Loading ...

Play interactive tourEdit tour

Windows Analysis Report boI88C399w.exe

Overview

General Information

Sample Name:boI88C399w.exe
Analysis ID:437123
MD5:0a82064af051bad014b77038d60474b6
SHA1:f7bf190091d5fe307cfaeed630eeb341c935bda0
SHA256:8f165a26d7e9ad72cb0d51cf01076cc4b0099a244cd4e702645d36dc788dd0cc
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Emotet
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Connects to several IPs in different countries
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to enumerate running services
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains strange resources
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • boI88C399w.exe (PID: 5732 cmdline: 'C:\Users\user\Desktop\boI88C399w.exe' MD5: 0A82064AF051BAD014B77038D60474B6)
    • splwow64.exe (PID: 5764 cmdline: C:\Windows\splwow64.exe 12288 MD5: 8D59B31FF375059E3C32B17BF31A76D5)
    • fc.exe (PID: 4280 cmdline: C:\Windows\SysWOW64\wincorlib\fc.exe MD5: 0A82064AF051BAD014B77038D60474B6)
  • cleanup

Malware Configuration

Threatname: Emotet

{"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhANQOcBKvh5xEW7VcJ9totsjdBwuAclxS\nQ0e09fk8V053lktpW3TRrzAW63yt6j1KWnyxMrU3igFXypBoI4lVNmkje4UPtIIS\nfkzjEIvG1v/ZNn1k0J0PfFTxbFFeUEs3AwIDAQAB", "C2 list": ["88.153.35.32:80", "107.170.146.252:8080", "173.212.214.235:7080", "167.114.153.111:8080", "202.141.243.254:443", "75.143.247.51:80", "85.105.111.166:80", "216.139.123.119:80", "113.61.66.94:80", "162.241.140.129:8080", "190.12.119.180:443", "2.58.16.89:8080", "91.211.88.52:7080", "93.147.212.206:80", "71.15.245.148:8080", "157.245.99.39:8080", "27.114.9.93:80", "50.91.114.38:80", "174.106.122.139:80", "47.36.140.164:80", "139.162.60.124:8080", "209.54.13.14:80", "217.20.166.178:7080", "185.94.252.104:443", "72.186.136.247:443", "172.86.188.251:8080", "41.185.28.84:8080", "87.106.139.101:8080", "89.216.122.92:80", "108.46.29.236:80", "184.180.181.202:80", "173.63.222.65:80", "120.150.60.189:80", "62.30.7.67:443", "139.99.158.11:443", "220.245.198.194:80", "138.68.87.218:443", "201.241.127.190:80", "186.74.215.34:80", "190.162.215.233:80", "24.178.90.49:80", "89.121.205.18:80", "5.39.91.110:7080", "59.125.219.109:443", "182.208.30.18:443", "123.176.25.234:80", "24.137.76.62:80", "74.208.45.104:8080", "194.187.133.160:443", "37.179.204.33:80", "194.4.58.192:7080", "95.9.5.93:80", "67.170.250.203:443", "61.33.119.226:443", "96.245.227.43:80", "68.115.186.26:80", "190.108.228.27:443", "112.185.64.233:80", "176.111.60.55:8080", "91.146.156.228:80", "190.240.194.77:443", "115.94.207.99:443", "62.171.142.179:8080", "134.209.144.106:443", "168.235.67.138:7080", "124.41.215.226:80", "172.104.97.173:8080", "202.134.4.216:8080", "94.200.114.161:80", "67.163.161.107:80", "61.76.222.210:80", "97.82.79.83:80", "74.214.230.200:80", "46.105.131.79:8080", "78.188.106.53:443", "186.70.56.94:443", "120.150.218.241:443", "50.245.107.73:443", "123.142.37.166:80", "110.145.77.103:80", "61.19.246.238:443", "218.147.193.146:80", "94.230.70.6:80", "154.91.33.137:443", "104.131.11.150:443", "95.213.236.64:8080", "49.50.209.131:80", "187.161.206.24:80", "37.139.21.175:8080", "121.124.124.40:7080", "200.116.145.225:443", "24.230.141.169:80", "194.190.67.75:80", "209.141.54.221:7080", "137.59.187.107:8080", "217.123.207.149:80", "24.133.106.23:80", "79.137.83.50:443", "24.179.13.119:80", "202.134.4.211:8080", "78.24.219.147:8080", "76.175.162.101:80", "121.7.31.214:80", "62.75.141.82:80", "109.74.5.95:8080", "75.188.96.231:80", "176.113.52.6:443", "50.35.17.13:80", "118.83.154.64:443", "110.142.236.207:80", "188.219.31.12:80", "72.143.73.234:443", "102.182.93.220:80", "66.76.12.94:8080", "103.86.49.11:8080", "190.164.104.62:80", "203.153.216.189:7080", "119.59.116.21:8080", "172.105.13.66:443", "94.23.237.171:443", "49.3.224.99:8080", "139.59.60.244:8080", "172.91.208.86:80"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.577302353.0000000002B71000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000000.00000002.225706038.0000000002471000.00000020.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000005.00000002.573236388.00000000004F9000.00000004.00000020.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000000.00000002.225568967.0000000000738000.00000004.00000020.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
          00000005.00000003.266432635.00000000005AC000.00000004.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.fc.exe.5ac3b0.1.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              5.2.fc.exe.5ac3b0.1.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                5.2.fc.exe.2b70000.3.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  5.3.fc.exe.5ac3b0.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                    0.2.boI88C399w.exe.75fdc0.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                      Click to see the 2 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: boI88C399w.exeAvira: detected
                      Found malware configurationShow sources
                      Source: 0.2.boI88C399w.exe.75fdc0.2.raw.unpackMalware Configuration Extractor: Emotet {"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhANQOcBKvh5xEW7VcJ9totsjdBwuAclxS\nQ0e09fk8V053lktpW3TRrzAW63yt6j1KWnyxMrU3igFXypBoI4lVNmkje4UPtIIS\nfkzjEIvG1v/ZNn1k0J0PfFTxbFFeUEs3AwIDAQAB", "C2 list": ["88.153.35.32:80", "107.170.146.252:8080", "173.212.214.235:7080", "167.114.153.111:8080", "202.141.243.254:443", "75.143.247.51:80", "85.105.111.166:80", "216.139.123.119:80", "113.61.66.94:80", "162.241.140.129:8080", "190.12.119.180:443", "2.58.16.89:8080", "91.211.88.52:7080", "93.147.212.206:80", "71.15.245.148:8080", "157.245.99.39:8080", "27.114.9.93:80", "50.91.114.38:80", "174.106.122.139:80", "47.36.140.164:80", "139.162.60.124:8080", "209.54.13.14:80", "217.20.166.178:7080", "185.94.252.104:443", "72.186.136.247:443", "172.86.188.251:8080", "41.185.28.84:8080", "87.106.139.101:8080", "89.216.122.92:80", "108.46.29.236:80", "184.180.181.202:80", "173.63.222.65:80", "120.150.60.189:80", "62.30.7.67:443", "139.99.158.11:443", "220.245.198.194:80", "138.68.87.218:443", "201.241.127.190:80", "186.74.215.34:80", "190.162.215.233:80", "24.178.90.49:80", "89.121.205.18:80", "5.39.91.110:7080", "59.125.219.109:443", "182.208.30.18:443", "123.176.25.234:80", "24.137.76.62:80", "74.208.45.104:8080", "194.187.133.160:443", "37.179.204.33:80", "194.4.58.192:7080", "95.9.5.93:80", "67.170.250.203:443", "61.33.119.226:443", "96.245.227.43:80", "68.115.186.26:80", "190.108.228.27:443", "112.185.64.233:80", "176.111.60.55:8080", "91.146.156.228:80", "190.240.194.77:443", "115.94.207.99:443", "62.171.142.179:8080", "134.209.144.106:443", "168.235.67.138:7080", "124.41.215.226:80", "172.104.97.173:8080", "202.134.4.216:8080", "94.200.114.161:80", "67.163.161.107:80", "61.76.222.210:80", "97.82.79.83:80", "74.214.230.200:80", "46.105.131.79:8080", "78.188.106.53:443", "186.70.56.94:443", "120.150.218.241:443", "50.245.107.73:443", "123.142.37.166:80", "110.145.77.103:80", "61.19.246.238:443", "218.147.193.146:80", "94.230.70.6:80", "154.91.33.137:443", "104.131.11.150:443", "95.213.236.64:8080", "49.50.209.131:80", "187.161.206.24:80", "37.139.21.175:8080", "121.124.124.40:7080", "200.116.145.225:443", "24.230.141.169:80", "194.190.67.75:80", "209.141.54.221:7080", "137.59.187.107:8080", "217.123.207.149:80", "24.133.106.23:80", "79.137.83.50:443", "24.179.13.119:80", "202.134.4.211:8080", "78.24.219.147:8080", "76.175.162.101:80", "121.7.31.214:80", "62.75.141.82:80", "109.74.5.95:8080", "75.188.96.231:80", "176.113.52.6:443", "50.35.17.13:80", "118.83.154.64:443", "110.142.236.207:80", "188.219.31.12:80", "72.143.73.234:443", "102.182.93.220:80", "66.76.12.94:8080", "103.86.49.11:8080", "190.164.104.62:80", "203.153.216.189:7080", "119.59.116.21:8080", "172.105.13.66:443", "94.23.237.171:443", "49.3.224.99:8080", "139.59.60.244:8080", "172.91.208.86:80"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: boI88C399w.exeVirustotal: Detection: 81%Perma Link
                      Source: boI88C399w.exeMetadefender: Detection: 71%Perma Link
                      Source: boI88C399w.exeReversingLabs: Detection: 89%
                      Machine Learning detection for sampleShow sources
                      Source: boI88C399w.exeJoe Sandbox ML: detected
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B72290 CryptGetHashParam,CryptEncrypt,CryptDestroyHash,CryptDuplicateHash,memcpy,CryptExportKey,GetProcessHeap,RtlAllocateHeap,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B72650 CryptAcquireContextW,CryptGenKey,CryptCreateHash,CryptImportKey,LocalFree,CryptDecodeObjectEx,CryptDecodeObjectEx,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B71FB0 memcpy,GetProcessHeap,RtlAllocateHeap,CryptDestroyHash,CryptDuplicateHash,
                      Source: boI88C399w.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_024738F0 FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,FindFirstFileW,_snwprintf,FindClose,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B738F0 FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,_snwprintf,FindClose,FindClose,

