Loading ...

Play interactive tourEdit tour

Windows Analysis Report 41609787.exe

Overview

General Information

Sample Name:41609787.exe
Analysis ID:452431
MD5:242fb5498503fdae24861ca26f762745
SHA1:e45e4180137ea7c9d81f127fac0af48cf3b4e8d7
SHA256:7984d85806d611e8d7e3ec5640186ebce9b1daccbd07a4bbda0fc6e0e5666299
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
GuLoader behavior detected
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Installs a global keyboard hook
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

Process Tree

  • System is w10x64
  • 41609787.exe (PID: 4548 cmdline: 'C:\Users\user\Desktop\41609787.exe' MD5: 242FB5498503FDAE24861CA26F762745)
    • ieinstal.exe (PID: 2120 cmdline: 'C:\Users\user\Desktop\41609787.exe' MD5: DAD17AB737E680C47C8A44CBB95EE67E)
      • cmd.exe (PID: 4608 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 5156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • reg.exe (PID: 5776 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CEE2A7E57DF2A159A065A34913A055C2)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://smokeadmsend.online/loade"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://smokeadmsend.online/loade"}
      Multi AV Scanner detection for domain / URLShow sources
      Source: databasepropersonombrecomercialideasearchwords.servicesVirustotal: Detection: 11%Perma Link
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY
      Source: 41609787.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: unknownHTTPS traffic detected: 198.54.115.48:443 -> 192.168.2.3:49752 version: TLS 1.2

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://smokeadmsend.online/loade
      Source: global trafficTCP traffic: 192.168.2.3:49753 -> 186.169.69.166:2508
      Source: Joe Sandbox ViewASN Name: COLOMBIATELECOMUNICACIONESSAESPCO COLOMBIATELECOMUNICACIONESSAESPCO
      Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS traffic detected: queries for: smokeadmsend.online
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpString found in binary or memory: https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.bin
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpString found in binary or memory: https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownHTTPS traffic detected: 198.54.115.48:443 -> 192.168.2.3:49752 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Installs a global keyboard hookShow sources
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\internet explorer\ieinstal.exe

