Loading ...

Play interactive tourEdit tour

Analysis Report HU4TEm4Vr7

Overview

General Information

Sample Name:HU4TEm4Vr7 (renamed file extension from none to exe)
Analysis ID:408099
MD5:b15d974f421d3e19332c6094e56e314d
SHA1:b15f580af5e3e774fe02d8e7f1bce6fc250c05e6
SHA256:bc92df452b140f3ec4d88796ed0b9a5c74514349e785505ad55f0b82b1c9c1fa
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Emotet e-Banking trojan
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Yara signature match

Classification

Startup

  • System is w10x64
  • HU4TEm4Vr7.exe (PID: 4084 cmdline: 'C:\Users\user\Desktop\HU4TEm4Vr7.exe' MD5: B15D974F421D3E19332C6094E56E314D)
    • HU4TEm4Vr7.exe (PID: 1084 cmdline: C:\Users\user\Desktop\HU4TEm4Vr7.exe MD5: B15D974F421D3E19332C6094E56E314D)
  • msrarunning.exe (PID: 5772 cmdline: C:\Windows\SysWOW64\msrarunning.exe MD5: B15D974F421D3E19332C6094E56E314D)
    • msrarunning.exe (PID: 5800 cmdline: C:\Windows\SysWOW64\msrarunning.exe MD5: B15D974F421D3E19332C6094E56E314D)
  • svchost.exe (PID: 5920 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5812 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4872 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5900 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5728 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2588 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1752 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1256 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 4300 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 6176 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 7056 cmdline: 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 6616 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
    • 0x5b80:$snippet4: 33 C0 C7 05 C0 4C D3 00 D0 0A D3 00 C7 05 C4 4C D3 00 D0 0A D3 00 A3 C8 4C D3 00 A3 CC 4C D3 00 ...
    00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmpEmotetEmotet Payloadkevoreilly
      • 0x5b80:$snippet4: 33 C0 C7 05 C0 4C B2 00 D0 0A B2 00 C7 05 C4 4C B2 00 D0 0A B2 00 A3 C8 4C B2 00 A3 CC 4C B2 00 ...
      00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        Click to see the 3 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.HU4TEm4Vr7.exe.d20000.3.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          0.2.HU4TEm4Vr7.exe.d20000.3.unpackEmotetEmotet Payloadkevoreilly
          • 0x5f80:$snippet4: 33 C0 C7 05 C0 4C D3 00 D0 0A D3 00 C7 05 C4 4C D3 00 D0 0A D3 00 A3 C8 4C D3 00 A3 CC 4C D3 00 ...
          1.2.HU4TEm4Vr7.exe.aa0000.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
            1.2.HU4TEm4Vr7.exe.aa0000.2.unpackEmotetEmotet Payloadkevoreilly
            • 0x5f80:$snippet4: 33 C0 C7 05 C0 4C AB 00 D0 0A AB 00 C7 05 C4 4C AB 00 D0 0A AB 00 A3 C8 4C AB 00 A3 CC 4C AB 00 ...
            6.2.msrarunning.exe.1580000.3.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              Click to see the 3 entries

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus / Scanner detection for submitted sampleShow sources
              Source: HU4TEm4Vr7.exeAvira: detected
              Multi AV Scanner detection for submitted fileShow sources
              Source: HU4TEm4Vr7.exeVirustotal: Detection: 80%Perma Link
              Source: HU4TEm4Vr7.exeMetadefender: Detection: 67%Perma Link
              Source: HU4TEm4Vr7.exeReversingLabs: Detection: 100%
              Machine Learning detection for sampleShow sources
              Source: HU4TEm4Vr7.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2496 CryptDestroyHash,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA24F6 CryptDuplicateHash,CryptDecrypt,CryptDestroyHash,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2406 CryptDuplicateHash,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2466 CryptEncrypt,CryptDestroyHash,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2595 CryptVerifySignatureW,CryptDestroyHash,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA22C9 CryptGetHashParam,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2279 CryptExportKey,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA23B7 CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2399 CryptGenKey,CryptDestroyKey,CryptReleaseContext,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2335 CryptImportKey,LocalFree,CryptReleaseContext,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2314 CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582496 CryptDestroyHash,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582314 CryptDecodeObjectEx,CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582335 CryptImportKey,LocalFree,CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582399 CryptGenKey,CryptDestroyKey,CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015823B7 CryptCreateHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582279 CryptExportKey,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015822F5 CryptAcquireContextW,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582595 CryptVerifySignatureW,CryptDestroyHash,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582466 CryptEncrypt,CryptDestroyHash,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582406 CryptDuplicateHash,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015824F6 CryptDuplicateHash,CryptDecrypt,CryptDestroyHash,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015822C9 CryptGetHashParam,
              Source: HU4TEm4Vr7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: HU4TEm4Vr7.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: uigjhghio.pdb source: HU4TEm4Vr7.exe
              Source: global trafficTCP traffic: 192.168.2.3:49726 -> 105.228.198.254:7080
              Source: global trafficTCP traffic: 192.168.2.3:49731 -> 83.110.95.159:990
              Source: global trafficTCP traffic: 192.168.2.3:49738 -> 169.0.142.82:8080
              Source: global trafficTCP traffic: 192.168.2.3:49742 -> 187.205.170.3:990
              Source: global trafficTCP traffic: 192.168.2.3:49739 -> 189.152.183.239:80
              Source: unknownTCP traffic detected without corresponding DNS query: 105.228.198.254
              Source: unknownTCP traffic detected without corresponding DNS query: 105.228.198.254
              Source: unknownTCP traffic detected without corresponding DNS query: 105.228.198.254
              Source: unknownTCP traffic detected without corresponding DNS query: 169.0.142.82
              Source: unknownTCP traffic detected without corresponding DNS query: 169.0.142.82
              Source: unknownTCP traffic detected without corresponding DNS query: 169.0.142.82
              Source: unknownTCP traffic detected without corresponding DNS query: 189.152.183.239
              Source: unknownTCP traffic detected without corresponding DNS query: 189.152.183.239
              Source: unknownTCP traffic detected without corresponding DNS query: 189.152.183.239
              Source: unknownTCP traffic detected without corresponding DNS query: 187.205.170.3
              Source: unknownTCP traffic detected without corresponding DNS query: 187.205.170.3
              Source: unknownTCP traffic detected without corresponding DNS query: 187.205.170.3
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01581628 InternetReadFile,
              Source: msrarunning.exe, 00000006.00000003.315865067.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://105.228.198.254:7080/
              Source: msrarunning.exe, 00000006.00000003.315865067.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://105.228.198.254:7080/E
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://169.0.142.82:8080/
              Source: msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://169.0.142.82:8080/54
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://169.0.142.82:8080/nd
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://169.0.142.82:8080/vd
              Source: msrarunning.exe, 00000006.00000002.480504793.0000000000EFC000.00000004.00000001.sdmp, msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://187.205.170.3:990/
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://187.205.170.3:990/.95.159:990/
              Source: msrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpString found in binary or memory: http://187.205.170.3:990/54
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://187.205.170.3:990/Nd
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://187.205.170.3:990/fd
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://189.152.183.239/
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://189.152.183.239/Y
              Source: msrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpString found in binary or memory: http://189.152.183.239/t
              Source: msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://83.110.95.159:990/
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpString found in binary or memory: http://83.110.95.159:990/&d7-
              Source: msrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpString found in binary or memory: http://83.110.95.159:990/0
              Source: msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://83.110.95.159:990/54Q
              Source: msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpString found in binary or memory: http://83.110.95.159:990/V
              Source: svchost.exe, 00000009.00000002.483913722.000002EC13812000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: svchost.exe, 00000009.00000002.483913722.000002EC13812000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
              Source: svchost.exe, 00000009.00000002.483913722.000002EC13812000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
              Source: svchost.exe, 00000009.00000002.484840244.000002EC13B10000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
              Source: svchost.exe, 00000011.00000002.308960216.000001569B613000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.comr
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
              Source: svchost.exe, 00000011.00000003.308467618.000001569B65A000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
              Source: svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
              Source: svchost.exe, 00000011.00000003.308432109.000001569B648000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
              Source: svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
              Source: svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
              Source: svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
              Source: svchost.exe, 00000011.00000003.308467618.000001569B65A000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
              Source: svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
              Source: svchost.exe, 00000011.00000003.308397736.000001569B664000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
              Source: svchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
              Source: svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
              Source: svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
              Source: svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
              Source: svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.308960216.000001569B613000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
              Source: svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
              Source: svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
              Source: svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
              Source: svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
              Source: svchost.exe, 00000011.00000003.308432109.000001569B648000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
              Source: HU4TEm4Vr7.exe, 00000000.00000002.212318844.0000000000D9A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud:

              barindex
              Detected Emotet e-Banking trojanShow sources
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AACA89
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_0158CA89
              Yara detected EmotetShow sources
              Source: Yara matchFile source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.HU4TEm4Vr7.exe.d20000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.HU4TEm4Vr7.exe.aa0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.msrarunning.exe.1580000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.msrarunning.exe.b10000.2.unpack, type: UNPACKEDPE
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA2335 CryptImportKey,LocalFree,CryptReleaseContext,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01582335 CryptImportKey,LocalFree,CryptReleaseContext,

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet Payload Author: kevoreilly
              Source: 0.2.HU4TEm4Vr7.exe.d20000.3.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 1.2.HU4TEm4Vr7.exe.aa0000.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 6.2.msrarunning.exe.1580000.3.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: 5.2.msrarunning.exe.b10000.2.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AAC980 NtdllDefWindowProc_W,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_0158C980 NtdllDefWindowProc_W,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AADC10 _snwprintf,OpenServiceW,DeleteService,CloseServiceHandle,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA210D CreateProcessAsUserW,
              Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeFile deleted: C:\Windows\SysWOW64\msrarunning.exe:Zone.IdentifierJump to behavior
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3A692
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3B060
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3B8D4
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B35CC0
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3A330
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B34D6F
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B31357
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA56EF
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA56EF
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 5_2_00B156EF
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 5_2_00B156EF
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015856EF
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015856EF
              Source: HU4TEm4Vr7.exe, 00000001.00000002.231969004.0000000002D50000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs HU4TEm4Vr7.exe
              Source: HU4TEm4Vr7.exe, 00000001.00000002.232783286.0000000002E50000.00000002.00000001.sdmpBinary or memory string: originalfilename vs HU4TEm4Vr7.exe
              Source: HU4TEm4Vr7.exe, 00000001.00000002.232783286.0000000002E50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs HU4TEm4Vr7.exe
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeSection loaded: lz32.dll
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeSection loaded: lz32.dll
              Source: C:\Windows\SysWOW64\msrarunning.exeSection loaded: lz32.dll
              Source: C:\Windows\SysWOW64\msrarunning.exeSection loaded: lz32.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
              Source: HU4TEm4Vr7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, type: MEMORYMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 0.2.HU4TEm4Vr7.exe.d20000.3.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 1.2.HU4TEm4Vr7.exe.aa0000.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 6.2.msrarunning.exe.1580000.3.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: 5.2.msrarunning.exe.b10000.2.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
              Source: HU4TEm4Vr7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_EXPORT size: 0x1001 address: 0x0
              Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@20/8@0/6
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: _snwprintf,CreateServiceW,CloseServiceHandle,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: _snwprintf,CreateServiceW,CloseServiceHandle,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA1C10 CreateToolhelp32Snapshot,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AADD3B ChangeServiceConfig2W,
              Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etlJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7064:120:WilError_01
              Source: C:\Windows\SysWOW64\msrarunning.exeMutant created: \BaseNamedObjects\Global\ICA34BF57
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\MCA34BF57
              Source: C:\Windows\SysWOW64\msrarunning.exeMutant created: \BaseNamedObjects\PEM238
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ICA34BF57
              Source: C:\Windows\SysWOW64\msrarunning.exeMutant created: \BaseNamedObjects\PEM168C
              Source: HU4TEm4Vr7.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: HU4TEm4Vr7.exeVirustotal: Detection: 80%
              Source: HU4TEm4Vr7.exeMetadefender: Detection: 67%
              Source: HU4TEm4Vr7.exeReversingLabs: Detection: 100%
              Source: unknownProcess created: C:\Users\user\Desktop\HU4TEm4Vr7.exe 'C:\Users\user\Desktop\HU4TEm4Vr7.exe'
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeProcess created: C:\Users\user\Desktop\HU4TEm4Vr7.exe C:\Users\user\Desktop\HU4TEm4Vr7.exe
              Source: unknownProcess created: C:\Windows\SysWOW64\msrarunning.exe C:\Windows\SysWOW64\msrarunning.exe
              Source: C:\Windows\SysWOW64\msrarunning.exeProcess created: C:\Windows\SysWOW64\msrarunning.exe C:\Windows\SysWOW64\msrarunning.exe
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
              Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
              Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
              Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
              Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeProcess created: C:\Users\user\Desktop\HU4TEm4Vr7.exe C:\Users\user\Desktop\HU4TEm4Vr7.exe
              Source: C:\Windows\SysWOW64\msrarunning.exeProcess created: C:\Windows\SysWOW64\msrarunning.exe C:\Windows\SysWOW64\msrarunning.exe
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
              Source: HU4TEm4Vr7.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: HU4TEm4Vr7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: uigjhghio.pdb source: HU4TEm4Vr7.exe
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA1A36 LoadLibraryA,GetProcAddress,
              Source: HU4TEm4Vr7.exeStatic PE information: real checksum: 0x1000 should be: 0x915d4

              Persistence and Installation Behavior:

              barindex
              Drops executables to the windows directory (C:\Windows) and starts themShow sources
              Source: C:\Windows\SysWOW64\msrarunning.exeExecutable created and started: C:\Windows\SysWOW64\msrarunning.exe
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exePE file moved: C:\Windows\SysWOW64\msrarunning.exeJump to behavior
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AADD51 StartServiceW,CloseServiceHandle,CloseServiceHandle,

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeFile opened: C:\Windows\SysWOW64\msrarunning.exe:Zone.Identifier read attributes | delete
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Tries to detect virtualization through RDTSC time measurementsShow sources
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeRDTSC instruction interceptor: First address: 0000000000B33AF1 second address: 0000000000B33AF7 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, edx 0x00000004 mov esi, eax 0x00000006 rdtsc
              Source: C:\Windows\SysWOW64\msrarunning.exeRDTSC instruction interceptor: First address: 0000000000B33AF1 second address: 0000000000B33AF7 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, edx 0x00000004 mov esi, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3C7F0 rdtsc
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: EnumServicesStatusExW,GetTickCount,OpenServiceW,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: EnumServicesStatusExW,GetLastError,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: EnumServicesStatusExW,GetTickCount,OpenServiceW,
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: EnumServicesStatusExW,GetLastError,
              Source: C:\Windows\SysWOW64\msrarunning.exeAPI coverage: 9.1 %
              Source: C:\Windows\System32\svchost.exe TID: 3016Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeFile Volume queried: C:\ FullSizeInformation
              Source: svchost.exe, 00000007.00000002.250563753.0000023BACEA0000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.299633906.0000021FC0F40000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.482752660.000001879E740000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.345743598.000001FAAE860000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWP
              Source: svchost.exe, 00000009.00000002.484316810.000002EC13860000.00000004.00000001.sdmpBinary or memory string: @Hyper-V RAW
              Source: msrarunning.exe, 00000006.00000003.315865067.00000000012D4000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.484208899.000002EC13853000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
              Source: svchost.exe, 0000000D.00000002.480691086.0000021AD4602000.00000004.00000001.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
              Source: svchost.exe, 00000009.00000002.480719156.000002EC0E229000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW@Q
              Source: msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%q
              Source: svchost.exe, 00000007.00000002.250563753.0000023BACEA0000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.299633906.0000021FC0F40000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.482752660.000001879E740000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.345743598.000001FAAE860000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: svchost.exe, 00000007.00000002.250563753.0000023BACEA0000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.299633906.0000021FC0F40000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.482752660.000001879E740000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.345743598.000001FAAE860000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: svchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.480907992.00000251E1029000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: svchost.exe, 00000007.00000002.250563753.0000023BACEA0000.00000002.00000001.sdmp, svchost.exe, 0000000B.00000002.299633906.0000021FC0F40000.00000002.00000001.sdmp, svchost.exe, 0000000E.00000002.482752660.000001879E740000.00000002.00000001.sdmp, svchost.exe, 00000015.00000002.345743598.000001FAAE860000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: svchost.exe, 0000000D.00000002.480881764.0000021AD463E000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll @
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 0_2_00B3C7F0 rdtsc
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA1A36 LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA21B0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA1530 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 5_2_00B121B0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 5_2_00B11530 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_01581530 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\msrarunning.exeCode function: 6_2_015821B0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA17C0 GetProcessHeap,RtlAllocateHeap,
              Source: svchost.exe, 0000000F.00000002.481794332.00000174B4790000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: svchost.exe, 0000000F.00000002.481794332.00000174B4790000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: svchost.exe, 0000000F.00000002.481794332.00000174B4790000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: svchost.exe, 0000000F.00000002.481794332.00000174B4790000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\msrarunning.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\HU4TEm4Vr7.exeCode function: 1_2_00AA277F RtlGetVersion,GetNativeSystemInfo,
              Source: C:\Windows\SysWOW64\msrarunning.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Lowering of HIPS / PFW / Operating System Security Settings:

              barindex
              Changes security center settings (notifications, updates, antivirus, firewall)Show sources
              Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
              Source: svchost.exe, 00000013.00000002.480614182.000002A6ECD02000.00000004.00000001.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
              Source: svchost.exe, 00000013.00000002.480614182.000002A6ECD02000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct

              Stealing of Sensitive Information:

              barindex
              Yara detected EmotetShow sources
              Source: Yara matchFile source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.HU4TEm4Vr7.exe.d20000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.HU4TEm4Vr7.exe.aa0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.msrarunning.exe.1580000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.msrarunning.exe.b10000.2.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1Windows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Service Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
              Default AccountsNative API1Valid Accounts1Valid Accounts1DLL Side-Loading1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsService Execution12Windows Service12Access Token Manipulation1File Deletion1Security Account ManagerSystem Information Discovery124SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Windows Service12Masquerading121NTDSSecurity Software Discovery161Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptProcess Injection2Valid Accounts1LSA SecretsVirtualization/Sandbox Evasion3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsProcess Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion3DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              HU4TEm4Vr7.exe80%VirustotalBrowse
              HU4TEm4Vr7.exe68%MetadefenderBrowse
              HU4TEm4Vr7.exe100%ReversingLabsWin32.Trojan.Emotet
              HU4TEm4Vr7.exe100%AviraHEUR/AGEN.1128381
              HU4TEm4Vr7.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              1.2.HU4TEm4Vr7.exe.750118.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.HU4TEm4Vr7.exe.b30000.1.unpack100%AviraHEUR/AGEN.1128381Download File
              1.2.HU4TEm4Vr7.exe.a80000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.2.msrarunning.exe.ad0118.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.HU4TEm4Vr7.exe.d20000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.HU4TEm4Vr7.exe.b30000.3.unpack100%AviraHEUR/AGEN.1128381Download File
              6.0.msrarunning.exe.b30000.0.unpack100%AviraHEUR/AGEN.1128381Download File
              1.2.HU4TEm4Vr7.exe.aa0000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              6.2.msrarunning.exe.1560000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.HU4TEm4Vr7.exe.b30000.0.unpack100%AviraHEUR/AGEN.1128381Download File
              0.2.HU4TEm4Vr7.exe.d00000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.0.HU4TEm4Vr7.exe.b30000.0.unpack100%AviraHEUR/AGEN.1128381Download File
              0.2.HU4TEm4Vr7.exe.b00118.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              6.2.msrarunning.exe.10d0118.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.2.msrarunning.exe.b30000.3.unpack100%AviraHEUR/AGEN.1128381Download File
              5.2.msrarunning.exe.b10000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              6.2.msrarunning.exe.1580000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.msrarunning.exe.b30000.0.unpack100%AviraHEUR/AGEN.1128381Download File
              5.2.msrarunning.exe.af0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              6.2.msrarunning.exe.b30000.0.unpack100%AviraHEUR/AGEN.1128381Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://83.110.95.159:990/00%Avira URL Cloudsafe
              http://105.228.198.254:7080/0%Avira URL Cloudsafe
              http://105.228.198.254:7080/E0%Avira URL Cloudsafe
              http://83.110.95.159:990/V0%Avira URL Cloudsafe
              http://189.152.183.239/0%Avira URL Cloudsafe
              http://83.110.95.159:990/0%Avira URL Cloudsafe
              http://187.205.170.3:990/0%Avira URL Cloudsafe
              http://187.205.170.3:990/540%Avira URL Cloudsafe
              http://189.152.183.239/Y0%Avira URL Cloudsafe
              http://83.110.95.159:990/&d7-0%Avira URL Cloudsafe
              http://189.152.183.239/t0%Avira URL Cloudsafe
              http://187.205.170.3:990/fd0%Avira URL Cloudsafe
              http://83.110.95.159:990/54Q0%Avira URL Cloudsafe
              http://169.0.142.82:8080/540%Avira URL Cloudsafe
              http://169.0.142.82:8080/nd0%Avira URL Cloudsafe
              https://activity.windows.comr0%URL Reputationsafe
              https://activity.windows.comr0%URL Reputationsafe
              https://activity.windows.comr0%URL Reputationsafe
              https://%s.xboxlive.com0%URL Reputationsafe
              https://%s.xboxlive.com0%URL Reputationsafe
              https://%s.xboxlive.com0%URL Reputationsafe
              http://187.205.170.3:990/.95.159:990/0%Avira URL Cloudsafe
              http://169.0.142.82:8080/vd0%Avira URL Cloudsafe
              http://169.0.142.82:8080/0%Avira URL Cloudsafe
              http://187.205.170.3:990/Nd0%Avira URL Cloudsafe
              https://dynamic.t0%URL Reputationsafe
              https://dynamic.t0%URL Reputationsafe
              https://dynamic.t0%URL Reputationsafe
              https://%s.dnet.xboxlive.com0%URL Reputationsafe
              https://%s.dnet.xboxlive.com0%URL Reputationsafe
              https://%s.dnet.xboxlive.com0%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://83.110.95.159:990/0msrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpfalse
                high
                https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                  high
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpfalse
                    high
                    https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                      high
                      https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000011.00000003.308432109.000001569B648000.00000004.00000001.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                          high
                          https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpfalse
                            high
                            https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                              high
                              https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000011.00000003.308467618.000001569B65A000.00000004.00000001.sdmpfalse
                                high
                                http://105.228.198.254:7080/msrarunning.exe, 00000006.00000003.315865067.00000000012D4000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpfalse
                                  high
                                  http://105.228.198.254:7080/Emsrarunning.exe, 00000006.00000003.315865067.00000000012D4000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://83.110.95.159:990/Vmsrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpfalse
                                    high
                                    http://189.152.183.239/msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://83.110.95.159:990/msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://187.205.170.3:990/msrarunning.exe, 00000006.00000002.480504793.0000000000EFC000.00000004.00000001.sdmp, msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://187.205.170.3:990/54msrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://appexmapsappupdate.blob.core.windows.netsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                      high
                                      http://189.152.183.239/Ymsrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.bingmapsportal.comsvchost.exe, 00000011.00000002.308960216.000001569B613000.00000004.00000001.sdmpfalse
                                        high
                                        https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpfalse
                                          high
                                          http://83.110.95.159:990/&d7-msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                            high
                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000011.00000003.308508445.000001569B640000.00000004.00000001.sdmpfalse
                                              high
                                              http://189.152.183.239/tmsrarunning.exe, 00000006.00000002.481824760.00000000012D5000.00000004.00000020.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://187.205.170.3:990/fdmsrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://83.110.95.159:990/54Qmsrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmpfalse
                                                high
                                                http://169.0.142.82:8080/54msrarunning.exe, 00000006.00000003.407481618.00000000012D4000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://169.0.142.82:8080/ndmsrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://activity.windows.comrsvchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000011.00000002.309004954.000001569B63D000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.308960216.000001569B613000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://%s.xboxlive.comsvchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      low
                                                      https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000011.00000003.308432109.000001569B648000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://187.205.170.3:990/.95.159:990/msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://169.0.142.82:8080/vdmsrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://169.0.142.82:8080/msrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://187.205.170.3:990/Ndmsrarunning.exe, 00000006.00000002.481678795.0000000001297000.00000004.00000020.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.svchost.exe, 00000009.00000002.484840244.000002EC13B10000.00000002.00000001.sdmpfalse
                                                                  high
                                                                  https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://dynamic.tsvchost.exe, 00000011.00000003.308397736.000001569B664000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000011.00000003.286711862.000001569B632000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          https://activity.windows.comsvchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000011.00000003.308415825.000001569B661000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              https://%s.dnet.xboxlive.comsvchost.exe, 0000000E.00000002.480441275.000001879DA41000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              low
                                                                              https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000011.00000002.309028609.000001569B65C000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000011.00000003.308467618.000001569B65A000.00000004.00000001.sdmpfalse
                                                                                  high

                                                                                  Contacted IPs

                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs

                                                                                  Public

                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  189.152.183.239
                                                                                  unknownMexico
                                                                                  8151UninetSAdeCVMXfalse
                                                                                  105.228.198.254
                                                                                  unknownSouth Africa
                                                                                  37457Telkom-InternetZAfalse
                                                                                  187.205.170.3
                                                                                  unknownMexico
                                                                                  8151UninetSAdeCVMXfalse
                                                                                  169.0.142.82
                                                                                  unknownSouth Africa
                                                                                  37611AfrihostZAfalse
                                                                                  83.110.95.159
                                                                                  unknownUnited Arab Emirates
                                                                                  5384EMIRATES-INTERNETEmiratesInternetAEfalse

                                                                                  Private

                                                                                  IP
                                                                                  127.0.0.1

                                                                                  General Information

                                                                                  Joe Sandbox Version:32.0.0 Black Diamond
                                                                                  Analysis ID:408099
                                                                                  Start date:08.05.2021
                                                                                  Start time:12:32:47
                                                                                  Joe Sandbox Product:CloudBasic
                                                                                  Overall analysis duration:0h 12m 24s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:light
                                                                                  Sample file name:HU4TEm4Vr7 (renamed file extension from none to exe)
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                  Number of analysed new started processes analysed:29
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • HDC enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Detection:MAL
                                                                                  Classification:mal100.bank.troj.evad.winEXE@20/8@0/6
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HDC Information:
                                                                                  • Successful, ratio: 43.5% (good quality ratio 31.7%)
                                                                                  • Quality average: 53.4%
                                                                                  • Quality standard deviation: 38.4%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 92%
                                                                                  • Number of executed functions: 0
                                                                                  • Number of non-executed functions: 0
                                                                                  Cookbook Comments:
                                                                                  • Adjust boot time
                                                                                  • Enable AMSI
                                                                                  Warnings:
                                                                                  Show All
                                                                                  • Excluded IPs from analysis (whitelisted): 52.147.198.201, 20.82.210.154, 104.43.139.144, 184.30.21.219, 92.122.145.220, 184.30.20.56, 92.122.213.194, 92.122.213.247, 67.26.81.254, 67.26.75.254, 8.253.207.121, 8.248.133.254, 67.27.157.126, 20.54.26.129, 20.82.209.183
                                                                                  • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                  Simulations

                                                                                  Behavior and APIs

                                                                                  TimeTypeDescription
                                                                                  12:34:01API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                  12:35:17API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                                  Joe Sandbox View / Context

                                                                                  IPs

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  105.228.198.254Month notice.docGet hashmaliciousBrowse
                                                                                  • 105.228.198.254:7080/
                                                                                  Month notice.docGet hashmaliciousBrowse
                                                                                  • 105.228.198.254:7080/
                                                                                  169.0.142.82Month notice.docGet hashmaliciousBrowse
                                                                                  • /
                                                                                  83.110.95.159IRS Tax Return Transcript - 12 08 2018.docGet hashmaliciousBrowse
                                                                                  • 83.110.95.159:990/
                                                                                  Month notice.docGet hashmaliciousBrowse
                                                                                  • 83.110.95.159:990/

                                                                                  Domains

                                                                                  No context

                                                                                  ASN

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  UninetSAdeCVMXuIsv6VTOek.exeGet hashmaliciousBrowse
                                                                                  • 189.236.94.20
                                                                                  JRyLnlTR1OGet hashmaliciousBrowse
                                                                                  • 187.155.32.120
                                                                                  rIbyGX66OpGet hashmaliciousBrowse
                                                                                  • 187.213.209.8
                                                                                  MGuvcs6OczGet hashmaliciousBrowse
                                                                                  • 187.212.113.5
                                                                                  4JQil8gLKdGet hashmaliciousBrowse
                                                                                  • 187.237.112.160
                                                                                  z3hir.x86Get hashmaliciousBrowse
                                                                                  • 187.133.88.128
                                                                                  YPJ9DZYIpOGet hashmaliciousBrowse
                                                                                  • 189.159.92.87
                                                                                  yx8DBT3r5r.exeGet hashmaliciousBrowse
                                                                                  • 187.141.74.3
                                                                                  PDFXCview.exeGet hashmaliciousBrowse
                                                                                  • 189.253.43.137
                                                                                  MV9tCJw8Xr.exeGet hashmaliciousBrowse
                                                                                  • 187.193.221.143
                                                                                  networkmanagerGet hashmaliciousBrowse
                                                                                  • 187.139.136.15
                                                                                  mozi.a.zipGet hashmaliciousBrowse
                                                                                  • 189.222.218.142
                                                                                  yVn2ywuhEC.exeGet hashmaliciousBrowse
                                                                                  • 189.250.0.174
                                                                                  davay.exeGet hashmaliciousBrowse
                                                                                  • 189.166.116.175
                                                                                  mssecsvc.exeGet hashmaliciousBrowse
                                                                                  • 159.17.172.55
                                                                                  mssecsvc.exeGet hashmaliciousBrowse
                                                                                  • 187.218.225.217
                                                                                  iGet hashmaliciousBrowse
                                                                                  • 148.233.132.212
                                                                                  svchost.exeGet hashmaliciousBrowse
                                                                                  • 189.176.23.190
                                                                                  Ew5QOJnig6.exeGet hashmaliciousBrowse
                                                                                  • 192.100.170.12
                                                                                  fdwv4hWF1M.exeGet hashmaliciousBrowse
                                                                                  • 201.145.174.230
                                                                                  Telkom-InternetZAbXSINeHUUZ.dllGet hashmaliciousBrowse
                                                                                  • 105.240.76.174
                                                                                  sample2.dllGet hashmaliciousBrowse
                                                                                  • 105.184.50.206
                                                                                  NormhjTcQb.exeGet hashmaliciousBrowse
                                                                                  • 105.226.116.234
                                                                                  oBftD9JG5h.exeGet hashmaliciousBrowse
                                                                                  • 105.224.170.204
                                                                                  nz4tO3gfdT.dllGet hashmaliciousBrowse
                                                                                  • 105.228.152.67
                                                                                  newageGet hashmaliciousBrowse
                                                                                  • 105.186.75.236
                                                                                  IRS Tax Return Transcript - 12 08 2018.docGet hashmaliciousBrowse
                                                                                  • 105.228.198.254
                                                                                  Month notice.docGet hashmaliciousBrowse
                                                                                  • 105.228.198.254
                                                                                  Month notice.docGet hashmaliciousBrowse
                                                                                  • 105.228.198.254
                                                                                  uTorrent Stable(3.4.2 build 37754).exeGet hashmaliciousBrowse
                                                                                  • 105.227.145.109
                                                                                  69DOC-J37480518.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  59ACC_C17962.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  59ACC_C17962.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  17ACC367677.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  17ACC367677.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  7ACC_P7464.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  17FILE-0740435.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  52DOC-S3722.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  5DOC-469059.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216
                                                                                  31DOC-J4470351912.docGet hashmaliciousBrowse
                                                                                  • 105.184.93.216

                                                                                  JA3 Fingerprints

                                                                                  No context

                                                                                  Dropped Files

                                                                                  No context

                                                                                  Created / dropped Files

                                                                                  C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):4096
                                                                                  Entropy (8bit):0.5963698724903859
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:0FuSqk1GaD0JOCEfMuaaD0JOCEfMKQmD22SAAl/gz2cE0fMbhEZolrRSQ2hyYIIT:0PGaD0JcaaD0JwQQRtAg/0bjSQJ
                                                                                  MD5:09DA49C7EECAD81B6EBF128183245165
                                                                                  SHA1:5891BCC9A7C502DF909035B989E39510F61D4F68
                                                                                  SHA-256:5C93FB9C745D5A0738EE9CAF0BAB821546BE1B5B3885C0B69A843D1720DCE6A5
                                                                                  SHA-512:20C96B68F38419287AB6362498A4976E123E79C96CFED3435F8D19DE4B7AC51F3DD2978832E255BBD2D5F4A81328DCB7D1DFE0DC41E61741936D0AD143EA91A4
                                                                                  Malicious:false
                                                                                  Preview: ......:{..(......"...y5.............. ..1C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................."...y5...........&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G............................................................................................................................................................................................................
                                                                                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9e0bd297, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):0.09590510762507905
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:Ezwl/+QeU1RIE11Y8TRXtuuleKCzwl/+QeU1RIE11Y8TRXtuuleK:E0+DU1O4bltVleKC0+DU1O4bltVleK
                                                                                  MD5:9D533A5A9185C6667255D2B037516044
                                                                                  SHA1:EE2F7E16AF46F886FC087248A8F741B12FF264A8
                                                                                  SHA-256:B9C10F6156B684371F0DF875C7FC9800DA8E4D9D4257BDFDB0BEECF3CF93C002
                                                                                  SHA-512:3E2F1F08B4F5DDBCE8C30309837575A07F1079DFEFF776C49D61502CF5A7CF1AE51EB5112642472B9442A3FB671122AE1147C938C0DE452ED05B26A776D0C187
                                                                                  Malicious:false
                                                                                  Preview: ...... ................e.f.3...w........................&..........w..."...y..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w........................................................................................................................................................................................................................................@.."...y.k.................|..."...y..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):8192
                                                                                  Entropy (8bit):0.11126258918616926
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:p0mtl1EvkH2wuXl/bJdAtiztWS4ll:ailQk3At4B
                                                                                  MD5:4135BCECC9BB771C45F5367D06C30CB1
                                                                                  SHA1:30682A668D5BE72306BB21A6E3FEC624776B286A
                                                                                  SHA-256:88E175AA8B25C33ACFBF0265EA9A99541942E1C34E1EA7378B45EA66A6447B83
                                                                                  SHA-512:A12C346518B6BFFC8554EB0F1DD74E04D36E3DC61604094E3B1D8F970B945657E4A045A7E4DED8D0B3958EA632D9CA0F6F0DF55CBFF1DDBF06A6A796E31D2621
                                                                                  Malicious:false
                                                                                  Preview: .$XQ.....................................3...w..."...y.......w...............w.......w....:O.....w...................|..."...y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.1100472575674534
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:261TXm/Ey6q9995pU3mq3qQ10nMCldimE8eawHjcV/0P:261Kl68iDLyMCldzE9BHjcd0P
                                                                                  MD5:F1B8A92F2EC4B3C6C0A9D64406FEB398
                                                                                  SHA1:1E35D716BDA3BB8BE53B9BDA5F4CE16FA06C9261
                                                                                  SHA-256:FB893D0C4A989D9D0945247C7BEE293A01D167291549258E1624B8775244F28C
                                                                                  SHA-512:EC9C7EAD9E22755A6F6D83CA1184B9D1955F71B40E0D08901BF3017D980716FCFE5ED3BABEA73E0744CE4FCAA39EB15728A89EAF21347773E1A60639B20632B4
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................p................................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................#../..... .....]. AD..........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.p...............................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11256350126691057
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:/TXm/Ey6q9995pUo1miM3qQ10nMCldimE8eawHza1miIP/:/Kl68/1tMLyMCldzE9BHza1tIP/
                                                                                  MD5:85948CD99470140A4B69F11E14715988
                                                                                  SHA1:7D533DE7ABC28D7F74638264F4E94B803C2A83C8
                                                                                  SHA-256:04BA79C0C87D3EACDB85030E2139FFC8F8E8D166FBE85DF7AAD02ACCD1BAFCC8
                                                                                  SHA-512:5875A0E32A81FBB03A4F731A63E02E88EF3221F9B0AA62833591A2B927E027A14CDA22C8C928A58A3C3405CBACC946145DB026A6CF7F7D3EA23B848D1F5C95EA
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................p................................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................#../..... ....... AD..........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P.p..............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11236779795229494
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:AXm/Ey6q9995pUo1mK2P3qQ10nMCldimE8eawHza1mKUc:xl68H1iPLyMCldzE9BHza14c
                                                                                  MD5:DF313122F681B78476F22984B7653520
                                                                                  SHA1:FB6FCD875713089D9907F53544B876A6FC08BC3F
                                                                                  SHA-256:A4D4C7D883E5A1326B61CDA404200D5D603CB0FBD9056044121C87A33E05A844
                                                                                  SHA-512:21C433CA4CAC03545C8D31996C4B1A3B4BE89BB8F324A81B6ED92F7B63EE61298B695929A33960AB79C9D83B454B484514B88D964F048F44711CDA3181F7141C
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................p........<.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................#../..... ........ AD..........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P.p.......2E......................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):55
                                                                                  Entropy (8bit):4.306461250274409
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                  Malicious:false
                                                                                  Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                  C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                                  Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):906
                                                                                  Entropy (8bit):3.1569243444383877
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:58KRBubdpkoF1AG3rZOyR8Nk9+MlWlLehB4yAq7ejC4OyR8IlI:OaqdmuF3rIy+kWReH4yJ7MgIO
                                                                                  MD5:A0462341CDFC29DF1A9CD9D13C61B151
                                                                                  SHA1:08746F2CBEE01CAA4E8B5CBB344A2705CF06FAFD
                                                                                  SHA-256:1AB3D208A30FE144B1972D31E87D1BDAE8262C29D1CE36A04F8BFE1B0DF041F3
                                                                                  SHA-512:3FFCC841501C3B676D0040DA92F686788D9678C53B4850FE66C1B8401F7387464B0724A8C408DCC041BEDC33FC48671FE103B08EDBC8151D119587BC60F023A2
                                                                                  Malicious:false
                                                                                  Preview: ........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. S.a.t. .. M.a.y. .. 0.8. .. 2.0.2.1. .1.2.:.3.5.:.1.6.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. S.a.t. .. M.a.y. .. 0.8. .. 2.0.2.1. .1.2.:.3.5.:.1.7.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....

                                                                                  Static File Info

                                                                                  General

                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):4.796567814011747
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:HU4TEm4Vr7.exe
                                                                                  File size:536576
                                                                                  MD5:b15d974f421d3e19332c6094e56e314d
                                                                                  SHA1:b15f580af5e3e774fe02d8e7f1bce6fc250c05e6
                                                                                  SHA256:bc92df452b140f3ec4d88796ed0b9a5c74514349e785505ad55f0b82b1c9c1fa
                                                                                  SHA512:3ad0beec45722a4170830bdb981eb42e2b3d907ee69c8a4f2e441e86aad416a078da74add47489c53d8894a2b6dc666f335f60cb64bb57d0818d445978cb1ff1
                                                                                  SSDEEP:3072:NXydx2FXLHpkc8NyyEoNCS2Fonl24y1mEd2pJH9QVWrZ6c3BTYE8:IWLHHvwQgHEd2p5Ww56E
                                                                                  File Content Preview:MZ......................@.......................................nS beFC.. ich@q RxSg..SnS.... run in DOS.!.his progr.L.!Tcannotmmode....$...........@qnS@qnS@q..jR^#.SR/..S.*lSe..Sa...R............PE..L...Ud.\............................0A............@....

                                                                                  File Icon

                                                                                  Icon Hash:00828e8e8686b000

                                                                                  Static PE Info

                                                                                  General

                                                                                  Entrypoint:0x404130
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                  Time Stamp:0x5C0A6455 [Fri Dec 7 12:15:17 2018 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:0
                                                                                  File Version Major:5
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:a66aef82c3738d30b87eed50696699d2

                                                                                  Entrypoint Preview

                                                                                  Instruction
                                                                                  call 00007FFB7CC34BA0h
                                                                                  mov dword ptr [ebp-04h], eax
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push ebx
                                                                                  push edi
                                                                                  push esi
                                                                                  and esp, FFFFFFF8h
                                                                                  sub esp, 000000B0h
                                                                                  mov eax, dword ptr [ebp+10h]
                                                                                  mov ecx, dword ptr [ebp+0Ch]
                                                                                  mov edx, dword ptr [ebp+08h]
                                                                                  mov esi, dword ptr [esp+000000A0h]
                                                                                  mov edi, dword ptr [esp+000000A4h]
                                                                                  mov ebx, esi
                                                                                  and ebx, ebx
                                                                                  mov dword ptr [esp+54h], eax
                                                                                  mov eax, edi
                                                                                  and eax, eax
                                                                                  mov dword ptr [esp+000000A4h], eax
                                                                                  mov dword ptr [esp+000000A0h], ebx
                                                                                  mov dword ptr [esp+0000009Ch], 00CE25BCh
                                                                                  mov dword ptr [esp+00000094h], 00000000h
                                                                                  mov dword ptr [esp+00000090h], 006CC7C6h
                                                                                  mov eax, esi
                                                                                  not eax
                                                                                  mov ebx, edi
                                                                                  not ebx
                                                                                  mov dword ptr [esp+000000A4h], ebx
                                                                                  mov dword ptr [esp+000000A0h], eax
                                                                                  mov eax, dword ptr [esp+00000090h]
                                                                                  mov ebx, dword ptr [esp+00000094h]
                                                                                  mov dword ptr [esp+50h], eax
                                                                                  mov eax, esi
                                                                                  xor eax, 2E4EF8F4h
                                                                                  mov dword ptr [esp+000000A4h], edi
                                                                                  mov dword ptr [esp+000000A0h], eax
                                                                                  mov eax, dword ptr [esp+00000098h]
                                                                                  mov dword ptr [esp+4Ch], eax
                                                                                  xor eax, eax
                                                                                  mov dword ptr [esp+48h], eax
                                                                                  mov eax, 6EB0EDC0h
                                                                                  mov dword ptr [esp+44h], ecx

                                                                                  Data Directories

                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x1001
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe0d00xb4.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000xa88DATA
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x830000x53c.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xd0900x38.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0xd0000x84.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                  Sections

                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000xba1c0xc000False0.502685546875data5.68974196082IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0xd0000x14580x2000False0.339721679688data3.15443502703IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0xf0000x72fc40x72000False0.19159470943data4.47393552065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                  DATA0x820000xa880x1000False0.236328125data2.4534078274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x830000x53c0x1000False0.276611328125data2.73244821786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                  Resources

                                                                                  NameRVASizeTypeLanguageCountry
                                                                                  RT_DIALOG0x821600x1b4dataEnglishUnited States
                                                                                  RT_STRING0x823180x1f8dataEnglishUnited States
                                                                                  RT_STRING0x825100x52dataEnglishUnited States
                                                                                  RT_STRING0x825680x15cdataEnglishUnited States
                                                                                  RT_VERSION0x826c80x3bcdataEnglishUnited States

                                                                                  Imports

                                                                                  DLLImport
                                                                                  SHLWAPI.dllStrChrA
                                                                                  LZ32.dllLZSeek
                                                                                  SETUPAPI.dllSetupDiDestroyDriverInfoList
                                                                                  Secur32.dllGetComputerObjectNameW
                                                                                  GDI32.dllLineTo
                                                                                  USER32.dllInsertMenuA, GetFocus, GetPriorityClipboardFormat, DdeFreeStringHandle, GetUpdateRect, PackDDElParam, CallMsgFilterA
                                                                                  KERNEL32.dllGetVolumePathNamesForVolumeNameW, lstrlenW, GlobalMemoryStatus, GetBinaryTypeW, FillConsoleOutputAttribute, GetCommMask, GetTickCount, GetNamedPipeClientComputerNameW, GetDriveTypeW, GetUserDefaultLangID, GetModuleHandleA, GetStringTypeExA
                                                                                  RPCRT4.dllRpcRevertToSelf

                                                                                  Version Infos

                                                                                  DescriptionData
                                                                                  LegalCopyright Microsoft Corporation. All
                                                                                  InternalNameIdS
                                                                                  FileVersion6.1.7600
                                                                                  CompanyNameMicrosoft Corporat
                                                                                  LegalTrademarksMicrosoft is a registered trademark of Microsoft Corporation. Windows(TM) is a trademark of Microsoft Corporation
                                                                                  ProductNameMic
                                                                                  FileDescriptionIdenti
                                                                                  ProuctVersionVersion 4.0
                                                                                  Translation0x0409 0x04e4