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 88.153.35.32:80
                      Source: Malware configuration extractorIPs: 107.170.146.252:8080
                      Source: Malware configuration extractorIPs: 173.212.214.235:7080
                      Source: Malware configuration extractorIPs: 167.114.153.111:8080
                      Source: Malware configuration extractorIPs: 202.141.243.254:443
                      Source: Malware configuration extractorIPs: 75.143.247.51:80
                      Source: Malware configuration extractorIPs: 85.105.111.166:80
                      Source: Malware configuration extractorIPs: 216.139.123.119:80
                      Source: Malware configuration extractorIPs: 113.61.66.94:80
                      Source: Malware configuration extractorIPs: 162.241.140.129:8080
                      Source: Malware configuration extractorIPs: 190.12.119.180:443
                      Source: Malware configuration extractorIPs: 2.58.16.89:8080
                      Source: Malware configuration extractorIPs: 91.211.88.52:7080
                      Source: Malware configuration extractorIPs: 93.147.212.206:80
                      Source: Malware configuration extractorIPs: 71.15.245.148:8080
                      Source: Malware configuration extractorIPs: 157.245.99.39:8080
                      Source: Malware configuration extractorIPs: 27.114.9.93:80
                      Source: Malware configuration extractorIPs: 50.91.114.38:80
                      Source: Malware configuration extractorIPs: 174.106.122.139:80
                      Source: Malware configuration extractorIPs: 47.36.140.164:80
                      Source: Malware configuration extractorIPs: 139.162.60.124:8080
                      Source: Malware configuration extractorIPs: 209.54.13.14:80
                      Source: Malware configuration extractorIPs: 217.20.166.178:7080
                      Source: Malware configuration extractorIPs: 185.94.252.104:443
                      Source: Malware configuration extractorIPs: 72.186.136.247:443
                      Source: Malware configuration extractorIPs: 172.86.188.251:8080
                      Source: Malware configuration extractorIPs: 41.185.28.84:8080
                      Source: Malware configuration extractorIPs: 87.106.139.101:8080
                      Source: Malware configuration extractorIPs: 89.216.122.92:80
                      Source: Malware configuration extractorIPs: 108.46.29.236:80
                      Source: Malware configuration extractorIPs: 184.180.181.202:80
                      Source: Malware configuration extractorIPs: 173.63.222.65:80
                      Source: Malware configuration extractorIPs: 120.150.60.189:80
                      Source: Malware configuration extractorIPs: 62.30.7.67:443
                      Source: Malware configuration extractorIPs: 139.99.158.11:443
                      Source: Malware configuration extractorIPs: 220.245.198.194:80
                      Source: Malware configuration extractorIPs: 138.68.87.218:443
                      Source: Malware configuration extractorIPs: 201.241.127.190:80
                      Source: Malware configuration extractorIPs: 186.74.215.34:80
                      Source: Malware configuration extractorIPs: 190.162.215.233:80
                      Source: Malware configuration extractorIPs: 24.178.90.49:80
                      Source: Malware configuration extractorIPs: 89.121.205.18:80
                      Source: Malware configuration extractorIPs: 5.39.91.110:7080
                      Source: Malware configuration extractorIPs: 59.125.219.109:443
                      Source: Malware configuration extractorIPs: 182.208.30.18:443
                      Source: Malware configuration extractorIPs: 123.176.25.234:80
                      Source: Malware configuration extractorIPs: 24.137.76.62:80
                      Source: Malware configuration extractorIPs: 74.208.45.104:8080
                      Source: Malware configuration extractorIPs: 194.187.133.160:443
                      Source: Malware configuration extractorIPs: 37.179.204.33:80
                      Source: Malware configuration extractorIPs: 194.4.58.192:7080
                      Source: Malware configuration extractorIPs: 95.9.5.93:80
                      Source: Malware configuration extractorIPs: 67.170.250.203:443
                      Source: Malware configuration extractorIPs: 61.33.119.226:443
                      Source: Malware configuration extractorIPs: 96.245.227.43:80
                      Source: Malware configuration extractorIPs: 68.115.186.26:80
                      Source: Malware configuration extractorIPs: 190.108.228.27:443
                      Source: Malware configuration extractorIPs: 112.185.64.233:80
                      Source: Malware configuration extractorIPs: 176.111.60.55:8080
                      Source: Malware configuration extractorIPs: 91.146.156.228:80
                      Source: Malware configuration extractorIPs: 190.240.194.77:443
                      Source: Malware configuration extractorIPs: 115.94.207.99:443
                      Source: Malware configuration extractorIPs: 62.171.142.179:8080
                      Source: Malware configuration extractorIPs: 134.209.144.106:443
                      Source: Malware configuration extractorIPs: 168.235.67.138:7080
                      Source: Malware configuration extractorIPs: 124.41.215.226:80
                      Source: Malware configuration extractorIPs: 172.104.97.173:8080
                      Source: Malware configuration extractorIPs: 202.134.4.216:8080
                      Source: Malware configuration extractorIPs: 94.200.114.161:80
                      Source: Malware configuration extractorIPs: 67.163.161.107:80
                      Source: Malware configuration extractorIPs: 61.76.222.210:80
                      Source: Malware configuration extractorIPs: 97.82.79.83:80
                      Source: Malware configuration extractorIPs: 74.214.230.200:80
                      Source: Malware configuration extractorIPs: 46.105.131.79:8080
                      Source: Malware configuration extractorIPs: 78.188.106.53:443
                      Source: Malware configuration extractorIPs: 186.70.56.94:443
                      Source: Malware configuration extractorIPs: 120.150.218.241:443
                      Source: Malware configuration extractorIPs: 50.245.107.73:443
                      Source: Malware configuration extractorIPs: 123.142.37.166:80
                      Source: Malware configuration extractorIPs: 110.145.77.103:80
                      Source: Malware configuration extractorIPs: 61.19.246.238:443
                      Source: Malware configuration extractorIPs: 218.147.193.146:80
                      Source: Malware configuration extractorIPs: 94.230.70.6:80
                      Source: Malware configuration extractorIPs: 154.91.33.137:443
                      Source: Malware configuration extractorIPs: 104.131.11.150:443
                      Source: Malware configuration extractorIPs: 95.213.236.64:8080
                      Source: Malware configuration extractorIPs: 49.50.209.131:80
                      Source: Malware configuration extractorIPs: 187.161.206.24:80
                      Source: Malware configuration extractorIPs: 37.139.21.175:8080
                      Source: Malware configuration extractorIPs: 121.124.124.40:7080
                      Source: Malware configuration extractorIPs: 200.116.145.225:443
                      Source: Malware configuration extractorIPs: 24.230.141.169:80
                      Source: Malware configuration extractorIPs: 194.190.67.75:80
                      Source: Malware configuration extractorIPs: 209.141.54.221:7080
                      Source: Malware configuration extractorIPs: 137.59.187.107:8080
                      Source: Malware configuration extractorIPs: 217.123.207.149:80
                      Source: Malware configuration extractorIPs: 24.133.106.23:80
                      Source: Malware configuration extractorIPs: 79.137.83.50:443
                      Source: Malware configuration extractorIPs: 24.179.13.119:80
                      Source: Malware configuration extractorIPs: 202.134.4.211:8080
                      Source: Malware configuration extractorIPs: 78.24.219.147:8080
                      Source: Malware configuration extractorIPs: 76.175.162.101:80
                      Source: Malware configuration extractorIPs: 121.7.31.214:80
                      Source: Malware configuration extractorIPs: 62.75.141.82:80
                      Source: Malware configuration extractorIPs: 109.74.5.95:8080
                      Source: Malware configuration extractorIPs: 75.188.96.231:80
                      Source: Malware configuration extractorIPs: 176.113.52.6:443
                      Source: Malware configuration extractorIPs: 50.35.17.13:80
                      Source: Malware configuration extractorIPs: 118.83.154.64:443
                      Source: Malware configuration extractorIPs: 110.142.236.207:80
                      Source: Malware configuration extractorIPs: 188.219.31.12:80
                      Source: Malware configuration extractorIPs: 72.143.73.234:443
                      Source: Malware configuration extractorIPs: 102.182.93.220:80
                      Source: Malware configuration extractorIPs: 66.76.12.94:8080
                      Source: Malware configuration extractorIPs: 103.86.49.11:8080
                      Source: Malware configuration extractorIPs: 190.164.104.62:80
                      Source: Malware configuration extractorIPs: 203.153.216.189:7080
                      Source: Malware configuration extractorIPs: 119.59.116.21:8080
                      Source: Malware configuration extractorIPs: 172.105.13.66:443
                      Source: Malware configuration extractorIPs: 94.23.237.171:443
                      Source: Malware configuration extractorIPs: 49.3.224.99:8080
                      Source: Malware configuration extractorIPs: 139.59.60.244:8080
                      Source: Malware configuration extractorIPs: 172.91.208.86:80
                      Source: unknownNetwork traffic detected: IP country count 36
                      Source: global trafficTCP traffic: 192.168.2.3:49728 -> 107.170.146.252:8080
                      Source: global trafficTCP traffic: 192.168.2.3:49745 -> 173.212.214.235:7080
                      Source: global trafficTCP traffic: 192.168.2.3:49746 -> 167.114.153.111:8080
                      Source: Joe Sandbox ViewIP Address: 115.94.207.99 115.94.207.99
                      Source: Joe Sandbox ViewASN Name: HOSTER-KZ HOSTER-KZ
                      Source: Joe Sandbox ViewASN Name: AfrihostZA AfrihostZA
                      Source: Joe Sandbox ViewASN Name: TTNETTR TTNETTR
                      Source: global trafficTCP traffic: 192.168.2.3:49724 -> 88.153.35.32:80
                      Source: global trafficTCP traffic: 192.168.2.3:49747 -> 202.141.243.254:443
                      Source: global trafficTCP traffic: 192.168.2.3:49750 -> 75.143.247.51:80
                      Source: global trafficTCP traffic: 192.168.2.3:49751 -> 85.105.111.166:80