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\41609787.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 NtSetInformationThread,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C1 NtWriteVirtualMemory,TerminateProcess,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02110176 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E15 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108607 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210825E NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108677 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A95 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210829B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA3 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108703 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107305 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108324 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107381 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB3 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021083B7 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC0 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107801 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210843F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210802F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107879 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021084D1 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021080C7 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107903 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D32 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210813C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107529 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107191 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081A7 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A9 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081FF NtWriteVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_03011587 LdrInitializeThunk,Sleep,LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030116CC NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301156F LdrInitializeThunk,Sleep,LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_03011687 NtProtectVirtualMemory,NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301174E NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030116D3 NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030117D3 NtProtectVirtualMemory,
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030115E3 LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_004014F0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EB03
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02109130
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E15
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106A1F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101E3A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101629
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210362A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210222A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101A2F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104651
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102259
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210825E
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100E47
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A95
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210169A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210829B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101AB7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104AAD
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100EDB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021022DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101EC4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021046FB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101715
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108703
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107305
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104730
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101B37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101F3F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108324
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210032F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102359
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100F79
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101F93
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210179F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107381
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101387
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021083B7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101BBD
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02109BD1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106BC7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101FF6
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021023EA
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100FEF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101819
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107801
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104802
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D404
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106C0F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101C37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106C37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210843F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EC2A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210802F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103053
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102043
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106472
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107879
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210107F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210146D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101890
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104880
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021024A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021064AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021084D1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021080C7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021060CB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106CE1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104914
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101918
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210451B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101503
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107903
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D32
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101934
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210813C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107529
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210B962
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101591
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107191
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210699F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106D85
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101DB7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D5B8
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210F9A3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021055AB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021019AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021069D9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021021DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210B1C3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100DF1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081FF
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301136D
      Source: 41609787.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 41609787.exe, 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameImpennate7.exe vs 41609787.exe
      Source: 41609787.exeBinary or memory string: OriginalFilenameImpennate7.exe vs 41609787.exe
      Source: 41609787.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/2@3/2
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Roaming\Runtime2021Jump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeMutant created: \Sessions\1\BaseNamedObjects\RemcosLEG-0OFGX3
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5156:120:WilError_01
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Local\Temp\posekiggerneJump to behavior
      Source: 41609787.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\41609787.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\41609787.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\41609787.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061774 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064205 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062A05 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061205 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A03 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066214 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064A13 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063213 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061A13 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060218 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063A24 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062224 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060A24 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066A24 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065225 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064233 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062A33 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061233 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A33 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064A44 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063244 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061A44 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066244 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060248 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063A54 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062254 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066A54 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065253 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060A58 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A64 push edx; ret
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064263 push edx; ret
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SPINTOSJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SPINTOSJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C1 NtWriteVirtualMemory,TerminateProcess,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E15 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210222A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104651
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102259 TerminateProcess,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A95 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA3 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021022DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107305 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210032F LdrInitializeThunk,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102359
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107381 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB3 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC0 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021023EA
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107801 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107879 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021024A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210451B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107903 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D32 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107529 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107191 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A9 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021021DF TerminateProcess,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF5 NtWriteVirtualMemory,
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210047C second address: 000000000210047C instructions:
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\41609787.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\41609787.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32MSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=PROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmp, ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32MSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=\OPTRNER.EXE\POSEKIGGERNESOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNSPINTOSHTTPS://SMOKEADMSEND.ONLINE/LOADER/1ARMADANAC1COPIA_YCUSOPUSF143.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210047C second address: 000000000210047C instructions:
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210DA09 second address: 000000000210DA09 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add esi, 02h 0x00000006 mov word ptr [ebp+00000176h], ax 0x0000000d mov ax, word ptr [esi] 0x00000010 cmp ax, 0000h 0x00000014 mov ax, word ptr [ebp+00000176h] 0x0000001b jne 00007F5CC09CC9EFh 0x0000001d mov ebx, edx 0x0000001f shl edx, 05h 0x00000022 add edx, ebx 0x00000024 movzx ebx, byte ptr [esi] 0x00000027 add edx, ebx 0x00000029 xor edx, 19974490h 0x0000002f jmp 00007F5CC09CCA9Eh 0x00000031 pushad 0x00000032 mov edx, 0000000Dh 0x00000037 rdtsc
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 rdtsc
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindow / User API: threadDelayed 1353
      Source: C:\Users\user\Desktop\41609787.exeAPI coverage: 9.9 %
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 1936Thread sleep count: 1353 > 30
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeLast function: Thread delayed
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread sleep count: Count: 1353 delay: -5
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32Msi.dllPublishershell32advapi32TEMP=\optrner.exe\posekiggerneSoftware\Microsoft\Windows\CurrentVersion\RunSPINTOShttps://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32Msi.dllPublishershell32advapi32TEMP=ProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dll
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmp, ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\41609787.exeThread information set: HideFromDebugger
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebugger
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\41609787.exeProcess queried: DebugPort
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 rdtsc
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210A907 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EB03 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210CE1B mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210943A mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D822 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021055AB mov eax, dword ptr fs:[00000030h]

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\41609787.exeMemory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 3000000
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: xlogs201.dat.27.drBinary or memory string: [ Program Manager ]
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection112Masquerading1Input Capture11Security Software Discovery621Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Modify Registry1LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion23Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery311VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      databasepropersonombrecomercialideasearchwords.services11%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.bin0%Avira URL Cloudsafe
      https://smokeadmsend.online/loade0%Avira URL Cloudsafe
      https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.00%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      smokeadmsend.online
      198.54.115.48
      truetrue
        unknown
        databasepropersonombrecomercialideasearchwords.services
        186.169.69.166
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        https://smokeadmsend.online/loadetrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        186.169.69.166
        databasepropersonombrecomercialideasearchwords.servicesColombia
        3816COLOMBIATELECOMUNICACIONESSAESPCOtrue
        198.54.115.48
        smokeadmsend.onlineUnited States
        22612NAMECHEAP-NETUStrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:452431
        Start date:22.07.2021
        Start time:10:40:48
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 9m 1s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:41609787.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:32
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@8/2@3/2
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 1.6% (good quality ratio 0.1%)
        • Quality average: 4.8%
        • Quality standard deviation: 11.9%
        HCA Information:
        • Successful, ratio: 68%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
        • TCP Packets have been reduced to 100
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 23.211.6.115, 104.43.193.48, 20.82.210.154, 23.211.4.86, 173.222.108.226, 173.222.108.210, 51.103.5.186, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.82.209.183, 20.54.110.249
        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, client.wns.windows.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        10:45:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SPINTOS C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe
        10:45:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SPINTOS C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        198.54.115.4875PO9981.exeGet hashmaliciousBrowse
        • www.ownfiles.info/fl/
        21PO7513.exeGet hashmaliciousBrowse
        • www.ownfiles.info/fl/

