Loading ...

Play interactive tourEdit tour

Analysis Report ox87DNNM8d.exe

Overview

General Information

Sample Name:ox87DNNM8d.exe
Analysis ID:411767
MD5:41e38bcd6f5f3001c2e4f08ebcd2396c
SHA1:2f3b2173d7a5a3a19e8a73d5fbfde7abc1836909
SHA256:4e2b4396335fc6d3e6ff8c19b326f0f6342f537ba026ce1901d2122b2c7b3e4c
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • ox87DNNM8d.exe (PID: 4368 cmdline: 'C:\Users\user\Desktop\ox87DNNM8d.exe' MD5: 41E38BCD6F5F3001C2E4F08EBCD2396C)
    • ox87DNNM8d.exe (PID: 5656 cmdline: C:\Users\user\Desktop\ox87DNNM8d.exe MD5: 41E38BCD6F5F3001C2E4F08EBCD2396C)
      • explorer.exe (PID: 3472 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • systray.exe (PID: 6544 cmdline: C:\Windows\SysWOW64\systray.exe MD5: 1373D481BE4C8A6E5F5030D2FB0A0C68)
          • cmd.exe (PID: 6824 cmdline: /c del 'C:\Users\user\Desktop\ox87DNNM8d.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.panda810.com/sve/"], "decoy": ["rockouqe.com", "secureproductsolutions.net", "josephserino.com", "operationstrategy.com", "umrohalfatih.com", "humanityenlightened.com", "taylorxgroup.com", "francescopetroni.net", "anaume-kun.com", "galleryalireza.com", "alimamavn.com", "tym0769.com", "trendselection.club", "warmupspod.com", "v-work.xyz", "aclmspecialmeeting2020.com", "youporn-live.net", "germinatebio.net", "hempnseeds.com", "ezfto.com", "pengruncapital.com", "voxitor.com", "hempdivasmag.com", "everydayleadershipinstitute.com", "biking-division.com", "livingstonemoments.com", "vstarfireworks.com", "abilitybrazil.com", "gixaa.com", "kp-dental.com", "developmentignited.com", "8155a.com", "petylook.com", "agrogroupkz.com", "germsbuzzter.com", "valley-bitcoin.com", "dcsdeliveryaz.website", "elitefriendlies.com", "pinoywebtools.com", "circuleather.com", "mioskinplus.info", "tamaraog.com", "maxfelicitavideo.com", "americacivics.com", "shebawatches.com", "meisammirhashemi.com", "nelivo.com", "real-dating-clubs2.com", "poishem.directory", "geminein.club", "soundalchemyadvanced.com", "kidswrtingpadstore.com", "cya-wonder.club", "tuqof.com", "showbizpr.com", "homo-nomad.com", "bcc-cbd.com", "papayacrisp.com", "paymentink.gold", "purejoyclothing.com", "newsadvices.com", "gungalmata.com", "viewsfromthedriversseat.com", "techriew.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x183f9:$sqlite3step: 68 34 1C 7B E1
    • 0x1850c:$sqlite3step: 68 34 1C 7B E1
    • 0x18428:$sqlite3text: 68 38 2A 90 C5
    • 0x1854d:$sqlite3text: 68 38 2A 90 C5
    • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
    00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.ox87DNNM8d.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.2.ox87DNNM8d.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.2.ox87DNNM8d.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x183f9:$sqlite3step: 68 34 1C 7B E1
        • 0x1850c:$sqlite3step: 68 34 1C 7B E1
        • 0x18428:$sqlite3text: 68 38 2A 90 C5
        • 0x1854d:$sqlite3text: 68 38 2A 90 C5
        • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
        1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x12fd98:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x130002:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15c3b8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15c622:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x13bb25:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x168145:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x13b611:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x167c31:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x13bc27:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x168247:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13bd9f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x1683bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x130a1a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x15d03a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x13a88c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x166eac:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x131713:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x15dd33:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1417c7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x16dde7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1427ca:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 4 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.panda810.com/sve/"], "decoy": ["rockouqe.com", "secureproductsolutions.net", "josephserino.com", "operationstrategy.com", "umrohalfatih.com", "humanityenlightened.com", "taylorxgroup.com", "francescopetroni.net", "anaume-kun.com", "galleryalireza.com", "alimamavn.com", "tym0769.com", "trendselection.club", "warmupspod.com", "v-work.xyz", "aclmspecialmeeting2020.com", "youporn-live.net", "germinatebio.net", "hempnseeds.com", "ezfto.com", "pengruncapital.com", "voxitor.com", "hempdivasmag.com", "everydayleadershipinstitute.com", "biking-division.com", "livingstonemoments.com", "vstarfireworks.com", "abilitybrazil.com", "gixaa.com", "kp-dental.com", "developmentignited.com", "8155a.com", "petylook.com", "agrogroupkz.com", "germsbuzzter.com", "valley-bitcoin.com", "dcsdeliveryaz.website", "elitefriendlies.com", "pinoywebtools.com", "circuleather.com", "mioskinplus.info", "tamaraog.com", "maxfelicitavideo.com", "americacivics.com", "shebawatches.com", "meisammirhashemi.com", "nelivo.com", "real-dating-clubs2.com", "poishem.directory", "geminein.club", "soundalchemyadvanced.com", "kidswrtingpadstore.com", "cya-wonder.club", "tuqof.com", "showbizpr.com", "homo-nomad.com", "bcc-cbd.com", "papayacrisp.com", "paymentink.gold", "purejoyclothing.com", "newsadvices.com", "gungalmata.com", "viewsfromthedriversseat.com", "techriew.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: ox87DNNM8d.exeVirustotal: Detection: 56%Perma Link
          Source: ox87DNNM8d.exeMetadefender: Detection: 38%Perma Link
          Source: ox87DNNM8d.exeReversingLabs: Detection: 65%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPE
          Source: 3.2.ox87DNNM8d.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: ox87DNNM8d.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: ox87DNNM8d.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: systray.pdb source: ox87DNNM8d.exe, 00000003.00000002.281473750.0000000001808000.00000004.00000020.sdmp
          Source: Binary string: systray.pdbGCTL source: ox87DNNM8d.exe, 00000003.00000002.281473750.0000000001808000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: ox87DNNM8d.exe, 00000003.00000003.233330947.0000000001900000.00000004.00000001.sdmp, systray.exe, 00000008.00000003.282590732.0000000000CC0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: ox87DNNM8d.exe, 00000003.00000003.233330947.0000000001900000.00000004.00000001.sdmp, systray.exe
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.panda810.com/sve/
          Source: global trafficHTTP traffic detected: GET /sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0da HTTP/1.1Host: www.dcsdeliveryaz.websiteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /sve/?8pW=2dUh0da&B6Ah=pTnyDIvt+g7sdgQmMg9D2FnTPO22hVGFgxtUPmNZyFP4G/454L1vxjiDnOTVCmVO7LzE HTTP/1.1Host: www.americacivics.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /sve/?B6Ah=2mSxzHKvGhdVKk9ZF/49Uvkx+tNG2gtFJsc3MZrG0ttjvP+42CyBXtijrWDGJsqiNYNw&8pW=2dUh0da HTTP/1.1Host: www.vstarfireworks.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewASN Name: DREAMHOST-ASUS DREAMHOST-ASUS
          Source: Joe Sandbox ViewASN Name: HKKFGL-AS-APHKKwaifongGroupLimitedHK HKKFGL-AS-APHKKwaifongGroupLimitedHK
          Source: global trafficHTTP traffic detected: GET /sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0da HTTP/1.1Host: www.dcsdeliveryaz.websiteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /sve/?8pW=2dUh0da&B6Ah=pTnyDIvt+g7sdgQmMg9D2FnTPO22hVGFgxtUPmNZyFP4G/454L1vxjiDnOTVCmVO7LzE HTTP/1.1Host: www.americacivics.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /sve/?B6Ah=2mSxzHKvGhdVKk9ZF/49Uvkx+tNG2gtFJsc3MZrG0ttjvP+42CyBXtijrWDGJsqiNYNw&8pW=2dUh0da HTTP/1.1Host: www.vstarfireworks.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.secureproductsolutions.net
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: no-storePragma: no-cacheContent-Type: text/htmlServer: IISX-Powered-By: WAF/2.0Date: Wed, 12 May 2021 05:07:40 GMTConnection: closeContent-Length: 1163Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 d5 d2 b2 bb b5 bd ce c4 bc fe bb f2 c4 bf c2 bc a1 a3 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 73 69 Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=gb2312"/><title>404 - </title><style type="text/css"><!--body{margin:0;font-si
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: ox87DNNM8d.exe, 00000001.00000002.234176049.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
          Source: ox87DNNM8d.exe, 00000001.00000002.233772608.0000000001240000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419D50 NtCreateFile,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419E00 NtReadFile,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419E80 NtClose,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419F30 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419D4B NtCreateFile,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00419DFC NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045DB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045DAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045DA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045DA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045DA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189D50 NtCreateFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189E00 NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189E80 NtClose,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189F30 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189D4B NtCreateFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00189DFC NtReadFile,
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B58782
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B55D17
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B54765
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_0160C1D0
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_01609890
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06420F30
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06427C80
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_0642E228
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06420040
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_064280F8
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_0642C1D8
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06429600
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06421E18
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06421E28
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06420E38
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_064236A9
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_064236B8
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06427C72
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_0642CC10
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_064234C8
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_064234D8
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5B3F5
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B56759
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00401030
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041D21B
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041DBED
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00409DEB
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00402D87
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00402D90
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00409E30
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041CF96
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00402FB0
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FB5D17
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FB8782
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FB4765
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBB3F5
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FB6759
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651002
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AB090
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04661D55
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459F900
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04590D20
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B6E30
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CEBB0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0018D21B
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00172D90
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00172D87
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00179DEB
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00179E30
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0018CF96
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00172FB0
          Source: ox87DNNM8d.exe, 00000001.00000002.233772608.0000000001240000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000001.00000002.233268341.0000000000C08000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDateTimeNative.exe. vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000001.00000002.237220905.0000000006230000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000001.00000002.234176049.0000000002F71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000003.00000002.281473750.0000000001808000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamesystray.exej% vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000003.00000002.280995621.0000000001068000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDateTimeNative.exe. vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exe, 00000003.00000002.281676487.0000000001BBF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exeBinary or memory string: OriginalFilenameDateTimeNative.exe. vs ox87DNNM8d.exe
          Source: ox87DNNM8d.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: ox87DNNM8d.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/3
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ox87DNNM8d.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6876:120:WilError_01
          Source: ox87DNNM8d.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: ox87DNNM8d.exeVirustotal: Detection: 56%
          Source: ox87DNNM8d.exeMetadefender: Detection: 38%
          Source: ox87DNNM8d.exeReversingLabs: Detection: 65%
          Source: unknownProcess created: C:\Users\user\Desktop\ox87DNNM8d.exe 'C:\Users\user\Desktop\ox87DNNM8d.exe'
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess created: C:\Users\user\Desktop\ox87DNNM8d.exe C:\Users\user\Desktop\ox87DNNM8d.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\systray.exe C:\Windows\SysWOW64\systray.exe
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ox87DNNM8d.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess created: C:\Users\user\Desktop\ox87DNNM8d.exe C:\Users\user\Desktop\ox87DNNM8d.exe
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ox87DNNM8d.exe'
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: ox87DNNM8d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ox87DNNM8d.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: systray.pdb source: ox87DNNM8d.exe, 00000003.00000002.281473750.0000000001808000.00000004.00000020.sdmp
          Source: Binary string: systray.pdbGCTL source: ox87DNNM8d.exe, 00000003.00000002.281473750.0000000001808000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: ox87DNNM8d.exe, 00000003.00000003.233330947.0000000001900000.00000004.00000001.sdmp, systray.exe, 00000008.00000003.282590732.0000000000CC0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: ox87DNNM8d.exe, 00000003.00000003.233330947.0000000001900000.00000004.00000001.sdmp, systray.exe
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5CFB8 push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5C8C0 push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5DBCA push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5D21C push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5D966 push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_00B5C65C push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_0642674D push es; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 1_2_06426799 push es; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00401028 push ds; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_004171DE push 974CB969h; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_004172CC push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00416BC9 push es; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_004163B0 push ss; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041CEF2 push eax; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041CEFB push eax; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041CEA5 push eax; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0041CF5C push eax; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBC8C0 push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBD966 push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBD21C push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBDBCA push eax; retf
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBC65C push edx; ret
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00FBCFB8 push edx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045ED0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_001871DE push 974CB969h; retf
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_001872CC push edx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_001863B0 push ss; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_00186BC9 push es; retf
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0018CEA5 push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0018CEFB push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0018CEF2 push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.93204508639

