFPI36y.exeGet hashmaliciousBrowse
                                                • 198.54.117.216
                                                dw0Iro1gcR.exeGet hashmaliciousBrowse
                                                • 198.54.117.210
                                                PO#293701 pdf.exeGet hashmaliciousBrowse
                                                • 198.54.117.217

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                NAMECHEAP-NETUSSynchronoss Payment.htmlGet hashmaliciousBrowse
                                                • 199.192.16.144
                                                PO KV18RE001-A5193.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                Receipt 309210k.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                FROCH ENTERPRISE PROFILE.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                purchase order.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                LAjei2S8bg.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                QEpa8OLm9Z.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                calvary petroleum.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                SecuriteInfo.com.Trojan.PackedNET.405.1325.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                PO#453882.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                customer request.exeGet hashmaliciousBrowse
                                                • 198.54.126.165
                                                PO #4568.exeGet hashmaliciousBrowse
                                                • 162.0.229.222
                                                DHL_document11022020680908911.doc.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                Sidertaglio PO_20210305.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                WORK 152021.exeGet hashmaliciousBrowse
                                                • 68.65.120.142
                                                WORK 152021.exeGet hashmaliciousBrowse
                                                • 68.65.120.142
                                                WORK 152021.exeGet hashmaliciousBrowse
                                                • 68.65.120.142
                                                6cL8n8lldi.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                Import shipment.exeGet hashmaliciousBrowse
                                                • 198.54.126.165
                                                DHL_document11022020680908911.doc.exeGet hashmaliciousBrowse
                                                • 198.54.122.60

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\w73FtMA4ZTl9NFm.exe.log
                                                Process:C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1314
                                                Entropy (8bit):5.350128552078965
                                                Encrypted:false
                                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.920484439171507
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:w73FtMA4ZTl9NFm.exe
                                                File size:780800
                                                MD5:ff44bfe6955f4d11f915b4a0b818fc7c
                                                SHA1:3e094caff011346ad02aeafcb5769a519cf10dc0
                                                SHA256:929fd55e632471f4f35295e574c6814a3de9662398b7a606e352ecba9c52de7e
                                                SHA512:f4ee80c0bb0bae5532b880ffa704d8d99f06c0c6b3699b95be3e802347345b7cc62251ff16a0a1023303a1a72f987d39be271579652c0364485a82e7e2ab649d
                                                SSDEEP:12288:HTbGgj7huimS1wg0s/1wrLG1TvYmZVaIEjAYlwidyEggqEWMseF4YhY/bWGJdM5M:Hb9P06wrS1ketEjAY2C8xC4V/b/JdcM
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..`..............P......N......z.... ........@.. .......................@............@................................

                                                File Icon

                                                Icon Hash:7a983a6cc2d65e0e

                                                Static PE Info

                                                General

                                                Entrypoint:0x4bb87a
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x608FBD4C [Mon May 3 09:07:24 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbb8280x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x4a8c.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xb98800xb9a00False0.939983164983data7.93272076919IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0xbc0000x4a8c0x4c00False0.651521381579data6.39470058474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0xbc1900x468GLS_BINARY_LSB_FIRST
                                                RT_ICON0xbc5f80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4293585643, next used block 4292993507
                                                RT_ICON0xbd6a00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4290757309, next used block 4291283139
                                                RT_GROUP_ICON0xbfc480x30data
                                                RT_VERSION0xbfc780x38cPGP symmetric key encrypted data - Plaintext or unencrypted data
                                                RT_MANIFEST0xc00040xa85XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2018
                                                Assembly Version1.0.0.0
                                                InternalNameImporterCallback.exe
                                                FileVersion1.0.1.35
                                                CompanyNameUnguest
                                                LegalTrademarksUnguest
                                                CommentsA light media player
                                                ProductNameLightWatch
                                                ProductVersion1.0.1.35
                                                FileDescriptionLightWatch
                                                OriginalFilenameImporterCallback.exe

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                05/04/21-10:40:43.817012TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973680192.168.2.764.190.62.111
                                                05/04/21-10:40:43.817012TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973680192.168.2.764.190.62.111
                                                05/04/21-10:40:43.817012TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973680192.168.2.764.190.62.111