                      Source: global trafficTCP traffic: 192.168.2.3:49752 -> 216.139.123.119:80
                      Source: unknownTCP traffic detected without corresponding DNS query: 88.153.35.32
                      Source: unknownTCP traffic detected without corresponding DNS query: 88.153.35.32
                      Source: unknownTCP traffic detected without corresponding DNS query: 88.153.35.32
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.170.146.252
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.170.146.252
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.170.146.252
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.212.214.235
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.212.214.235
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.212.214.235
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.111
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.111
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.111
                      Source: unknownTCP traffic detected without corresponding DNS query: 202.141.243.254
                      Source: unknownTCP traffic detected without corresponding DNS query: 202.141.243.254
                      Source: unknownTCP traffic detected without corresponding DNS query: 202.141.243.254
                      Source: unknownTCP traffic detected without corresponding DNS query: 75.143.247.51
                      Source: unknownTCP traffic detected without corresponding DNS query: 75.143.247.51
                      Source: unknownTCP traffic detected without corresponding DNS query: 75.143.247.51
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.105.111.166
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.105.111.166
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.105.111.166
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.139.123.119
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.139.123.119
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.139.123.119
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://167.114.153.111:8080/AmfQn/laoa/
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://167.114.153.111:8080/AmfQn/laoa/g
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://167.114.153.111:8080/AmfQn/laoa/m32
                      Source: fc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpString found in binary or memory: http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/
                      Source: fc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpString found in binary or memory: http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/Li
                      Source: fc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpString found in binary or memory: http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/s
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/7
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/VR
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/F
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpString found in binary or memory: http://85.105.111.166/6iiGh76IeO/aJgypRAqW/2V5m3orudg9mFaTWI/
                      Source: fc.exe, 00000005.00000003.321436070.00000000034BA000.00000004.00000001.sdmpString found in binary or memory: https://fs.microsoft.cYc/Tl5gD37u1c6qu/DYYIe0MAxvvXe/
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 00000005.00000002.577302353.0000000002B71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.225706038.0000000002471000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.573236388.00000000004F9000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.225568967.0000000000738000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.266432635.00000000005AC000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.fc.exe.5ac3b0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.fc.exe.5ac3b0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.fc.exe.2b70000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.fc.exe.5ac3b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.75fdc0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.75fdc0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.2470000.3.unpack, type: UNPACKEDPE
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B72650 CryptAcquireContextW,CryptGenKey,CryptCreateHash,CryptImportKey,LocalFree,CryptDecodeObjectEx,CryptDecodeObjectEx,
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_024501F0 GetCurrentProcess,NtQueryInformationProcess,GetProcessHeap,HeapFree,GetProcessHeap,RtlAllocateHeap,GetCurrentProcess,NtQueryInformationProcess,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B601F0 GetCurrentProcess,NtQueryInformationProcess,GetProcessHeap,HeapFree,GetProcessHeap,RtlAllocateHeap,GetCurrentProcess,NtQueryInformationProcess,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile created: C:\Windows\SysWOW64\wincorlib\Jump to behavior
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile deleted: C:\Windows\SysWOW64\wincorlib\fc.exe:Zone.IdentifierJump to behavior
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_00451D80
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02478240
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02477740
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02473F20
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02473BA0
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02471C70
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02473D10
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02476530
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B78240
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B73BA0
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B76530
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B73F20
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B73D10
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B71C70
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B77740
                      Source: boI88C399w.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: boI88C399w.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: boI88C399w.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: boI88C399w.exe, 00000000.00000002.225404132.0000000000470000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSEKPaint2.exe vs boI88C399w.exe
                      Source: boI88C399w.exe, 00000000.00000002.225988358.0000000002D70000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs boI88C399w.exe
                      Source: boI88C399w.exe, 00000000.00000002.226263049.0000000003980000.00000002.00000001.sdmpBinary or memory string: originalfilename vs boI88C399w.exe
                      Source: boI88C399w.exe, 00000000.00000002.226263049.0000000003980000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs boI88C399w.exe
                      Source: boI88C399w.exeBinary or memory string: OriginalFilenameSEKPaint2.exe vs boI88C399w.exe
                      Source: boI88C399w.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: boI88C399w.exeBinary or memory string: F*\AC:\sekpaint20\SEKPaint2.vbp
                      Source: boI88C399w.exe, 00000000.00000002.225396242.000000000046C000.00000004.00020000.sdmp, fc.exe, 00000005.00000002.572856154.000000000046C000.00000004.00020000.sdmpBinary or memory string: @*\AC:\sekpaint20\SEKPaint2.vbp
                      Source: classification engineClassification label: mal88.troj.evad.winEXE@5/0@0/100
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: CloseServiceHandle,_snwprintf,CreateServiceW,CloseServiceHandle,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B74CB0 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,FindCloseChangeNotification,
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475070 EnumServicesStatusExW,GetTickCount,ChangeServiceConfig2W,OpenServiceW,OpenServiceW,QueryServiceConfig2W,CloseServiceHandle,GetProcessHeap,
                      Source: boI88C399w.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\boI88C399w.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\boI88C399w.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: boI88C399w.exeVirustotal: Detection: 81%
                      Source: boI88C399w.exeMetadefender: Detection: 71%
                      Source: boI88C399w.exeReversingLabs: Detection: 89%
                      Source: unknownProcess created: C:\Users\user\Desktop\boI88C399w.exe 'C:\Users\user\Desktop\boI88C399w.exe'
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess created: C:\Windows\SysWOW64\wincorlib\fc.exe C:\Windows\SysWOW64\wincorlib\fc.exe
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess created: C:\Windows\SysWOW64\wincorlib\fc.exe C:\Windows\SysWOW64\wincorlib\fc.exe
                      Source: C:\Users\user\Desktop\boI88C399w.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: boI88C399w.exeStatic PE information: real checksum: 0x8839b should be: 0x8f92d
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_0040C8B4 push es; retf
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_0040C915 push ds; iretd
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475E10 push ecx; mov dword ptr [esp], 0000F5B3h
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475EF0 push ecx; mov dword ptr [esp], 0000669Ch
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475EA0 push ecx; mov dword ptr [esp], 0000A3FDh
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475F20 push ecx; mov dword ptr [esp], 0000E36Ch
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475CD0 push ecx; mov dword ptr [esp], 00001CE1h
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475D50 push ecx; mov dword ptr [esp], 00006847h
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475D00 push ecx; mov dword ptr [esp], 00001F9Eh
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475D20 push ecx; mov dword ptr [esp], 0000C5A1h
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475DC0 push ecx; mov dword ptr [esp], 000089FAh
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475DF0 push ecx; mov dword ptr [esp], 0000AAF5h
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02475D90 push ecx; mov dword ptr [esp], 0000B2E0h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75EA0 push ecx; mov dword ptr [esp], 0000A3FDh
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75D90 push ecx; mov dword ptr [esp], 0000B2E0h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75DF0 push ecx; mov dword ptr [esp], 0000AAF5h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75EF0 push ecx; mov dword ptr [esp], 0000669Ch
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75CD0 push ecx; mov dword ptr [esp], 00001CE1h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75DC0 push ecx; mov dword ptr [esp], 000089FAh
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75D20 push ecx; mov dword ptr [esp], 0000C5A1h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75F20 push ecx; mov dword ptr [esp], 0000E36Ch
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75E10 push ecx; mov dword ptr [esp], 0000F5B3h
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75D00 push ecx; mov dword ptr [esp], 00001F9Eh
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75D50 push ecx; mov dword ptr [esp], 00006847h
                      Source: initial sampleStatic PE information: section name: .text entropy: 6.95649403306

                      Persistence and Installation Behavior:

                      barindex
                      Drops executables to the windows directory (C:\Windows) and starts themShow sources
                      Source: C:\Users\user\Desktop\boI88C399w.exeExecutable created and started: C:\Windows\SysWOW64\wincorlib\fc.exe
                      Source: C:\Users\user\Desktop\boI88C399w.exePE file moved: C:\Windows\SysWOW64\wincorlib\fc.exeJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile opened: C:\Windows\SysWOW64\wincorlib\fc.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\splwow64.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: EnumServicesStatusExW,GetTickCount,ChangeServiceConfig2W,OpenServiceW,OpenServiceW,QueryServiceConfig2W,CloseServiceHandle,GetProcessHeap,
                      Source: C:\Users\user\Desktop\boI88C399w.exeAPI coverage: 8.1 %
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\splwow64.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\boI88C399w.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_024738F0 FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,FindFirstFileW,_snwprintf,FindClose,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B738F0 FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,_snwprintf,FindClose,FindClose,
                      Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000
                      Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000
                      Source: fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02474E20 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02473F20 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B73F20 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B74E20 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02477EC0 _snwprintf,GetProcessHeap,SetFileInformationByHandle,SetFileInformationByHandle,GetSystemTimeAsFileTime,CreateFileW,CreateFileW,CloseHandle,
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: fc.exe, 00000005.00000002.574245798.0000000000CE0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: fc.exe, 00000005.00000002.574245798.0000000000CE0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: fc.exe, 00000005.00000002.574245798.0000000000CE0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: fc.exe, 00000005.00000002.574245798.0000000000CE0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\boI88C399w.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Desktop\boI88C399w.exeCode function: 0_2_02478240 CreateFileW,CreateFileW,GetModuleFileNameW,GetSystemTimeAsFileTime,CloseHandle,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeCode function: 5_2_02B75360 RtlGetVersion,GetNativeSystemInfo,GetNativeSystemInfo,
                      Source: C:\Windows\SysWOW64\wincorlib\fc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 00000005.00000002.577302353.0000000002B71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.225706038.0000000002471000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.573236388.00000000004F9000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.225568967.0000000000738000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.266432635.00000000005AC000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.fc.exe.5ac3b0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.fc.exe.5ac3b0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.fc.exe.2b70000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.fc.exe.5ac3b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.75fdc0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.75fdc0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.boI88C399w.exe.2470000.3.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsService Execution1Windows Service2Windows Service2Masquerading12OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection2Virtualization/Sandbox Evasion11LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Hidden Files and Directories1NTDSVirtualization/Sandbox Evasion11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsProcess Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Service Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsFile Deletion1DCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery15Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      boI88C399w.exe82%VirustotalBrowse
                      boI88C399w.exe71%MetadefenderBrowse
                      boI88C399w.exe90%ReversingLabsWin32.Trojan.Emotet
                      boI88C399w.exe100%AviraTR/AD.Emotet.fkb
                      boI88C399w.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.boI88C399w.exe.2470000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.fc.exe.2b70000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.fc.exe.5ac3b0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.boI88C399w.exe.75fdc0.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.3.fc.exe.5ac3b0.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/F0%Avira URL Cloudsafe
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/s0%Avira URL Cloudsafe
                      http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/VR0%Avira URL Cloudsafe
                      http://167.114.153.111:8080/AmfQn/laoa/0%Avira URL Cloudsafe
                      http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/0%Avira URL Cloudsafe
                      http://85.105.111.166/6iiGh76IeO/aJgypRAqW/2V5m3orudg9mFaTWI/0%Avira URL Cloudsafe
                      http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/70%Avira URL Cloudsafe
                      http://167.114.153.111:8080/AmfQn/laoa/g0%Avira URL Cloudsafe
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/0%Avira URL Cloudsafe
                      http://167.114.153.111:8080/AmfQn/laoa/m320%Avira URL Cloudsafe
                      https://fs.microsoft.cYc/Tl5gD37u1c6qu/DYYIe0MAxvvXe/0%Avira URL Cloudsafe
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/Li0%Avira URL Cloudsafe
                      http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/0%Avira URL Cloudsafe
                      http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/Ffc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/sfc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/VRfc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://167.114.153.111:8080/AmfQn/laoa/fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://216.139.123.119/jS1u1RylwJ0/ushYaxCswmnhpg8wg/IFRzwb/XI7ecLcKBMfSHZz/fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.105.111.166/6iiGh76IeO/aJgypRAqW/2V5m3orudg9mFaTWI/fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/7fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://167.114.153.111:8080/AmfQn/laoa/gfc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/fc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://167.114.153.111:8080/AmfQn/laoa/m32fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fs.microsoft.cYc/Tl5gD37u1c6qu/DYYIe0MAxvvXe/fc.exe, 00000005.00000003.321436070.00000000034BA000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://173.212.214.235:7080/QDQtiYj/vpRVOewQUQw/Lifc.exe, 00000005.00000002.577528007.00000000032E0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://202.141.243.254:443/pnAiI1qDTX4MOWqj5/rKh0M3hfFy7/724FLNcoQQG/kEVoVU2yQVRTXfUnKo/fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://75.143.247.51/uRFHuG0msb/ffbgj4v2OG95Kn7J/dP2odtQaTNo5/fc.exe, 00000005.00000002.578075995.00000000034A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      194.4.58.192
                      unknownKazakhstan
                      202958HOSTER-KZtrue
                      102.182.93.220
                      unknownSouth Africa
                      37611AfrihostZAtrue
                      95.9.5.93
                      unknownTurkey
                      9121TTNETTRtrue
                      94.200.114.161
                      unknownUnited Arab Emirates
                      15802DU-AS1AEtrue
                      72.186.136.247
                      unknownUnited States
                      33363BHN-33363UStrue
                      115.94.207.99
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      89.121.205.18
                      unknownRomania
                      9050RTDBucharestRomaniaROtrue
                      24.133.106.23
                      unknownTurkey
                      47524TURKSAT-ASTRtrue
                      216.139.123.119
                      unknownUnited States
                      395582GRM-NETWORKUStrue
                      200.116.145.225
                      unknownColombia
                      13489EPMTelecomunicacionesSAESPCOtrue
                      138.68.87.218
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      172.105.13.66
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      220.245.198.194
                      unknownAustralia
                      7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
                      67.170.250.203
                      unknownUnited States
                      7922COMCAST-7922UStrue
                      104.131.11.150
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      176.111.60.55
                      unknownUkraine
                      24703UN-UKRAINE-ASKievUkraineUAtrue
                      24.178.90.49
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      94.23.237.171
                      unknownFrance
                      16276OVHFRtrue
                      187.161.206.24
                      unknownMexico
                      11888TelevisionInternacionalSAdeCVMXtrue
                      41.185.28.84
                      unknownSouth Africa
                      36943GridhostZAtrue
                      194.190.67.75
                      unknownRussian Federation
                      50804BESTLINE-NET-PROTVINORUtrue
                      186.74.215.34
                      unknownPanama
                      11556CableWirelessPanamaPAtrue
                      202.134.4.216
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      120.150.218.241
                      unknownAustralia
                      1221ASN-TELSTRATelstraCorporationLtdAUtrue
                      202.134.4.211
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      87.106.139.101
                      unknownGermany
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      62.30.7.67
                      unknownUnited Kingdom
                      5089NTLGBtrue
                      123.142.37.166
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      75.143.247.51
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      49.3.224.99
                      unknownAustralia
                      4804MPX-ASMicroplexPTYLTDAUtrue
                      162.241.140.129
                      unknownUnited States
                      46606UNIFIEDLAYER-AS-1UStrue
                      124.41.215.226
                      unknownNepal
                      17501WLINK-NEPAL-AS-APWorldLinkCommunicationsPvtLtdNPtrue
                      62.75.141.82
                      unknownGermany
                      8972GD-EMEA-DC-SXB1DEtrue
                      119.59.116.21
                      unknownThailand
                      56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                      113.61.66.94
                      unknownAustralia
                      45510TELCOINABOX-AULevel109HunterStreetAUtrue
                      96.245.227.43
                      unknownUnited States
                      701UUNETUStrue
                      172.91.208.86
                      unknownUnited States
                      20001TWC-20001-PACWESTUStrue
                      37.139.21.175
                      unknownNetherlands
                      14061DIGITALOCEAN-ASNUStrue
                      194.187.133.160
                      unknownBulgaria
                      13124IBGCBGtrue
                      121.7.31.214
                      unknownSingapore
                      9506SINGTEL-FIBRESingtelFibreBroadbandSGtrue
                      112.185.64.233
                      unknownKorea Republic of
                      4766KIXS-AS-KRKoreaTelecomKRtrue
                      61.76.222.210
                      unknownKorea Republic of
                      4766KIXS-AS-KRKoreaTelecomKRtrue
                      95.213.236.64
                      unknownRussian Federation
                      49505SELECTELRUtrue
                      46.105.131.79
                      unknownFrance
                      16276OVHFRtrue
                      27.114.9.93
                      unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
                      74.214.230.200
                      unknownUnited States
                      36728EMERYTELCOMUStrue
                      190.162.215.233
                      unknownChile
                      22047VTRBANDAANCHASACLtrue
                      110.145.77.103
                      unknownAustralia
                      1221ASN-TELSTRATelstraCorporationLtdAUtrue
                      120.150.60.189
                      unknownAustralia
                      1221ASN-TELSTRATelstraCorporationLtdAUtrue
                      154.91.33.137
                      unknownSeychelles
                      137443ANCHGLOBAL-AS-APAnchnetAsiaLimitedHKtrue
                      107.170.146.252
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      93.147.212.206
                      unknownItaly
                      30722VODAFONE-IT-ASNITtrue
                      91.211.88.52
                      unknownUkraine
                      206638HOSTFORYUAtrue
                      172.86.188.251
                      unknownCanada
                      32489AMANAHA-NEWCAtrue
                      50.35.17.13
                      unknownUnited States
                      27017ZIPLY-FIBER-LEGACY-ASNUStrue
                      157.245.99.39
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      75.188.96.231
                      unknownUnited States
                      10796TWC-10796-MIDWESTUStrue
                      167.114.153.111
                      unknownCanada
                      16276OVHFRtrue
                      37.179.204.33
                      unknownItaly
                      30722VODAFONE-IT-ASNITtrue
                      203.153.216.189
                      unknownIndonesia
                      45291SURF-IDPTSurfindoNetworkIDtrue
                      2.58.16.89
                      unknownLatvia
                      64421SERTEX-ASLVtrue
                      59.125.219.109
                      unknownTaiwan; Republic of China (ROC)
                      3462HINETDataCommunicationBusinessGroupTWtrue
                      62.171.142.179
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      123.176.25.234
                      unknownMaldives
                      7642DHIRAAGU-MV-APDHIVEHIRAAJJEYGEGULHUNPLCMVtrue
                      50.91.114.38
                      unknownUnited States
                      33363BHN-33363UStrue
                      61.33.119.226
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      217.123.207.149
                      unknownNetherlands
                      33915TNF-ASNLtrue
                      78.24.219.147
                      unknownRussian Federation
                      29182THEFIRST-ASRUtrue
                      173.63.222.65
                      unknownUnited States
                      701UUNETUStrue
                      24.179.13.119
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      173.212.214.235
                      unknownGermany
                      51167CONTABODEtrue
                      47.36.140.164
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      110.142.236.207
                      unknownAustralia
                      1221ASN-TELSTRATelstraCorporationLtdAUtrue
                      139.99.158.11
                      unknownCanada
                      16276OVHFRtrue
                      49.50.209.131
                      unknownNew Zealand
                      55853MEGATEL-AS-APMegatelNZtrue
                      190.108.228.27
                      unknownArgentina
                      27751NeunetSAARtrue
                      202.141.243.254
                      unknownPakistan
                      9260MULTINET-AS-APMultinetPakistanPvtLtdPKtrue
                      121.124.124.40
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      139.59.60.244
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      61.19.246.238
                      unknownThailand
                      9335CAT-CLOUD-APCATTelecomPublicCompanyLimitedTHtrue
                      168.235.67.138
                      unknownUnited States
                      3842RAMNODEUStrue
                      137.59.187.107
                      unknownHong Kong
                      18106VIEWQWEST-SG-APViewqwestPteLtdSGtrue
                      78.188.106.53
                      unknownTurkey
                      9121TTNETTRtrue
                      71.15.245.148
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      188.219.31.12
                      unknownItaly
                      30722VODAFONE-IT-ASNITtrue
                      217.20.166.178
                      unknownUkraine
                      1820WNETUStrue
                      24.230.141.169
                      unknownUnited States
                      11232MIDCO-NETUStrue
                      74.208.45.104
                      unknownUnited States
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      134.209.144.106
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      186.70.56.94
                      unknownEcuador
                      14522SatnetECtrue
                      97.82.79.83
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      190.12.119.180
                      unknownArgentina
                      11014CPSARtrue
                      139.162.60.124
                      unknownNetherlands
                      63949LINODE-APLinodeLLCUStrue
                      172.104.97.173
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      184.180.181.202
                      unknownUnited States
                      22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                      176.113.52.6
                      unknownRussian Federation
                      8712INTA-ASRUtrue
                      201.241.127.190
                      unknownChile
                      22047VTRBANDAANCHASACLtrue
                      68.115.186.26
                      unknownUnited States
                      20115CHARTER-20115UStrue
                      24.137.76.62
                      unknownCanada
                      11260EASTLINK-HSICAtrue
                      91.146.156.228
                      unknownHungary
                      8462TARR1HUtrue