        Domains

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        databasepropersonombrecomercialideasearchwords.services75030908.exeGet hashmaliciousBrowse
        • 186.169.42.8
        76947851729_.exeGet hashmaliciousBrowse
        • 181.235.3.85
        166691_pdf.exeGet hashmaliciousBrowse
        • 181.235.4.212
        Factura Serfinanza051053709735077235764653194.exeGet hashmaliciousBrowse
        • 186.169.43.144
        056373_pdf.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza023854786775241209783648129.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza085399218111227761873550570.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza038612482397383420891150743.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza106109596363318359608727771.exeGet hashmaliciousBrowse
        • 186.169.72.174
        Factura Serfinanza050288227788749652817960744.exeGet hashmaliciousBrowse
        • 186.169.72.174
        Factura Serfinanza049997609832517851274630184.exeGet hashmaliciousBrowse
        • 186.169.72.174
        EXTRACTOSERFINANZA718365418101786154346661555.exeGet hashmaliciousBrowse
        • 190.255.84.57
        EXTRACTOSERFINANZA989543704031499704092798964.exeGet hashmaliciousBrowse
        • 190.255.84.57
        32657046_pdf.exeGet hashmaliciousBrowse
        • 190.255.84.57
        6565426875_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        4831902122_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        8992538102_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        9604_pdf.exeGet hashmaliciousBrowse
        • 186.169.38.241
        Factura Serfinanza089768553548090985869814228.exeGet hashmaliciousBrowse
        • 186.169.38.241
        EXTRACTOSERFINANZA894978636268808051252452885.exeGet hashmaliciousBrowse
        • 186.169.38.241

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        COLOMBIATELECOMUNICACIONESSAESPCOU1R7Ed7940Get hashmaliciousBrowse
        • 186.113.206.66
        oEF7GAiRIgGet hashmaliciousBrowse
        • 186.113.131.237
        BTNNG17tlhGet hashmaliciousBrowse
        • 190.255.99.57
        MD5OxTSc6iGet hashmaliciousBrowse
        • 190.252.136.167
        SUpODCSauSGet hashmaliciousBrowse
        • 191.109.106.145
        TFG18FA4eDGet hashmaliciousBrowse
        • 152.205.93.205
        eAtDhymLzpGet hashmaliciousBrowse
        • 181.235.115.105
        ehn0f1d63MGet hashmaliciousBrowse
        • 186.116.212.222
        zWumjXhWWzGet hashmaliciousBrowse
        • 190.254.50.129
        e4qhQIKEimGet hashmaliciousBrowse
        • 179.48.76.227
        YazlX01sZDGet hashmaliciousBrowse
        • 186.116.154.100
        7Pvt6Jni6pGet hashmaliciousBrowse
        • 167.65.244.226
        a1sMR3Vj8oGet hashmaliciousBrowse
        • 167.2.131.28
        471u0A1FPwGet hashmaliciousBrowse
        • 190.255.75.41
        395d6gwkWKGet hashmaliciousBrowse
        • 152.205.93.229
        YXYFqHRx2mGet hashmaliciousBrowse
        • 167.13.146.158
        XfKsLIPLUuGet hashmaliciousBrowse
        • 190.67.85.74
        Z7bNxhhS7yGet hashmaliciousBrowse
        • 190.67.85.63
        lq2609LxT8Get hashmaliciousBrowse
        • 190.254.187.199
        khGshuibcrGet hashmaliciousBrowse
        • 186.116.212.225
        NAMECHEAP-NETUSORDER . 4500028602 .docGet hashmaliciousBrowse
        • 198.54.122.60
        Payment_invoice.exeGet hashmaliciousBrowse
        • 198.54.117.212
        SUpODCSauSGet hashmaliciousBrowse
        • 198.54.114.130
        0ZZqw52a6S.exeGet hashmaliciousBrowse
        • 199.193.7.228
        nZdwtTEYoW.exeGet hashmaliciousBrowse
        • 198.54.122.60
        CORRECT BANK DETAILS FORM.docGet hashmaliciousBrowse
        • 198.54.122.60
        Shipping Documents .docGet hashmaliciousBrowse
        • 198.54.122.60
        QxnlprRUTx.exeGet hashmaliciousBrowse
        • 199.188.200.230
        0Lh7eA2VUZ.exeGet hashmaliciousBrowse
        • 198.54.122.60
        REQUEST FOR QUOTATIO 158930165.docGet hashmaliciousBrowse
        • 198.54.122.60
        Statement.xlsxGet hashmaliciousBrowse
        • 162.0.237.9
        Inv PKF312021.docGet hashmaliciousBrowse
        • 198.54.122.60
        RFQ- ROTO Fittings- 19072021.docGet hashmaliciousBrowse
        • 198.54.122.60
        INVOICE.exeGet hashmaliciousBrowse
        • 198.54.117.211
        Order.exeGet hashmaliciousBrowse
        • 198.54.117.215
        SOA.exeGet hashmaliciousBrowse
        • 198.54.122.60
        Inv_7623980.exeGet hashmaliciousBrowse
        • 63.250.34.223
        xBMx9OBP97.exeGet hashmaliciousBrowse
        • 198.54.114.131
        CSyG3zNcwS.exeGet hashmaliciousBrowse
        • 198.54.114.131
        BrCi5pJr8J.exeGet hashmaliciousBrowse
        • 198.54.114.131