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xEC
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\systray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ox87DNNM8d.exe PID: 4368, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 00000000001798E4 second address: 00000000001798EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 0000000000179B4E second address: 0000000000179B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\ox87DNNM8d.exe TID: 5636Thread sleep time: -101791s >= -30000s
          Source: C:\Users\user\Desktop\ox87DNNM8d.exe TID: 5984Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 2268Thread sleep count: 34 > 30
          Source: C:\Windows\explorer.exe TID: 2268Thread sleep time: -68000s >= -30000s
          Source: C:\Windows\SysWOW64\systray.exe TID: 6548Thread sleep time: -70000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeThread delayed: delay time: 101791
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000004.00000000.262437256.000000000891C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000004.00000000.262437256.000000000891C000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.261614282.0000000008270000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000004.00000000.241045393.000000000374F000.00000004.00000001.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000004.00000002.501948287.0000000003767000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000004.00000000.241045393.000000000374F000.00000004.00000001.sdmpBinary or memory string: AASCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000004.00000000.237589481.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000004.00000000.262499042.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
          Source: explorer.exe, 00000004.00000000.262499042.00000000089B5000.00000004.00000001.sdmpBinary or memory string: 6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}##
          Source: explorer.exe, 00000004.00000002.508140093.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
          Source: explorer.exe, 00000004.00000000.261614282.0000000008270000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000004.00000000.261614282.0000000008270000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 00000004.00000000.262499042.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: ox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000004.00000000.261614282.0000000008270000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\systray.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeCode function: 3_2_0040ACC0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04661074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04652073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0462C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0462C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04651C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0466740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0466740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0466740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04664015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04664015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04617016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04617016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04617016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_046514FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04668CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04613884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04613884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045BB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045BB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04613540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045BC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045BC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04668D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045B4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04648DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0459B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04592D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04592D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04592D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04592D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04592D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045BC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0464B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0464B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04599240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045D927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0464FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0464FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04668ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045C16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04660EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04660EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04660EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_046146A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0462FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04668F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045AEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04668B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0466070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0466070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_045CE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0462FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0462FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04594F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04594F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0465131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_04665BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 8_2_0465138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\systray.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.secureproductsolutions.net
          Source: C:\Windows\explorer.exeNetwork Connect: 75.119.206.89 80
          Source: C:\Windows\explorer.exeDomain query: www.americacivics.com
          Source: C:\Windows\explorer.exeDomain query: www.vstarfireworks.com
          Source: C:\Windows\explorer.exeNetwork Connect: 43.249.29.43 80
          Source: C:\Windows\explorer.exeNetwork Connect: 35.186.238.101 80
          Source: C:\Windows\explorer.exeDomain query: www.dcsdeliveryaz.website
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeMemory written: C:\Users\user\Desktop\ox87DNNM8d.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeThread register set: target process: 3472
          Source: C:\Windows\SysWOW64\systray.exeThread register set: target process: 3472
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeProcess created: C:\Users\user\Desktop\ox87DNNM8d.exe C:\Users\user\Desktop\ox87DNNM8d.exe
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ox87DNNM8d.exe'
          Source: explorer.exe, 00000004.00000000.250657770.0000000005EA0000.00000004.00000001.sdmp, systray.exe, 00000008.00000002.495697129.0000000003160000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.237977080.0000000001640000.00000002.00000001.sdmp, systray.exe, 00000008.00000002.495697129.0000000003160000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.237977080.0000000001640000.00000002.00000001.sdmp, systray.exe, 00000008.00000002.495697129.0000000003160000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
          Source: explorer.exe, 00000004.00000000.237331727.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
          Source: explorer.exe, 00000004.00000000.237977080.0000000001640000.00000002.00000001.sdmp, systray.exe, 00000008.00000002.495697129.0000000003160000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
          Source: explorer.exe, 00000004.00000000.237977080.0000000001640000.00000002.00000001.sdmp, systray.exe, 00000008.00000002.495697129.0000000003160000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Users\user\Desktop\ox87DNNM8d.exe VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\ox87DNNM8d.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.ox87DNNM8d.exe.400dbc8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ox87DNNM8d.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection512Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection512LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 411767 Sample: ox87DNNM8d.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 5 other signatures 2->42 10 ox87DNNM8d.exe 3 2->10         started        process3 file4 28 C:\Users\user\AppData\...\ox87DNNM8d.exe.log, ASCII 10->28 dropped 52 Tries to detect virtualization through RDTSC time measurements 10->52 54 Injects a PE file into a foreign processes 10->54 14 ox87DNNM8d.exe 10->14         started        signatures5 process6 signatures7 56 Modifies the context of a thread in another process (thread injection) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Queues an APC in another process (thread injection) 14->60 17 explorer.exe 14->17 injected process8 dnsIp9 30 t181.deegeechina.com 43.249.29.43, 49730, 80 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 17->30 32 www.dcsdeliveryaz.website 75.119.206.89, 49720, 80 DREAMHOST-ASUS United States 17->32 34 3 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 systray.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          ox87DNNM8d.exe57%VirustotalBrowse
          ox87DNNM8d.exe41%MetadefenderBrowse
          ox87DNNM8d.exe66%ReversingLabsByteCode-MSIL.Spyware.Noon

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          3.2.ox87DNNM8d.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          t181.deegeechina.com0%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.vstarfireworks.com/sve/?B6Ah=2mSxzHKvGhdVKk9ZF/49Uvkx+tNG2gtFJsc3MZrG0ttjvP+42CyBXtijrWDGJsqiNYNw&8pW=2dUh0da0%Avira URL Cloudsafe
          http://www.americacivics.com/sve/?8pW=2dUh0da&B6Ah=pTnyDIvt+g7sdgQmMg9D2FnTPO22hVGFgxtUPmNZyFP4G/454L1vxjiDnOTVCmVO7LzE0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          www.panda810.com/sve/0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.dcsdeliveryaz.website/sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0da0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.americacivics.com
          35.186.238.101
          truefalse
            unknown
            t181.deegeechina.com
            43.249.29.43
            truetrueunknown
            www.dcsdeliveryaz.website
            75.119.206.89
            truetrue
              unknown
              www.secureproductsolutions.net
              unknown
              unknowntrue
                unknown
                www.vstarfireworks.com
                unknown
                unknowntrue
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://www.vstarfireworks.com/sve/?B6Ah=2mSxzHKvGhdVKk9ZF/49Uvkx+tNG2gtFJsc3MZrG0ttjvP+42CyBXtijrWDGJsqiNYNw&8pW=2dUh0datrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.americacivics.com/sve/?8pW=2dUh0da&B6Ah=pTnyDIvt+g7sdgQmMg9D2FnTPO22hVGFgxtUPmNZyFP4G/454L1vxjiDnOTVCmVO7LzEfalse
                  • Avira URL Cloud: safe
                  unknown
                  www.panda810.com/sve/true
                  • Avira URL Cloud: safe
                  low
                  http://www.dcsdeliveryaz.website/sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0datrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bTheexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                            high
                            http://www.tiro.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                              high
                              http://www.goodfont.co.krexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssox87DNNM8d.exe, 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comlexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cTheexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8explorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fonts.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.krexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameox87DNNM8d.exe, 00000001.00000002.234176049.0000000002F71000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.sakkal.comexplorer.exe, 00000004.00000000.263514865.000000000BC36000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          35.186.238.101
                                          www.americacivics.comUnited States
                                          15169GOOGLEUSfalse
                                          75.119.206.89
                                          www.dcsdeliveryaz.websiteUnited States
                                          26347DREAMHOST-ASUStrue
                                          43.249.29.43
                                          t181.deegeechina.comHong Kong
                                          133115HKKFGL-AS-APHKKwaifongGroupLimitedHKtrue

                                          General Information

                                          Joe Sandbox Version:32.0.0 Black Diamond
                                          Analysis ID:411767
                                          Start date:12.05.2021
                                          Start time:06:27:57
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 10m 59s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:ox87DNNM8d.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:28
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:1
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@7/1@4/3
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:
                                          • Successful, ratio: 28% (good quality ratio 25.8%)
                                          • Quality average: 69.6%
                                          • Quality standard deviation: 31.7%
                                          HCA Information:
                                          • Successful, ratio: 97%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          06:28:47API Interceptor1x Sleep call for process: ox87DNNM8d.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          No context

                                          Domains

                                          No context

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          DREAMHOST-ASUSENCORE.docxGet hashmaliciousBrowse
                                          • 64.90.45.190
                                          4GGwmv0AJm.exeGet hashmaliciousBrowse
                                          • 69.163.200.146
                                          documents-857527454.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-857527454.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          70pGP1JaCf6M0kf.exeGet hashmaliciousBrowse
                                          • 173.236.152.151
                                          documents-1509207685.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-1509207685.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-1576257262.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-1576257262.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-26926602.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-26926602.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-26926602.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-26926602.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-192987462.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-192987462.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-1926412023.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-1926412023.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-102763662.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          documents-102763662.xlsmGet hashmaliciousBrowse
                                          • 67.205.36.230
                                          Financial Results April 21.pptx (9,753K).exeGet hashmaliciousBrowse
                                          • 66.33.210.242
                                          HKKFGL-AS-APHKKwaifongGroupLimitedHKbt.apkGet hashmaliciousBrowse
                                          • 39.109.113.244
                                          #U6e05#U65b0#U59b9#U5a9a#U7167#U9a97@16.exeGet hashmaliciousBrowse
                                          • 110.92.66.233
                                          #U5e74#U7ec8#U63d0#U6210#U5206#U7ea2#U6838#U5bf9#U8868@i4.exeGet hashmaliciousBrowse
                                          • 110.92.66.246
                                          insz.exeGet hashmaliciousBrowse
                                          • 88.218.145.49
                                          DOCUMENTO_MEDICO.docGet hashmaliciousBrowse
                                          • 154.221.28.167
                                          NI3651011817UL.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          BAL_46979369.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          427424855528075826480424.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          FILE_81380052.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          FILE_PO_09152020EX.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          DOC_PO_09152020EX.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          KH3117818420XX.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          XCP_87353228.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          BAL_PO_09152020EX.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          IO3812758081JW.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          BAL_53345761.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          FILE_PO_09152020EX.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          FILE_YZGLOSASM.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          BAL_3105782760272.docGet hashmaliciousBrowse
                                          • 103.210.237.241
                                          VCG4PMFIB0AR.docGet hashmaliciousBrowse
                                          • 103.210.237.241

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ox87DNNM8d.exe.log
                                          Process:C:\Users\user\Desktop\ox87DNNM8d.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1314
                                          Entropy (8bit):5.350128552078965
                                          Encrypted:false
                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.613842542238479
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:ox87DNNM8d.exe
                                          File size:840704
                                          MD5:41e38bcd6f5f3001c2e4f08ebcd2396c
                                          SHA1:2f3b2173d7a5a3a19e8a73d5fbfde7abc1836909
                                          SHA256:4e2b4396335fc6d3e6ff8c19b326f0f6342f537ba026ce1901d2122b2c7b3e4c
                                          SHA512:20c03ac7e5647f2140f9c969046fd9aa86e18b352387e52238a1f652694a40a374aa499309827f71599de6cad899397a373bc9d3d1cc83e7ed8a37593d386bd4
                                          SSDEEP:24576:cAXIVpK3/ZWzEtY+i+/+He2yjmfNRp+n6:9EpK3/ZWYtYv0+He2emV+6
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.................0...........O... ...`....@.. ....................... ............@................................

                                          File Icon

                                          Icon Hash:f8ce929a929a92d4

                                          Static PE Info

                                          General

                                          Entrypoint:0x4b4fb2
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x60948AF6 [Fri May 7 00:33:58 2021 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                          Entrypoint Preview

                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb4f580x57.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x19eb8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xb2fb80xb3000False0.92964112692data7.93204508639IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .reloc0xb60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          .rsrc0xb80000x19eb80x1a000False0.0641432542067data2.31358815064IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xb82200xac5PNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced
                                          RT_ICON0xb8ce80xb20data
                                          RT_ICON0xb98080x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777215, next used block 16777215
                                          RT_ICON0xbbdb00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 16777215, next used block 16777215
                                          RT_ICON0xbce580x10828data
                                          RT_ICON0xcd6800x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 16777215, next used block 16777215
                                          RT_GROUP_ICON0xd18a80x5adata
                                          RT_VERSION0xd19040x400data
                                          RT_MANIFEST0xd1d040x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                          Imports

                                          DLLImport
                                          mscoree.dll_CorExeMain

                                          Version Infos

                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyrightCrowbar 2015. This software is licensed under the GNU General Public License v3.0 or above.
                                          Assembly Version1.0.0.0
                                          InternalNameDateTimeNative.exe
                                          FileVersion1.0.0.0
                                          CompanyNameCrowbar
                                          LegalTrademarks
                                          CommentsAwesome clipboard manager.
                                          ProductNameClippy
                                          ProductVersion1.0.0.0
                                          FileDescriptionClippy
                                          OriginalFilenameDateTimeNative.exe