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                May 4, 2021 10:40:00.514503002 CEST4972280192.168.2.7198.54.117.212
                                                May 4, 2021 10:40:00.703320026 CEST8049722198.54.117.212192.168.2.7
                                                May 4, 2021 10:40:00.703558922 CEST4972280192.168.2.7198.54.117.212
                                                May 4, 2021 10:40:00.703862906 CEST4972280192.168.2.7198.54.117.212
                                                May 4, 2021 10:40:00.891145945 CEST8049722198.54.117.212192.168.2.7
                                                May 4, 2021 10:40:00.891181946 CEST8049722198.54.117.212192.168.2.7

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                May 4, 2021 10:38:27.274251938 CEST6195253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:27.337181091 CEST53619528.8.8.8192.168.2.7
                                                May 4, 2021 10:38:27.571257114 CEST5621753192.168.2.78.8.8.8
                                                May 4, 2021 10:38:27.631792068 CEST53562178.8.8.8192.168.2.7
                                                May 4, 2021 10:38:27.886861086 CEST6335453192.168.2.78.8.8.8
                                                May 4, 2021 10:38:27.944113970 CEST53633548.8.8.8192.168.2.7
                                                May 4, 2021 10:38:30.188781977 CEST5312953192.168.2.78.8.8.8
                                                May 4, 2021 10:38:30.245868921 CEST53531298.8.8.8192.168.2.7
                                                May 4, 2021 10:38:30.808514118 CEST6245253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:30.860119104 CEST53624528.8.8.8192.168.2.7
                                                May 4, 2021 10:38:32.994235039 CEST5782053192.168.2.78.8.8.8
                                                May 4, 2021 10:38:33.042834044 CEST53578208.8.8.8192.168.2.7
                                                May 4, 2021 10:38:33.132281065 CEST5084853192.168.2.78.8.8.8
                                                May 4, 2021 10:38:33.190620899 CEST53508488.8.8.8192.168.2.7
                                                May 4, 2021 10:38:33.974492073 CEST6124253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:34.025893927 CEST53612428.8.8.8192.168.2.7
                                                May 4, 2021 10:38:34.923136950 CEST5856253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:34.971805096 CEST53585628.8.8.8192.168.2.7
                                                May 4, 2021 10:38:36.600840092 CEST5659053192.168.2.78.8.8.8
                                                May 4, 2021 10:38:36.654328108 CEST53565908.8.8.8192.168.2.7
                                                May 4, 2021 10:38:37.921310902 CEST6050153192.168.2.78.8.8.8
                                                May 4, 2021 10:38:37.969991922 CEST53605018.8.8.8192.168.2.7
                                                May 4, 2021 10:38:43.196417093 CEST5377553192.168.2.78.8.8.8
                                                May 4, 2021 10:38:43.245058060 CEST53537758.8.8.8192.168.2.7
                                                May 4, 2021 10:38:44.969916105 CEST5183753192.168.2.78.8.8.8
                                                May 4, 2021 10:38:45.021517992 CEST53518378.8.8.8192.168.2.7
                                                May 4, 2021 10:38:46.549330950 CEST5541153192.168.2.78.8.8.8
                                                May 4, 2021 10:38:46.598040104 CEST53554118.8.8.8192.168.2.7
                                                May 4, 2021 10:38:48.739810944 CEST6366853192.168.2.78.8.8.8
                                                May 4, 2021 10:38:48.788449049 CEST53636688.8.8.8192.168.2.7
                                                May 4, 2021 10:38:49.571690083 CEST5464053192.168.2.78.8.8.8
                                                May 4, 2021 10:38:49.620564938 CEST53546408.8.8.8192.168.2.7
                                                May 4, 2021 10:38:49.772192955 CEST5873953192.168.2.78.8.8.8
                                                May 4, 2021 10:38:49.835701942 CEST53587398.8.8.8192.168.2.7
                                                May 4, 2021 10:38:51.379019022 CEST6033853192.168.2.78.8.8.8
                                                May 4, 2021 10:38:51.430614948 CEST53603388.8.8.8192.168.2.7
                                                May 4, 2021 10:38:52.055027962 CEST5871753192.168.2.78.8.8.8
                                                May 4, 2021 10:38:52.118779898 CEST53587178.8.8.8192.168.2.7
                                                May 4, 2021 10:38:53.719346046 CEST5976253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:53.768022060 CEST53597628.8.8.8192.168.2.7
                                                May 4, 2021 10:38:54.630981922 CEST5432953192.168.2.78.8.8.8
                                                May 4, 2021 10:38:54.679784060 CEST53543298.8.8.8192.168.2.7
                                                May 4, 2021 10:38:55.575962067 CEST5805253192.168.2.78.8.8.8