        JA3 Fingerprints

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        37f463bf4616ecd445d4a1937da06e19B5xK9XEvzO.exeGet hashmaliciousBrowse
        • 198.54.115.48
        RsEvjI1iTt.exeGet hashmaliciousBrowse
        • 198.54.115.48
        ORD.pptGet hashmaliciousBrowse
        • 198.54.115.48
        39pfFwU3Ns.exeGet hashmaliciousBrowse
        • 198.54.115.48
        47a8af.exe.exeGet hashmaliciousBrowse
        • 198.54.115.48
        Comprobante1.vbsGet hashmaliciousBrowse
        • 198.54.115.48
        ZlvFNj.dllGet hashmaliciousBrowse
        • 198.54.115.48
        QT2kxM315B.exeGet hashmaliciousBrowse
        • 198.54.115.48
        4QKHQR82Xt.exeGet hashmaliciousBrowse
        • 198.54.115.48
        Convert HEX uit phishing mail.htmGet hashmaliciousBrowse
        • 198.54.115.48
        #U2706_#U260e_Play _to _Listen.htmGet hashmaliciousBrowse
        • 198.54.115.48
        192-3216-Us.gt.com.htmlGet hashmaliciousBrowse
        • 198.54.115.48
        N41101255652.vbsGet hashmaliciousBrowse
        • 198.54.115.48
        FILE_2932NH_9923.exeGet hashmaliciousBrowse
        • 198.54.115.48
        RDlkHCLRxE.exeGet hashmaliciousBrowse
        • 198.54.115.48
        #U2706_#U260e_Play _to _Listen.htmGet hashmaliciousBrowse
        • 198.54.115.48
        Swift_Fattura_0093320128_.exeGet hashmaliciousBrowse
        • 198.54.115.48
        SecuriteInfo.com.Variant.Graftor.981190.24096.exeGet hashmaliciousBrowse
        • 198.54.115.48
        IPVrDRKfYj.exeGet hashmaliciousBrowse
        • 198.54.115.48
        11.docxGet hashmaliciousBrowse
        • 198.54.115.48

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe
        Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        File Type:data
        Category:dropped
        Size (bytes):192513
        Entropy (8bit):5.613557039365368
        Encrypted:false
        SSDEEP:3072:2+ogFpSWSqqbZ0ZEuwGE5pwFGHiG1InFGHiPZEuwGE5pi:2+7AtqqbZFfGE5pakipkiufGE5pi
        MD5:873CC0BFAAB852FD58C0EB4B8D29026D
        SHA1:07C871EC1385B80D314A9EA0B047CC85D24CEE24
        SHA-256:9E6B7578CAE3E4CC0354AD9912EA36F7E3D0968DE07D30C4F3C60C1183D919C6
        SHA-512:A7609B36561ACD7AACAD21ABF085489C86A72103FCE5F32501B2B660644C6DF1AC5A4A201E39DF67F21D6F3E5C519EC3C51A633E99D8FED07D425497E84997F3
        Malicious:false
        Reputation:low
        Preview: .Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+O.E..E..E.X.K..E...L..E..H..E.Rich.E.................PE..L.....1M.................@...................P....@.................................c........................................E..(....p......................................................................0... .......D............................text....;.......@.................. ..`.data...$....P.......P..............@....rsrc........p.......`..............@..@..^............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Roaming\Runtime2021\xlogs201.dat
        Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        File Type:data
        Category:dropped
        Size (bytes):182
        Entropy (8bit):3.366956781623735
        Encrypted:false
        SSDEEP:3:rklKlVnGlNWKUel5JWRal2Jl+7R0DAlBG4J+Rf3GLilXIknNQblovDl9il:IlK/yN+65YcIeeDAlgRf2e56bW/G
        MD5:CBD9A222C0C0CB1C08C8DC24D7C02F86
        SHA1:40FCA05C695340804995E29FDD5D11A488D8CAEA
        SHA-256:A59E7F82238F3158F2F86EFEFA0A8FB20ACEA309AD84DD61683639197D01A01C
        SHA-512:485877FC044D8046B408C5157BCB29FB3DC06B7DB10695F5886474398217B54EE8A2607527B292D3B179E37904C31FB186FB140ECBA375D7AAE360E6DBDFF44C
        Malicious:false
        Reputation:low
        Preview: ....[.2.0.2.1./.0.7./.2.2. .1.0.:.4.5.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[. .R.u.n. .].....[.W.i.n.].r.....[. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r. .].....

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.613575589393616
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.15%
        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:41609787.exe
        File size:192512
        MD5:242fb5498503fdae24861ca26f762745
        SHA1:e45e4180137ea7c9d81f127fac0af48cf3b4e8d7
        SHA256:7984d85806d611e8d7e3ec5640186ebce9b1daccbd07a4bbda0fc6e0e5666299
        SHA512:5717a9d38ff151384fe522b5b55f7a4882bcb897d65d1c9fbd0b155f05138cc698db39805d34150daf5260906d8e09d6d752190e7d681eb181eb3569378a48fd
        SSDEEP:3072:F+ogFpSWSqqbZ0ZEuwGE5pwFGHiG1InFGHiPZEuwGE5p:F+7AtqqbZFfGE5pakipkiufGE5p
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+O..E...E...E.X.K...E...L...E...H...E.Rich..E.................PE..L.....1M.................@...................P....@........

        File Icon

        Icon Hash:734c5974650d010d

        Static PE Info

        General

        Entrypoint:0x4014f0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4D31AB09 [Sat Jan 15 14:11:21 2011 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:a70b1f0c9f8eea03c5b5d32861bccaa9

        Entrypoint Preview

        Instruction
        push 00401F04h
        call 00007F5CC0966285h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        xor byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [edx+43347C7Eh], bh
        dec ebx
        inc edi
        dec ebp
        mov cl, E1h
        mov ss, word ptr [906A07DAh]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        jo 00007F5CC09662F3h
        jo 00007F5CC09662FBh
        jc 00007F5CC0966305h
        je 00007F5CC0966304h
        jc 00007F5CC09662F7h
        insb
        jnc 00007F5CC09662F7h
        jc 00007F5CC0966305h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add bh, bh
        int3
        xor dword ptr [eax], eax
        sbb byte ptr [edx], bl
        xor eax, B1E56B83h
        das
        inc ebx
        mov es, bp
        test al, 9Eh
        push ss
        add al, B3h
        call far 2631h : D68942F0h
        inc edx
        dec esp
        mov eax, 79EDC0D1h
        push eax
        xor dl, byte ptr [ecx+33AD4F3Ah]
        cdq
        iretw
        adc dword ptr [edi+00AA000Ch], esi
        pushad
        rcl dword ptr [ebx+00000000h], cl
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        or byte ptr [eax+eax], al
        add byte ptr [ebx+00h], cl
        add byte ptr [eax], al
        add byte ptr [edi], al
        add byte ptr [ecx+62h], dh
        insb
        imul esi, dword ptr [ecx+00h], 000B010Dh
        jnbe 00007F5CC09662FAh
        jc 00007F5CC09662F8h
        je 00007F5CC0966301h

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x245a40x28.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000x8ac0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x144.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x23b040x24000False0.399773491753data5.92220108342IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x250000x1a240x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x270000x8ac00x9000False0.329942491319data4.39398480347IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x2f2180x8a8data
        RT_ICON0x2aff00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
        RT_ICON0x28a480x25a8data
        RT_ICON0x279a00x10a8data
        RT_ICON0x275380x468GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x274ec0x4cdata
        RT_VERSION0x271b00x33cdataKazakhKazakhstan

        Imports

        DLLImport
        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

        Version Infos

        DescriptionData
        Translation0x043f 0x04b0
        LegalCopyright@P.I.C Program
        InternalNameImpennate7
        FileVersion7.00
        CompanyName@Broadcom@
        LegalTrademarks@P.I.C Program
        Comments@P.I.C Program
        ProductName@P.I.C Program
        ProductVersion7.00
        FileDescription@P.I.C Program
        OriginalFilenameImpennate7.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        KazakhKazakhstan

        Network Behavior

        Snort IDS Alerts

        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        07/22/21-10:45:13.302249ICMP399ICMP Destination Unreachable Host Unreachable186.169.69.166192.168.2.3
        07/22/21-10:45:44.235836ICMP399ICMP Destination Unreachable Host Unreachable186.169.69.166192.168.2.3

        Network Port Distribution

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jul 22, 2021 10:45:09.966116905 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.156882048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.157150030 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.185319901 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.376385927 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376420021 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376436949 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376451969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376671076 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.378618956 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.378905058 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.509068012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.699985981 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.700149059 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.717775106 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.914993048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915028095 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915045023 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915060043 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915080070 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915102959 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915141106 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915144920 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915163040 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915163040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915183067 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915195942 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915205002 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915226936 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915251017 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105845928 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105910063 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105947018 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105963945 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105966091 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105999947 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106010914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106046915 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106066942 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106101990 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106205940 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106257915 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106267929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106309891 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106308937 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106343985 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106368065 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106403112 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106408119 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106445074 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106450081 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106482983 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106484890 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106533051 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106539011 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106575012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297169924 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297302008 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297312021 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297343016 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297368050 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297369957 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297404051 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297425985 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297425985 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297449112 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297472954 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297481060 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297499895 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297518015 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297524929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297548056 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297555923 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297573090 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297596931 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297597885 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297621012 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297621012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297646999 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297662973 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297671080 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297698975 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297703028 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297724962 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297734022 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297749996 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297759056 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297774076 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297795057 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297796965 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297821045 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297833920 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297846079 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297868967 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297869921 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297897100 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297902107 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297923088 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297944069 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297972918 CEST49752443192.168.2.3198.54.115.48

        UDP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jul 22, 2021 10:41:28.855549097 CEST5754453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:28.913228035 CEST53575448.8.8.8192.168.2.3
        Jul 22, 2021 10:41:29.627794027 CEST5598453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:29.681444883 CEST53559848.8.8.8192.168.2.3
        Jul 22, 2021 10:41:30.439649105 CEST6418553192.168.2.38.8.8.8
        Jul 22, 2021 10:41:30.491682053 CEST53641858.8.8.8192.168.2.3
        Jul 22, 2021 10:41:30.696984053 CEST6511053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:30.756556034 CEST53651108.8.8.8192.168.2.3
        Jul 22, 2021 10:41:32.226253033 CEST5836153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:32.286098003 CEST53583618.8.8.8192.168.2.3
        Jul 22, 2021 10:41:33.432280064 CEST6349253192.168.2.38.8.8.8
        Jul 22, 2021 10:41:33.485963106 CEST53634928.8.8.8192.168.2.3
        Jul 22, 2021 10:41:34.687273979 CEST6083153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:34.738322973 CEST53608318.8.8.8192.168.2.3
        Jul 22, 2021 10:41:35.702337027 CEST6010053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:35.753923893 CEST53601008.8.8.8192.168.2.3
        Jul 22, 2021 10:41:36.631591082 CEST5319553192.168.2.38.8.8.8
        Jul 22, 2021 10:41:36.680809975 CEST53531958.8.8.8192.168.2.3
        Jul 22, 2021 10:41:39.727713108 CEST5014153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:39.777374029 CEST53501418.8.8.8192.168.2.3
        Jul 22, 2021 10:41:40.709177017 CEST5302353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:40.762366056 CEST53530238.8.8.8192.168.2.3
        Jul 22, 2021 10:41:41.704982042 CEST4956353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:41.757411003 CEST53495638.8.8.8192.168.2.3
        Jul 22, 2021 10:41:42.597750902 CEST5135253192.168.2.38.8.8.8
        Jul 22, 2021 10:41:42.658118963 CEST53513528.8.8.8192.168.2.3
        Jul 22, 2021 10:41:46.766100883 CEST5934953192.168.2.38.8.8.8
        Jul 22, 2021 10:41:46.819855928 CEST53593498.8.8.8192.168.2.3
        Jul 22, 2021 10:41:48.145740032 CEST5708453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:48.198137999 CEST53570848.8.8.8192.168.2.3
        Jul 22, 2021 10:41:49.517611980 CEST5882353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:49.569657087 CEST53588238.8.8.8192.168.2.3
        Jul 22, 2021 10:41:56.434962988 CEST5756853192.168.2.38.8.8.8
        Jul 22, 2021 10:41:56.487602949 CEST53575688.8.8.8192.168.2.3
        Jul 22, 2021 10:41:57.219800949 CEST5054053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:57.270225048 CEST53505408.8.8.8192.168.2.3
        Jul 22, 2021 10:41:59.087013960 CEST5436653192.168.2.38.8.8.8
        Jul 22, 2021 10:41:59.136548042 CEST53543668.8.8.8192.168.2.3
        Jul 22, 2021 10:42:05.132457018 CEST5303453192.168.2.38.8.8.8
        Jul 22, 2021 10:42:05.190510988 CEST53530348.8.8.8192.168.2.3
        Jul 22, 2021 10:42:05.638375044 CEST5776253192.168.2.38.8.8.8
        Jul 22, 2021 10:42:05.697576046 CEST53577628.8.8.8192.168.2.3
        Jul 22, 2021 10:42:22.473356009 CEST5543553192.168.2.38.8.8.8
        Jul 22, 2021 10:42:22.533193111 CEST53554358.8.8.8192.168.2.3
        Jul 22, 2021 10:42:24.855288982 CEST5071353192.168.2.38.8.8.8
        Jul 22, 2021 10:42:24.914053917 CEST53507138.8.8.8192.168.2.3
        Jul 22, 2021 10:42:36.374967098 CEST5613253192.168.2.38.8.8.8
        Jul 22, 2021 10:42:36.452851057 CEST53561328.8.8.8192.168.2.3
        Jul 22, 2021 10:42:37.046250105 CEST5898753192.168.2.38.8.8.8
        Jul 22, 2021 10:42:37.104217052 CEST53589878.8.8.8192.168.2.3
        Jul 22, 2021 10:43:08.455636978 CEST5657953192.168.2.38.8.8.8
        Jul 22, 2021 10:43:08.523492098 CEST53565798.8.8.8192.168.2.3
        Jul 22, 2021 10:43:09.006038904 CEST6063353192.168.2.38.8.8.8
        Jul 22, 2021 10:43:09.074167013 CEST53606338.8.8.8192.168.2.3
        Jul 22, 2021 10:43:25.719934940 CEST6129253192.168.2.38.8.8.8
        Jul 22, 2021 10:43:25.792639017 CEST53612928.8.8.8192.168.2.3
        Jul 22, 2021 10:44:23.550378084 CEST6361953192.168.2.38.8.8.8
        Jul 22, 2021 10:44:23.641876936 CEST53636198.8.8.8192.168.2.3
        Jul 22, 2021 10:44:25.413438082 CEST6493853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:25.543364048 CEST53649388.8.8.8192.168.2.3
        Jul 22, 2021 10:44:26.391135931 CEST6194653192.168.2.38.8.8.8
        Jul 22, 2021 10:44:26.450129032 CEST53619468.8.8.8192.168.2.3
        Jul 22, 2021 10:44:26.938622952 CEST6491053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:26.998559952 CEST53649108.8.8.8192.168.2.3
        Jul 22, 2021 10:44:27.642832994 CEST5212353192.168.2.38.8.8.8
        Jul 22, 2021 10:44:27.702327967 CEST53521238.8.8.8192.168.2.3
        Jul 22, 2021 10:44:28.215982914 CEST5613053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:28.274662018 CEST53561308.8.8.8192.168.2.3
        Jul 22, 2021 10:44:28.861097097 CEST5633853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:28.913039923 CEST53563388.8.8.8192.168.2.3
        Jul 22, 2021 10:44:29.772561073 CEST5942053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:29.832505941 CEST53594208.8.8.8192.168.2.3
        Jul 22, 2021 10:44:30.739958048 CEST5878453192.168.2.38.8.8.8
        Jul 22, 2021 10:44:30.797008991 CEST53587848.8.8.8192.168.2.3
        Jul 22, 2021 10:44:31.252382040 CEST6397853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:31.315813065 CEST53639788.8.8.8192.168.2.3
        Jul 22, 2021 10:45:09.855098009 CEST6293853192.168.2.38.8.8.8
        Jul 22, 2021 10:45:09.919981956 CEST53629388.8.8.8192.168.2.3
        Jul 22, 2021 10:45:12.766573906 CEST5570853192.168.2.38.8.8.8
        Jul 22, 2021 10:45:12.826633930 CEST53557088.8.8.8192.168.2.3
        Jul 22, 2021 10:45:34.928658009 CEST5680353192.168.2.38.8.8.8
        Jul 22, 2021 10:45:34.986488104 CEST53568038.8.8.8192.168.2.3

        ICMP Packets

        TimestampSource IPDest IPChecksumCodeType
        Jul 22, 2021 10:45:13.302248955 CEST186.169.69.166192.168.2.3c020(Host unreachable)Destination Unreachable
        Jul 22, 2021 10:45:44.235836029 CEST186.169.69.166192.168.2.3c020(Host unreachable)Destination Unreachable

        DNS Queries

        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Jul 22, 2021 10:45:09.855098009 CEST192.168.2.38.8.8.80x18f2Standard query (0)smokeadmsend.onlineA (IP address)IN (0x0001)
        Jul 22, 2021 10:45:12.766573906 CEST192.168.2.38.8.8.80xfec1Standard query (0)databasepropersonombrecomercialideasearchwords.servicesA (IP address)IN (0x0001)
        Jul 22, 2021 10:45:34.928658009 CEST192.168.2.38.8.8.80xf13Standard query (0)databasepropersonombrecomercialideasearchwords.servicesA (IP address)IN (0x0001)

        DNS Answers

        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Jul 22, 2021 10:45:09.919981956 CEST8.8.8.8192.168.2.30x18f2No error (0)smokeadmsend.online198.54.115.48A (IP address)IN (0x0001)
        Jul 22, 2021 10:45:12.826633930 CEST8.8.8.8192.168.2.30xfec1No error (0)databasepropersonombrecomercialideasearchwords.services186.169.69.166A (IP address)IN (0x0001)
        Jul 22, 2021 10:45:34.986488104 CEST8.8.8.8192.168.2.30xf13No error (0)databasepropersonombrecomercialideasearchwords.services186.169.69.166A (IP address)IN (0x0001)

        HTTPS Packets

        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
        Jul 22, 2021 10:45:10.378618956 CEST198.54.115.48443192.168.2.349752CN=smokeadmsend.online CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jun 17 02:00:00 CEST 2021 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Sat Jun 18 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
        CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
        CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029

        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:10:41:34
        Start date:22/07/2021
        Path:C:\Users\user\Desktop\41609787.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\41609787.exe'
        Imagebase:0x400000
        File size:192512 bytes
        MD5 hash:242FB5498503FDAE24861CA26F762745
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        General

        Start time:10:44:29
        Start date:22/07/2021
        Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\41609787.exe'
        Imagebase:0xbb0000
        File size:480256 bytes
        MD5 hash:DAD17AB737E680C47C8A44CBB95EE67E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, Author: Joe Security
        Reputation:moderate

        General

        Start time:10:45:11
        Start date:22/07/2021
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        Imagebase:0xbd0000
        File size:232960 bytes
        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:10:45:12
        Start date:22/07/2021
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6b2800000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:10:45:12
        Start date:22/07/2021
        Path:C:\Windows\SysWOW64\reg.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        Imagebase:0x1380000
        File size:59392 bytes
        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Disassembly

        Code Analysis

        Reset < >