                                                                                  Possible Origin

                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishUnited States

                                                                                  Network Behavior

                                                                                  Network Port Distribution

                                                                                  TCP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  May 8, 2021 12:34:07.546890020 CEST497267080192.168.2.3105.228.198.254
                                                                                  May 8, 2021 12:34:10.557920933 CEST497267080192.168.2.3105.228.198.254
                                                                                  May 8, 2021 12:34:16.589679003 CEST497267080192.168.2.3105.228.198.254
                                                                                  May 8, 2021 12:34:29.021936893 CEST49731990192.168.2.383.110.95.159
                                                                                  May 8, 2021 12:34:32.200385094 CEST49731990192.168.2.383.110.95.159
                                                                                  May 8, 2021 12:34:38.372795105 CEST49731990192.168.2.383.110.95.159
                                                                                  May 8, 2021 12:34:50.457331896 CEST497388080192.168.2.3169.0.142.82
                                                                                  May 8, 2021 12:34:53.467735052 CEST497388080192.168.2.3169.0.142.82
                                                                                  May 8, 2021 12:34:59.483824968 CEST497388080192.168.2.3169.0.142.82
                                                                                  May 8, 2021 12:35:11.602997065 CEST4973980192.168.2.3189.152.183.239
                                                                                  May 8, 2021 12:35:14.597174883 CEST4973980192.168.2.3189.152.183.239
                                                                                  May 8, 2021 12:35:20.610589027 CEST4973980192.168.2.3189.152.183.239
                                                                                  May 8, 2021 12:35:32.658021927 CEST49742990192.168.2.3187.205.170.3
                                                                                  May 8, 2021 12:35:35.643137932 CEST49742990192.168.2.3187.205.170.3
                                                                                  May 8, 2021 12:35:41.659308910 CEST49742990192.168.2.3187.205.170.3

                                                                                  UDP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  May 8, 2021 12:33:30.829304934 CEST5677753192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:30.878340960 CEST53567778.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:30.920418978 CEST5864353192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:30.988805056 CEST53586438.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:31.647109985 CEST6098553192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:31.669708014 CEST5020053192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:31.705887079 CEST53609858.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:31.784935951 CEST53502008.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:32.587498903 CEST5128153192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:32.646872997 CEST53512818.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:33.476305962 CEST4919953192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:33.525167942 CEST53491998.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:34.277993917 CEST5062053192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:34.329554081 CEST53506208.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:34.747648001 CEST6493853192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:34.806380987 CEST53649388.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:35.272893906 CEST6015253192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:35.335546970 CEST53601528.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:36.543384075 CEST5754453192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:36.595890999 CEST53575448.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:37.563182116 CEST5598453192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:37.616673946 CEST53559848.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:40.203732014 CEST6418553192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:40.252425909 CEST53641858.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:41.128773928 CEST6511053192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:41.186206102 CEST53651108.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:42.341967106 CEST5836153192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:42.393512011 CEST53583618.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:43.240911961 CEST6349253192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:43.289623022 CEST53634928.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:44.178216934 CEST6083153192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:44.229787111 CEST53608318.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:45.005451918 CEST6010053192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:45.054240942 CEST53601008.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:45.839670897 CEST5319553192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:45.891206980 CEST53531958.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:46.876707077 CEST5014153192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:46.925502062 CEST53501418.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:47.685483932 CEST5302353192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:47.734709024 CEST53530238.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:48.550729036 CEST4956353192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:48.599630117 CEST53495638.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:49.574163914 CEST5135253192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:49.633908033 CEST53513528.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:33:50.616195917 CEST5934953192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:33:50.665044069 CEST53593498.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:04.784966946 CEST5708453192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:04.874753952 CEST53570848.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:09.954204082 CEST5882353192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:10.014204025 CEST53588238.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:25.179337025 CEST5756853192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:25.242888927 CEST53575688.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:25.345680952 CEST5054053192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:25.395994902 CEST53505408.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:45.957432985 CEST5436653192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:46.035394907 CEST53543668.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:34:48.999222994 CEST5303453192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:34:49.060647011 CEST53530348.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:35:21.192047119 CEST5776253192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:35:21.269829035 CEST53577628.8.8.8192.168.2.3
                                                                                  May 8, 2021 12:35:22.899897099 CEST5543553192.168.2.38.8.8.8
                                                                                  May 8, 2021 12:35:22.957539082 CEST53554358.8.8.8192.168.2.3

                                                                                  Code Manipulations

                                                                                  Statistics

                                                                                  Behavior

                                                                                  Click to jump to process

                                                                                  System Behavior

                                                                                  General

                                                                                  Start time:12:33:39
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Users\user\Desktop\HU4TEm4Vr7.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:'C:\Users\user\Desktop\HU4TEm4Vr7.exe'
                                                                                  Imagebase:0xb30000
                                                                                  File size:536576 bytes
                                                                                  MD5 hash:B15D974F421D3E19332C6094E56E314D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: Emotet, Description: Emotet Payload, Source: 00000000.00000002.212288486.0000000000D21000.00000020.00000001.sdmp, Author: kevoreilly
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:12:33:39
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Users\user\Desktop\HU4TEm4Vr7.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\user\Desktop\HU4TEm4Vr7.exe
                                                                                  Imagebase:0xb30000
                                                                                  File size:536576 bytes
                                                                                  MD5 hash:B15D974F421D3E19332C6094E56E314D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: Emotet, Description: Emotet Payload, Source: 00000001.00000002.230150499.0000000000AA1000.00000020.00000001.sdmp, Author: kevoreilly
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:12:33:46
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\SysWOW64\msrarunning.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\msrarunning.exe
                                                                                  Imagebase:0xb30000
                                                                                  File size:536576 bytes
                                                                                  MD5 hash:B15D974F421D3E19332C6094E56E314D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: Emotet, Description: Emotet Payload, Source: 00000005.00000002.229142026.0000000000B11000.00000020.00000001.sdmp, Author: kevoreilly
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:12:33:47
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\SysWOW64\msrarunning.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\msrarunning.exe
                                                                                  Imagebase:0xb30000
                                                                                  File size:536576 bytes
                                                                                  MD5 hash:B15D974F421D3E19332C6094E56E314D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: Emotet, Description: Emotet Payload, Source: 00000006.00000002.482015534.0000000001581000.00000020.00000001.sdmp, Author: kevoreilly
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:12:33:51
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:01
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:11
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:12
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:13
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:13
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                                  Imagebase:0x7ff61d340000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:13
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:14
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:14
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\SgrmBroker.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                  Imagebase:0x7ff690ff0000
                                                                                  File size:163336 bytes
                                                                                  MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:15
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:12:34:35
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff7488e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:12:35:16
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
                                                                                  Imagebase:0x7ff72b0b0000
                                                                                  File size:455656 bytes
                                                                                  MD5 hash:A267555174BFA53844371226F482B86B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:12:35:16
                                                                                  Start date:08/05/2021
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6b2800000
                                                                                  File size:625664 bytes
                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  Disassembly

                                                                                  Code Analysis

                                                                                  Reset < >