                                                May 4, 2021 10:38:55.624779940 CEST53580528.8.8.8192.168.2.7
                                                May 4, 2021 10:38:56.812608004 CEST5400853192.168.2.78.8.8.8
                                                May 4, 2021 10:38:56.862864971 CEST53540088.8.8.8192.168.2.7
                                                May 4, 2021 10:38:57.858282089 CEST5945153192.168.2.78.8.8.8
                                                May 4, 2021 10:38:57.907332897 CEST53594518.8.8.8192.168.2.7
                                                May 4, 2021 10:38:58.964731932 CEST5291453192.168.2.78.8.8.8
                                                May 4, 2021 10:38:59.016282082 CEST53529148.8.8.8192.168.2.7
                                                May 4, 2021 10:38:59.960361004 CEST6456953192.168.2.78.8.8.8
                                                May 4, 2021 10:39:00.012146950 CEST53645698.8.8.8192.168.2.7
                                                May 4, 2021 10:39:01.240840912 CEST5281653192.168.2.78.8.8.8
                                                May 4, 2021 10:39:01.289551973 CEST53528168.8.8.8192.168.2.7
                                                May 4, 2021 10:39:02.224230051 CEST5078153192.168.2.78.8.8.8
                                                May 4, 2021 10:39:02.272746086 CEST53507818.8.8.8192.168.2.7
                                                May 4, 2021 10:39:03.422473907 CEST5423053192.168.2.78.8.8.8
                                                May 4, 2021 10:39:03.471215963 CEST53542308.8.8.8192.168.2.7
                                                May 4, 2021 10:39:20.582250118 CEST5491153192.168.2.78.8.8.8
                                                May 4, 2021 10:39:20.640160084 CEST53549118.8.8.8192.168.2.7
                                                May 4, 2021 10:39:21.671339989 CEST4995853192.168.2.78.8.8.8
                                                May 4, 2021 10:39:21.720258951 CEST53499588.8.8.8192.168.2.7
                                                May 4, 2021 10:39:39.998779058 CEST5086053192.168.2.78.8.8.8
                                                May 4, 2021 10:39:40.085185051 CEST53508608.8.8.8192.168.2.7
                                                May 4, 2021 10:40:00.440198898 CEST5045253192.168.2.78.8.8.8
                                                May 4, 2021 10:40:00.507975101 CEST53504528.8.8.8192.168.2.7
                                                May 4, 2021 10:40:09.431843042 CEST5973053192.168.2.78.8.8.8
                                                May 4, 2021 10:40:09.480675936 CEST53597308.8.8.8192.168.2.7
                                                May 4, 2021 10:40:18.946024895 CEST5931053192.168.2.78.8.8.8
                                                May 4, 2021 10:40:19.006849051 CEST53593108.8.8.8192.168.2.7
                                                May 4, 2021 10:40:41.468286037 CEST5191953192.168.2.78.8.8.8
                                                May 4, 2021 10:40:41.589045048 CEST53519198.8.8.8192.168.2.7
                                                May 4, 2021 10:40:42.181191921 CEST6429653192.168.2.78.8.8.8
                                                May 4, 2021 10:40:42.238903046 CEST53642968.8.8.8192.168.2.7
                                                May 4, 2021 10:40:42.759850979 CEST5668053192.168.2.78.8.8.8
                                                May 4, 2021 10:40:42.858141899 CEST53566808.8.8.8192.168.2.7
                                                May 4, 2021 10:40:43.388113022 CEST5882053192.168.2.78.8.8.8
                                                May 4, 2021 10:40:43.445198059 CEST53588208.8.8.8192.168.2.7
                                                May 4, 2021 10:40:43.695204020 CEST6098353192.168.2.78.8.8.8
                                                May 4, 2021 10:40:43.769695997 CEST53609838.8.8.8192.168.2.7
                                                May 4, 2021 10:40:43.953584909 CEST4924753192.168.2.78.8.8.8
                                                May 4, 2021 10:40:44.010737896 CEST53492478.8.8.8192.168.2.7
                                                May 4, 2021 10:40:44.489113092 CEST5228653192.168.2.78.8.8.8
                                                May 4, 2021 10:40:44.552871943 CEST53522868.8.8.8192.168.2.7
                                                May 4, 2021 10:40:44.943425894 CEST5606453192.168.2.78.8.8.8
                                                May 4, 2021 10:40:45.056649923 CEST53560648.8.8.8192.168.2.7
                                                May 4, 2021 10:40:45.637821913 CEST6374453192.168.2.78.8.8.8
                                                May 4, 2021 10:40:45.695066929 CEST53637448.8.8.8192.168.2.7
                                                May 4, 2021 10:40:46.349450111 CEST6145753192.168.2.78.8.8.8
                                                May 4, 2021 10:40:46.407898903 CEST53614578.8.8.8192.168.2.7
                                                May 4, 2021 10:40:46.989115000 CEST5836753192.168.2.78.8.8.8
                                                May 4, 2021 10:40:47.039330959 CEST53583678.8.8.8192.168.2.7