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          05/12/21-06:30:28.857747TCP1201ATTACK-RESPONSES 403 Forbidden804972835.186.238.101192.168.2.5

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          May 12, 2021 06:30:08.731209040 CEST4972080192.168.2.575.119.206.89
                                          May 12, 2021 06:30:08.932468891 CEST804972075.119.206.89192.168.2.5
                                          May 12, 2021 06:30:08.932590961 CEST4972080192.168.2.575.119.206.89
                                          May 12, 2021 06:30:08.932787895 CEST4972080192.168.2.575.119.206.89
                                          May 12, 2021 06:30:09.134083986 CEST804972075.119.206.89192.168.2.5
                                          May 12, 2021 06:30:09.236999989 CEST804972075.119.206.89192.168.2.5
                                          May 12, 2021 06:30:09.238914967 CEST4972080192.168.2.575.119.206.89
                                          May 12, 2021 06:30:09.240603924 CEST804972075.119.206.89192.168.2.5
                                          May 12, 2021 06:30:09.241219997 CEST4972080192.168.2.575.119.206.89
                                          May 12, 2021 06:30:09.441761017 CEST804972075.119.206.89192.168.2.5
                                          May 12, 2021 06:30:28.676335096 CEST4972880192.168.2.535.186.238.101
                                          May 12, 2021 06:30:28.720247984 CEST804972835.186.238.101192.168.2.5
                                          May 12, 2021 06:30:28.721172094 CEST4972880192.168.2.535.186.238.101
                                          May 12, 2021 06:30:28.721317053 CEST4972880192.168.2.535.186.238.101
                                          May 12, 2021 06:30:28.762145996 CEST804972835.186.238.101192.168.2.5
                                          May 12, 2021 06:30:28.857747078 CEST804972835.186.238.101192.168.2.5
                                          May 12, 2021 06:30:28.858009100 CEST4972880192.168.2.535.186.238.101
                                          May 12, 2021 06:30:28.858123064 CEST804972835.186.238.101192.168.2.5
                                          May 12, 2021 06:30:28.858201027 CEST4972880192.168.2.535.186.238.101
                                          May 12, 2021 06:30:28.898891926 CEST804972835.186.238.101192.168.2.5
                                          May 12, 2021 06:30:51.399552107 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:51.676214933 CEST804973043.249.29.43192.168.2.5
                                          May 12, 2021 06:30:51.676359892 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:51.676578999 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:51.971482038 CEST804973043.249.29.43192.168.2.5
                                          May 12, 2021 06:30:51.971520901 CEST804973043.249.29.43192.168.2.5
                                          May 12, 2021 06:30:51.971709967 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:52.173600912 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:52.250524998 CEST804973043.249.29.43192.168.2.5
                                          May 12, 2021 06:30:52.250617981 CEST4973080192.168.2.543.249.29.43
                                          May 12, 2021 06:30:52.452609062 CEST804973043.249.29.43192.168.2.5
                                          May 12, 2021 06:30:52.452783108 CEST4973080192.168.2.543.249.29.43

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          May 12, 2021 06:28:38.799510002 CEST6434453192.168.2.58.8.8.8
                                          May 12, 2021 06:28:38.854988098 CEST53643448.8.8.8192.168.2.5
                                          May 12, 2021 06:28:39.447067976 CEST6206053192.168.2.58.8.8.8
                                          May 12, 2021 06:28:39.520203114 CEST53620608.8.8.8192.168.2.5
                                          May 12, 2021 06:28:40.034023046 CEST6180553192.168.2.58.8.8.8
                                          May 12, 2021 06:28:40.090976954 CEST53618058.8.8.8192.168.2.5
                                          May 12, 2021 06:28:41.152870893 CEST5479553192.168.2.58.8.8.8
                                          May 12, 2021 06:28:41.201633930 CEST53547958.8.8.8192.168.2.5
                                          May 12, 2021 06:28:41.601744890 CEST4955753192.168.2.58.8.8.8
                                          May 12, 2021 06:28:41.662442923 CEST53495578.8.8.8192.168.2.5
                                          May 12, 2021 06:28:45.705430031 CEST6173353192.168.2.58.8.8.8
                                          May 12, 2021 06:28:45.756230116 CEST53617338.8.8.8192.168.2.5
                                          May 12, 2021 06:28:47.224498987 CEST6544753192.168.2.58.8.8.8
                                          May 12, 2021 06:28:47.273613930 CEST53654478.8.8.8192.168.2.5
                                          May 12, 2021 06:28:48.591703892 CEST5244153192.168.2.58.8.8.8
                                          May 12, 2021 06:28:48.651035070 CEST53524418.8.8.8192.168.2.5
                                          May 12, 2021 06:28:50.457161903 CEST6217653192.168.2.58.8.8.8
                                          May 12, 2021 06:28:50.505949020 CEST53621768.8.8.8192.168.2.5
                                          May 12, 2021 06:28:51.592045069 CEST5959653192.168.2.58.8.8.8
                                          May 12, 2021 06:28:51.640861988 CEST53595968.8.8.8192.168.2.5
                                          May 12, 2021 06:28:53.460700989 CEST6529653192.168.2.58.8.8.8
                                          May 12, 2021 06:28:53.512550116 CEST53652968.8.8.8192.168.2.5
                                          May 12, 2021 06:28:54.732152939 CEST6318353192.168.2.58.8.8.8
                                          May 12, 2021 06:28:54.782819033 CEST53631838.8.8.8192.168.2.5
                                          May 12, 2021 06:29:07.680038929 CEST6015153192.168.2.58.8.8.8
                                          May 12, 2021 06:29:07.741580963 CEST53601518.8.8.8192.168.2.5
                                          May 12, 2021 06:29:25.114991903 CEST5696953192.168.2.58.8.8.8
                                          May 12, 2021 06:29:25.180248976 CEST53569698.8.8.8192.168.2.5
                                          May 12, 2021 06:29:46.937997103 CEST5516153192.168.2.58.8.8.8
                                          May 12, 2021 06:29:46.999602079 CEST53551618.8.8.8192.168.2.5
                                          May 12, 2021 06:29:48.188477993 CEST5475753192.168.2.58.8.8.8
                                          May 12, 2021 06:29:48.268415928 CEST53547578.8.8.8192.168.2.5
                                          May 12, 2021 06:29:59.183288097 CEST4999253192.168.2.58.8.8.8
                                          May 12, 2021 06:29:59.251389980 CEST53499928.8.8.8192.168.2.5
                                          May 12, 2021 06:30:08.481898069 CEST6007553192.168.2.58.8.8.8
                                          May 12, 2021 06:30:08.707669020 CEST53600758.8.8.8192.168.2.5
                                          May 12, 2021 06:30:13.955764055 CEST5501653192.168.2.58.8.8.8
                                          May 12, 2021 06:30:14.014740944 CEST53550168.8.8.8192.168.2.5
                                          May 12, 2021 06:30:18.336004019 CEST6434553192.168.2.58.8.8.8
                                          May 12, 2021 06:30:18.397649050 CEST53643458.8.8.8192.168.2.5
                                          May 12, 2021 06:30:28.614039898 CEST5712853192.168.2.58.8.8.8
                                          May 12, 2021 06:30:28.675231934 CEST53571288.8.8.8192.168.2.5
                                          May 12, 2021 06:30:48.976097107 CEST5479153192.168.2.58.8.8.8
                                          May 12, 2021 06:30:49.052944899 CEST53547918.8.8.8192.168.2.5
                                          May 12, 2021 06:30:51.048041105 CEST5046353192.168.2.58.8.8.8
                                          May 12, 2021 06:30:51.398247957 CEST53504638.8.8.8192.168.2.5
                                          May 12, 2021 06:30:51.405097961 CEST5039453192.168.2.58.8.8.8
                                          May 12, 2021 06:30:51.478733063 CEST53503948.8.8.8192.168.2.5

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          May 12, 2021 06:29:48.188477993 CEST192.168.2.58.8.8.80x9fe0Standard query (0)www.secureproductsolutions.netA (IP address)IN (0x0001)
                                          May 12, 2021 06:30:08.481898069 CEST192.168.2.58.8.8.80xba98Standard query (0)www.dcsdeliveryaz.websiteA (IP address)IN (0x0001)
                                          May 12, 2021 06:30:28.614039898 CEST192.168.2.58.8.8.80x26eeStandard query (0)www.americacivics.comA (IP address)IN (0x0001)
                                          May 12, 2021 06:30:51.048041105 CEST192.168.2.58.8.8.80x89cStandard query (0)www.vstarfireworks.comA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          May 12, 2021 06:29:48.268415928 CEST8.8.8.8192.168.2.50x9fe0Name error (3)www.secureproductsolutions.netnonenoneA (IP address)IN (0x0001)
                                          May 12, 2021 06:30:08.707669020 CEST8.8.8.8192.168.2.50xba98No error (0)www.dcsdeliveryaz.website75.119.206.89A (IP address)IN (0x0001)
                                          May 12, 2021 06:30:28.675231934 CEST8.8.8.8192.168.2.50x26eeNo error (0)www.americacivics.com35.186.238.101A (IP address)IN (0x0001)
                                          May 12, 2021 06:30:51.398247957 CEST8.8.8.8192.168.2.50x89cNo error (0)www.vstarfireworks.comt181.deegeechina.comCNAME (Canonical name)IN (0x0001)
                                          May 12, 2021 06:30:51.398247957 CEST8.8.8.8192.168.2.50x89cNo error (0)t181.deegeechina.com43.249.29.43A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • www.dcsdeliveryaz.website
                                          • www.americacivics.com
                                          • www.vstarfireworks.com

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.54972075.119.206.8980C:\Windows\explorer.exe
                                          TimestampkBytes transferredDirectionData
                                          May 12, 2021 06:30:08.932787895 CEST1393OUTGET /sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0da HTTP/1.1
                                          Host: www.dcsdeliveryaz.website
                                          Connection: close
                                          Data Raw: 00 00 00 00 00 00 00
                                          Data Ascii:
                                          May 12, 2021 06:30:09.236999989 CEST1394INHTTP/1.1 301 Moved Permanently
                                          Date: Wed, 12 May 2021 04:30:09 GMT
                                          Server: Apache
                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                          Upgrade: h2
                                          Connection: Upgrade, close
                                          Location: http://dcsdeliveryaz.website/sve/?B6Ah=exmy3Nx7PpUJKJt1HtiGWNpuQz3EYRIgq3k+uiZc9JLQuvdlfCRkPG1S5SdPXsQAS6a5&8pW=2dUh0da
                                          Vary: User-Agent
                                          Content-Length: 0
                                          Content-Type: text/html; charset=UTF-8


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          1192.168.2.54972835.186.238.10180C:\Windows\explorer.exe
                                          TimestampkBytes transferredDirectionData
                                          May 12, 2021 06:30:28.721317053 CEST4707OUTGET /sve/?8pW=2dUh0da&B6Ah=pTnyDIvt+g7sdgQmMg9D2FnTPO22hVGFgxtUPmNZyFP4G/454L1vxjiDnOTVCmVO7LzE HTTP/1.1
                                          Host: www.americacivics.com
                                          Connection: close
                                          Data Raw: 00 00 00 00 00 00 00
                                          Data Ascii:
                                          May 12, 2021 06:30:28.857747078 CEST4707INHTTP/1.1 403 Forbidden
                                          Server: openresty
                                          Date: Wed, 12 May 2021 04:30:28 GMT
                                          Content-Type: text/html
                                          Content-Length: 275
                                          ETag: "6099a39b-113"
                                          Via: 1.1 google
                                          Connection: close
                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          2192.168.2.54973043.249.29.4380C:\Windows\explorer.exe
                                          TimestampkBytes transferredDirectionData
                                          May 12, 2021 06:30:51.676578999 CEST4725OUTGET /sve/?B6Ah=2mSxzHKvGhdVKk9ZF/49Uvkx+tNG2gtFJsc3MZrG0ttjvP+42CyBXtijrWDGJsqiNYNw&8pW=2dUh0da HTTP/1.1
                                          Host: www.vstarfireworks.com
                                          Connection: close
                                          Data Raw: 00 00 00 00 00 00 00
                                          Data Ascii:
                                          May 12, 2021 06:30:51.971482038 CEST4727INHTTP/1.1 404 Not Found
                                          Cache-Control: no-store
                                          Pragma: no-cache
                                          Content-Type: text/html
                                          Server: IIS
                                          X-Powered-By: WAF/2.0
                                          Date: Wed, 12 May 2021 05:07:40 GMT
                                          Connection: close
                                          Content-Length: 1163
                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 d5 d2 b2 bb b5 bd ce c4 bc fe bb f2 c4 bf c2 bc a1 a3 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 73 69
                                          Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=gb2312"/><title>404 - </title><style type="text/css">...body{margin:0;font-si


                                          Code Manipulations

                                          User Modules

                                          Hook Summary

                                          Function NameHook TypeActive in Processes
                                          PeekMessageAINLINEexplorer.exe
                                          PeekMessageWINLINEexplorer.exe
                                          GetMessageWINLINEexplorer.exe
                                          GetMessageAINLINEexplorer.exe

                                          Processes

                                          Process: explorer.exe, Module: user32.dll
                                          Function NameHook TypeNew Data
                                          PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEC
                                          PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEC
                                          GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEC
                                          GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEC

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:06:28:46
                                          Start date:12/05/2021
                                          Path:C:\Users\user\Desktop\ox87DNNM8d.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\ox87DNNM8d.exe'
                                          Imagebase:0xb50000
                                          File size:840704 bytes
                                          MD5 hash:41E38BCD6F5F3001C2E4F08EBCD2396C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.234588732.0000000003F79000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.234229050.0000000002FC7000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:06:28:49
                                          Start date:12/05/2021
                                          Path:C:\Users\user\Desktop\ox87DNNM8d.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\ox87DNNM8d.exe
                                          Imagebase:0xfb0000
                                          File size:840704 bytes
                                          MD5 hash:41E38BCD6F5F3001C2E4F08EBCD2396C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.280873290.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.281369748.0000000001730000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.281290291.00000000015E0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:low

                                          General

                                          Start time:06:28:52
                                          Start date:12/05/2021
                                          Path:C:\Windows\explorer.exe
                                          Wow64 process (32bit):false
                                          Commandline:
                                          Imagebase:0x7ff693d90000
                                          File size:3933184 bytes
                                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:06:29:10
                                          Start date:12/05/2021
                                          Path:C:\Windows\SysWOW64\systray.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\systray.exe
                                          Imagebase:0x7ff797770000
                                          File size:9728 bytes
                                          MD5 hash:1373D481BE4C8A6E5F5030D2FB0A0C68
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.493625427.0000000000AA0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.492941508.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.492525761.0000000000170000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:moderate

                                          General

                                          Start time:06:29:15
                                          Start date:12/05/2021
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:/c del 'C:\Users\user\Desktop\ox87DNNM8d.exe'
                                          Imagebase:0xf60000
                                          File size:232960 bytes
                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:06:29:15
                                          Start date:12/05/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7ecfc0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Disassembly

                                          Code Analysis

                                          Reset < >