                      General Information

                      Joe Sandbox Version:32.0.0 Black Diamond
                      Analysis ID:437123
                      Start date:19.06.2021
                      Start time:12:41:52
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 47s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:boI88C399w.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:34
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal88.troj.evad.winEXE@5/0@0/100
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 46.3% (good quality ratio 40.6%)
                      • Quality average: 61%
                      • Quality standard deviation: 30.1%
                      HCA Information:
                      • Successful, ratio: 80%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Max analysis timeout: 220s exceeded, the analysis took too long
                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      12:42:43API Interceptor7x Sleep call for process: splwow64.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      194.4.58.192v8iFmF7XPp.dllGet hashmaliciousBrowse
                        2ojdmC51As.exeGet hashmaliciousBrowse
                          IU-8549 Medical report COVID-19.docGet hashmaliciousBrowse
                            102.182.93.220boI88C399w.exeGet hashmaliciousBrowse
                              2ojdmC51As.exeGet hashmaliciousBrowse
                                95.9.5.93boI88C399w.exeGet hashmaliciousBrowse
                                  v8iFmF7XPp.dllGet hashmaliciousBrowse
                                    2ojdmC51As.exeGet hashmaliciousBrowse
                                      IU-8549 Medical report COVID-19.docGet hashmaliciousBrowse
                                        94.200.114.161test-emotet.exeGet hashmaliciousBrowse
                                        • 94.200.114.161/
                                        72.186.136.247boI88C399w.exeGet hashmaliciousBrowse
                                          v8iFmF7XPp.dllGet hashmaliciousBrowse
                                            115.94.207.99https://contentsxx.xsrv.jp/academia/parts_service/7xg/Get hashmaliciousBrowse
                                            • 115.94.207.99:443/OUnj/nu5Sn5pH6W/XCxNN4goRNgqaQshv/BH9p/alZ3dnjhwqocs6Wj/

                                            Domains

                                            No context

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            HOSTER-KZboI88C399w.exeGet hashmaliciousBrowse
                                            • 194.4.58.192
                                            jax.k.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            0519_3361871008218.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            fax.f.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            0513_3111026702554.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            0513_1360918519077.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            581a98e7_by_Libranalysis.docmGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            Win32.exeGet hashmaliciousBrowse
                                            • 185.113.134.179
                                            jers.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            v8iFmF7XPp.dllGet hashmaliciousBrowse
                                            • 194.4.58.192
                                            wininit.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            0408_391585988029.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            msals.pumpl.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            msals.pumpl.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            msals.dllGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            NvContainer.exeGet hashmaliciousBrowse
                                            • 185.113.134.179
                                            0318_45657944978421.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            2ojdmC51As.exeGet hashmaliciousBrowse
                                            • 194.4.58.192
                                            FileZilla_3.50.0_win64-setup.exeGet hashmaliciousBrowse
                                            • 185.116.194.200
                                            0304_87496944093261.docGet hashmaliciousBrowse
                                            • 185.100.65.29
                                            TTNETTRboI88C399w.exeGet hashmaliciousBrowse
                                            • 78.188.106.53
                                            invoice-H9247.docxGet hashmaliciousBrowse
                                            • 78.186.110.14
                                            2dhfmRiWST.exeGet hashmaliciousBrowse
                                            • 85.99.227.85
                                            aduYorlpGH.exeGet hashmaliciousBrowse
                                            • 85.99.227.85
                                            sample1.docGet hashmaliciousBrowse
                                            • 78.186.65.230
                                            tpdwIENhDh.exeGet hashmaliciousBrowse
                                            • 78.180.177.193
                                            17D54F646D676B09788537F84FC3BFC8699D78A6B11B9.exeGet hashmaliciousBrowse
                                            • 88.229.252.115
                                            9cf2c56e_by_Libranalysis.exeGet hashmaliciousBrowse
                                            • 88.249.120.205
                                            8UsA.shGet hashmaliciousBrowse
                                            • 78.188.19.132
                                            nT7K5GG5kmGet hashmaliciousBrowse
                                            • 85.110.95.80
                                            ldr.shGet hashmaliciousBrowse
                                            • 88.225.138.206
                                            qJiGYEJs.exeGet hashmaliciousBrowse
                                            • 78.189.219.196
                                            v8iFmF7XPp.dllGet hashmaliciousBrowse
                                            • 85.105.111.166
                                            VizZ3QTQMu.exeGet hashmaliciousBrowse
                                            • 195.174.29.189
                                            g9ldZ16mvPSd1Z1.exeGet hashmaliciousBrowse
                                            • 88.241.166.6
                                            2ojdmC51As.exeGet hashmaliciousBrowse
                                            • 85.105.111.166
                                            4xPTS0oLmE.exeGet hashmaliciousBrowse
                                            • 95.14.95.126
                                            MiAouAtLEk.exeGet hashmaliciousBrowse
                                            • 88.229.0.210
                                            vB2sN14K0Y.exeGet hashmaliciousBrowse
                                            • 78.189.230.30
                                            IU-8549 Medical report COVID-19.docGet hashmaliciousBrowse
                                            • 85.105.111.166
                                            AfrihostZAboI88C399w.exeGet hashmaliciousBrowse
                                            • 102.182.93.220
                                            BfdkXo6xoH.exeGet hashmaliciousBrowse
                                            • 154.0.171.107
                                            85cUZZtEFA.xlsGet hashmaliciousBrowse
                                            • 154.0.164.210
                                            85cUZZtEFA.xlsGet hashmaliciousBrowse
                                            • 154.0.164.210
                                            85cUZZtEFA.xlsGet hashmaliciousBrowse
                                            • 154.0.164.210
                                            Document_38047842.xlsGet hashmaliciousBrowse
                                            • 154.0.164.210
                                            Fax_Doc#01_5.htmlGet hashmaliciousBrowse
                                            • 197.242.146.206
                                            New Order.exeGet hashmaliciousBrowse
                                            • 154.0.165.45
                                            sample1.docGet hashmaliciousBrowse
                                            • 41.76.213.144
                                            Booking Confirmation.xlsxGet hashmaliciousBrowse
                                            • 169.1.24.161
                                            HU4TEm4Vr7.exeGet hashmaliciousBrowse
                                            • 169.0.142.82
                                            product specification.xlsxGet hashmaliciousBrowse
                                            • 169.1.24.244
                                            ppc_unpackedGet hashmaliciousBrowse
                                            • 169.214.149.159
                                            MGuvcs6OczGet hashmaliciousBrowse
                                            • 169.208.248.210
                                            z3hir.binGet hashmaliciousBrowse
                                            • 169.128.215.34
                                            IMG001.exeGet hashmaliciousBrowse
                                            • 169.106.68.226
                                            NdBLyH2h5d.exeGet hashmaliciousBrowse
                                            • 169.1.24.244
                                            YPJ9DZYIpOGet hashmaliciousBrowse
                                            • 169.107.27.65
                                            PO#41000055885.exeGet hashmaliciousBrowse
                                            • 154.0.167.80
                                            2ojdmC51As.exeGet hashmaliciousBrowse
                                            • 102.182.93.220

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            No created / dropped files found

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.556948031769578
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.15%
                                            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:boI88C399w.exe
                                            File size:581632
                                            MD5:0a82064af051bad014b77038d60474b6
                                            SHA1:f7bf190091d5fe307cfaeed630eeb341c935bda0
                                            SHA256:8f165a26d7e9ad72cb0d51cf01076cc4b0099a244cd4e702645d36dc788dd0cc
                                            SHA512:8d8c3d9479826597c7cebd1f0c6ff5556af757774af4e606e9958eefd38b93aeacc3142b0eb938430abacdc9c80c84f7fe68bc573cd57faee7612d0b71579302
                                            SSDEEP:12288:ggyDT8PLvvaKrtURPnMXSVL6ZRwO+4DQDf2TPexaaiWgyDTj1cib:gJDT8PjiKZcPM86rw0WJDTj1cY
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........t..............z.......................Rich............PE..L...B-._..................... .......!............@................

                                            File Icon

                                            Icon Hash:60e0e4b4b4cce062

                                            Static PE Info

                                            General

                                            Entrypoint:0x4021e4
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                            DLL Characteristics:
                                            Time Stamp:0x5F992D42 [Wed Oct 28 08:35:14 2020 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:ee32a7d07aff9fd88159f3d8028f0500

                                            Entrypoint Preview

                                            Instruction
                                            push 004022F0h
                                            call 00007F9790D25535h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            xor byte ptr [eax], al
                                            add byte ptr [eax], al
                                            inc eax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add dl, al
                                            clc
                                            imul ebp, dword ptr [edx-50h], 52h
                                            add al, 47h
                                            scasb
                                            lahf
                                            and byte ptr [edx], ah
                                            mov ah, F9h
                                            xchg byte ptr [edx+00h], bh
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ecx], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ebx+45h], dl
                                            dec ebx
                                            push eax
                                            popad
                                            imul ebp, dword ptr [esi+74h], 00000032h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add dword ptr [eax], eax
                                            add al, byte ptr [eax]
                                            rol byte ptr [ecx+00000040h], 00000000h
                                            add bh, bh

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6b1740x28.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x20b58.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x23c.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x6ab000x6b000False0.600259656104data6.95649403306IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .data0x6c0000x33d00x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                            .rsrc0x700000x20b580x21000False0.463526870265data5.11995480299IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0x709680x2e8data
                                            RT_ICON0x70c500x128GLS_BINARY_LSB_FIRST
                                            RT_ICON0x70d780xea8data
                                            RT_ICON0x71c200x8a8data
                                            RT_ICON0x724c80x6c8data
                                            RT_ICON0x72b900x568GLS_BINARY_LSB_FIRST
                                            RT_ICON0x730f80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294903776
                                            RT_ICON0x773200x25a8data
                                            RT_ICON0x798c80x10a8data
                                            RT_ICON0x7a9700x988data
                                            RT_ICON0x7b2f80x468GLS_BINARY_LSB_FIRST
                                            RT_STRING0x7b7600x34data
                                            RT_STRING0x7b7940x84data
                                            RT_STRING0x7b8180x140data
                                            RT_STRING0x7b9580x158data
                                            RT_STRING0x7bab00x220data
                                            RT_STRING0x7bcd00x3ccdata
                                            RT_STRING0x7c09c0x5cdata
                                            RT_STRING0x7c0f80x3cdata
                                            RT_STRING0x7c1340x130data
                                            RT_STRING0x7c2640x1f4data
                                            RT_STRING0x7c4580x68data
                                            RT_STRING0x7c4c00x40data
                                            RT_STRING0x7c5000x150data
                                            RT_STRING0x7c6500x100data
                                            RT_STRING0x7c7500x64data
                                            RT_STRING0x7c7b40x70data
                                            RT_STRING0x7c8240x34data
                                            RT_STRING0x7c8580x60data
                                            RT_STRING0x7c8b80xacdata
                                            RT_STRING0x7c9640x64data
                                            RT_STRING0x7c9c80x168data
                                            RT_STRING0x7cb300x10cdata
                                            RT_STRING0x7cc3c0x7cdata
                                            RT_STRING0x7ccb80x48data
                                            RT_STRING0x7cd000xd8data
                                            RT_STRING0x7cdd80xfcdata
                                            RT_STRING0x7ced40x188data
                                            RT_STRING0x7d05c0x138data
                                            RT_STRING0x7d1940xd0data
                                            RT_STRING0x7d2640xdcdata
                                            RT_STRING0x7d3400x7cdata
                                            RT_STRING0x7d3bc0xfcdata
                                            RT_STRING0x7d4b80x5cHitachi SH big-endian COFF object file, not stripped, 28160 sections, symbol offset=0x6c006c00, 419450368 symbols, optional header size 29696
                                            RT_GROUP_ICON0x7d5140xa0data
                                            RT_VERSION0x7d5b40x358dataEnglishUnited States
                                            RT_HTML0x7d90c0x1324adataEnglishUnited States

                                            Imports

                                            DLLImport
                                            MSVBVM60.DLL__vbaVarTstGt, __vbaVarSub, __vbaStrI2, __vbaI2Sgn, _CIcos, _adj_fptan, __vbaStrI4, __vbaVarMove, __vbaVarVargNofree, __vbaAryMove, __vbaFreeVar, __vbaLenBstr, __vbaLateIdCall, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaVargVarCopy, _adj_fdiv_m32, __vbaAryDestruct, __vbaLateMemSt, __vbaVarPow, __vbaVarForInit, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaBoolVar, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVarCmpGt, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGet3, __vbaStrCmp, __vbaGet4, __vbaAryConstruct2, __vbaVarTstEq, __vbaR4Str, __vbaDateR8, __vbaPrintObj, DllFunctionCall, __vbaCastObjVar, __vbaRedimPreserve, __vbaLbound, __vbaStrR4, _adj_fpatan, __vbaR4Var, __vbaLateIdCallLd, __vbaStrR8, __vbaRedim, EVENT_SINK_Release, _CIsqrt, __vbaVarAnd, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaI2Str, __vbaFPException, __vbaInStrVar, __vbaStrVarVal, __vbaUbound, __vbaGetOwner4, __vbaVarCat, __vbaI2Var, _CIlog, __vbaFileOpen, __vbaVar2Vec, __vbaR8Str, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, __vbaVarCmpLt, _adj_fdivr_m32, __vbaR8Var, __vbaPowerR8, _adj_fdiv_r, __vbaI4Var, __vbaVarCmpEq, __vbaAryLock, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaFpI2, __vbaVarTstGe, __vbaFpI4, __vbaVarCopy, __vbaLateMemCallLd, __vbaR8IntI2, _CIatan, __vbaStrMove, __vbaR8IntI4, _allmul, __vbaLateIdSt, _CItan, __vbaAryUnlock, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

                                            Version Infos

                                            DescriptionData
                                            Translation0x0409 0x04b0
                                            LegalCopyrightStephan Kirchmaier
                                            InternalNameSEKPaint2
                                            FileVersion1.00
                                            CompanyNameKIRCHMAIER PRODUCTIONS
                                            CommentsVote for it on www.planet-source-code.com and visit my german website: www.vb-empire.de.vu
                                            ProductNameSEK Paint 2.0
                                            ProductVersion1.00
                                            OriginalFilenameSEKPaint2.exe

                                            Possible Origin

                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States

                                            Network Behavior

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 19, 2021 12:43:12.187458038 CEST4972480192.168.2.388.153.35.32
                                            Jun 19, 2021 12:43:15.183490992 CEST4972480192.168.2.388.153.35.32
                                            Jun 19, 2021 12:43:21.309030056 CEST4972480192.168.2.388.153.35.32
                                            Jun 19, 2021 12:43:37.172888041 CEST497288080192.168.2.3107.170.146.252
                                            Jun 19, 2021 12:43:40.315617085 CEST497288080192.168.2.3107.170.146.252
                                            Jun 19, 2021 12:43:46.316142082 CEST497288080192.168.2.3107.170.146.252
                                            Jun 19, 2021 12:44:00.657489061 CEST497457080192.168.2.3173.212.214.235
                                            Jun 19, 2021 12:44:00.710566044 CEST708049745173.212.214.235192.168.2.3
                                            Jun 19, 2021 12:44:01.348681927 CEST497457080192.168.2.3173.212.214.235
                                            Jun 19, 2021 12:44:01.401716948 CEST708049745173.212.214.235192.168.2.3
                                            Jun 19, 2021 12:44:01.919471979 CEST497457080192.168.2.3173.212.214.235
                                            Jun 19, 2021 12:44:01.972641945 CEST708049745173.212.214.235192.168.2.3
                                            Jun 19, 2021 12:44:06.060700893 CEST497468080192.168.2.3167.114.153.111
                                            Jun 19, 2021 12:44:06.191636086 CEST808049746167.114.153.111192.168.2.3
                                            Jun 19, 2021 12:44:06.692892075 CEST497468080192.168.2.3167.114.153.111
                                            Jun 19, 2021 12:44:06.823786974 CEST808049746167.114.153.111192.168.2.3
                                            Jun 19, 2021 12:44:07.333619118 CEST497468080192.168.2.3167.114.153.111
                                            Jun 19, 2021 12:44:07.464760065 CEST808049746167.114.153.111192.168.2.3
                                            Jun 19, 2021 12:44:10.937809944 CEST49747443192.168.2.3202.141.243.254
                                            Jun 19, 2021 12:44:13.943768024 CEST49747443192.168.2.3202.141.243.254
                                            Jun 19, 2021 12:44:19.959700108 CEST49747443192.168.2.3202.141.243.254
                                            Jun 19, 2021 12:44:35.882770061 CEST4975080192.168.2.375.143.247.51
                                            Jun 19, 2021 12:44:38.883236885 CEST4975080192.168.2.375.143.247.51
                                            Jun 19, 2021 12:44:44.883690119 CEST4975080192.168.2.375.143.247.51
                                            Jun 19, 2021 12:44:59.881380081 CEST4975180192.168.2.385.105.111.166
                                            Jun 19, 2021 12:45:02.885310888 CEST4975180192.168.2.385.105.111.166
                                            Jun 19, 2021 12:45:08.901180983 CEST4975180192.168.2.385.105.111.166
                                            Jun 19, 2021 12:45:23.819174051 CEST4975280192.168.2.3216.139.123.119
                                            Jun 19, 2021 12:45:26.822299957 CEST4975280192.168.2.3216.139.123.119
                                            Jun 19, 2021 12:45:32.836982012 CEST4975280192.168.2.3216.139.123.119

                                            Code Manipulations

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:12:42:42
                                            Start date:19/06/2021
                                            Path:C:\Users\user\Desktop\boI88C399w.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\boI88C399w.exe'
                                            Imagebase:0x400000
                                            File size:581632 bytes
                                            MD5 hash:0A82064AF051BAD014B77038D60474B6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:Visual Basic
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.225706038.0000000002471000.00000020.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.225568967.0000000000738000.00000004.00000020.sdmp, Author: Joe Security
                                            Reputation:low

                                            General

                                            Start time:12:42:42
                                            Start date:19/06/2021
                                            Path:C:\Windows\splwow64.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\splwow64.exe 12288
                                            Imagebase:0x7ff690ba0000
                                            File size:130560 bytes
                                            MD5 hash:8D59B31FF375059E3C32B17BF31A76D5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:12:42:50
                                            Start date:19/06/2021
                                            Path:C:\Windows\SysWOW64\wincorlib\fc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\wincorlib\fc.exe
                                            Imagebase:0x400000
                                            File size:581632 bytes
                                            MD5 hash:0A82064AF051BAD014B77038D60474B6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:Visual Basic
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.577302353.0000000002B71000.00000020.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.573236388.00000000004F9000.00000004.00000020.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000003.266432635.00000000005AC000.00000004.00000001.sdmp, Author: Joe Security
                                            Reputation:low

                                            Disassembly

                                            Code Analysis

                                            Reset < >