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                May 4, 2021 10:38:27.571257114 CEST192.168.2.78.8.8.80xbd4cStandard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                                                May 4, 2021 10:39:39.998779058 CEST192.168.2.78.8.8.80x1021Standard query (0)www.findinkjams.comA (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.440198898 CEST192.168.2.78.8.8.80xca40Standard query (0)www.kompramania.comA (IP address)IN (0x0001)
                                                May 4, 2021 10:40:43.695204020 CEST192.168.2.78.8.8.80x4d9Standard query (0)www.sweette.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                May 4, 2021 10:38:27.631792068 CEST8.8.8.8192.168.2.70xbd4cNo error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                                                May 4, 2021 10:38:27.944113970 CEST8.8.8.8192.168.2.70x302bNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                May 4, 2021 10:39:40.085185051 CEST8.8.8.8192.168.2.70x1021Name error (3)www.findinkjams.comnonenoneA (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)www.kompramania.comparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:00.507975101 CEST8.8.8.8192.168.2.70xca40No error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                May 4, 2021 10:40:43.769695997 CEST8.8.8.8192.168.2.70x4d9No error (0)www.sweette.com64.190.62.111A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • www.kompramania.com

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.749722198.54.117.21280C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                May 4, 2021 10:40:00.703862906 CEST1646OUTGET /blm/?v4=jT8U/4hmrcCGqX5zF6RLU3xaP16cys1ENKtgh6K33uf7HOVcxmeLoGjIinA45QceqzYG68+/fQ==&Jr=V48DzvNH HTTP/1.1
                                                Host: www.kompramania.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:


                                                Code Manipulations

                                                User Modules

                                                Hook Summary

                                                Function NameHook TypeActive in Processes
                                                PeekMessageAINLINEexplorer.exe
                                                PeekMessageWINLINEexplorer.exe
                                                GetMessageWINLINEexplorer.exe
                                                GetMessageAINLINEexplorer.exe

                                                Processes

                                                Process: explorer.exe, Module: user32.dll
                                                Function NameHook TypeNew Data
                                                PeekMessageAINLINE0x48 0x8B 0xB8 0x85 0x5E 0xED
                                                PeekMessageWINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xED
                                                GetMessageWINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xED
                                                GetMessageAINLINE0x48 0x8B 0xB8 0x85 0x5E 0xED

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:10:38:35
                                                Start date:04/05/2021
                                                Path:C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
                                                Imagebase:0xfd0000
                                                File size:780800 bytes
                                                MD5 hash:FF44BFE6955F4D11F915B4A0B818FC7C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.246792230.0000000003635000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.247215566.00000000045E9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:10:38:39
                                                Start date:04/05/2021
                                                Path:C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe
                                                Imagebase:0xb00000
                                                File size:780800 bytes
                                                MD5 hash:FF44BFE6955F4D11F915B4A0B818FC7C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.287250589.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.288102436.00000000018D0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.287644899.0000000001550000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:10:38:41
                                                Start date:04/05/2021
                                                Path:C:\Windows\explorer.exe
                                                Wow64 process (32bit):false
                                                Commandline:
                                                Imagebase:0x7ff662bf0000
                                                File size:3933184 bytes
                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:10:38:56
                                                Start date:04/05/2021
                                                Path:C:\Windows\SysWOW64\cmstp.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\cmstp.exe
                                                Imagebase:0xa30000
                                                File size:82944 bytes
                                                MD5 hash:4833E65ED211C7F118D4A11E6FB58A09
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.508139744.0000000004460000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.502602967.0000000000680000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.505004698.0000000002C20000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:moderate

                                                General

                                                Start time:10:39:01
                                                Start date:04/05/2021
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:/c del 'C:\Users\user\Desktop\w73FtMA4ZTl9NFm.exe'
                                                Imagebase:0x960000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:10:39:01
                                                Start date:04/05/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff774ee0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >