Loading ...

Play interactive tourEdit tour

Windows Analysis Report RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe

Overview

General Information

Sample Name:RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
Analysis ID:479213
MD5:06534c059b111776b838f793c6444622
SHA1:7ebda7124a60de107a00960d9fe0563fd3cd2760
SHA256:933a4d2abfdf0f91550a102808d00adace6eb9df89ea9e254e2df7601b02dd8f
Infos:

Most interesting Screenshot:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Detected Remcos RAT
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to inject code into remote processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Contains functionality to download and launch executables
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to simulate mouse events
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • Cshgvzx.exe (PID: 5384 cmdline: 'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe' MD5: 06534C059B111776B838F793C6444622)
    • dialer.exe (PID: 6544 cmdline: C:\Windows\System32\dialer.exe MD5: F176211F7372248224D02AC023573870)
  • Cshgvzx.exe (PID: 5296 cmdline: 'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe' MD5: 06534C059B111776B838F793C6444622)
    • secinit.exe (PID: 6672 cmdline: C:\Windows\System32\secinit.exe MD5: 174A363BB5A2D88B224546C15DD10906)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "204.44.86.179:49151:0123qwegus.duckdns.org:49151:0", "Assigned name": "septttt", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-ZXIQGD", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\Public\Libraries\xzvghsC.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x606bc:$str_a1: C:\Windows\System32\cmd.exe
        • 0x60638:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x60638:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x5fc38:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x60290:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x5f86c:$str_b2: Executing file:
        • 0x60800:$str_b3: GetDirectListeningPort
        • 0x60050:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x603d4:$str_b5: licence_code.txt
        • 0x60278:$str_b7: \update.vbs
        • 0x5f8dc:$str_b9: Downloaded file:
        • 0x5f8a8:$str_b10: Downloading file:
        • 0x5f890:$str_b12: Failed to upload file:
        • 0x607c8:$str_b13: StartForward
        • 0x607e8:$str_b14: StopForward
        • 0x60220:$str_b15: fso.DeleteFile "
        • 0x601b4:$str_b16: On Error Resume Next
        • 0x60250:$str_b17: fso.DeleteFolder "
        • 0x5f880:$str_b18: Uploaded file:
        • 0x5f91c:$str_b19: Unable to delete:
        • 0x601e8:$str_b20: while fso.FileExists("
        00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Click to see the 13 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          8.2.mobsync.exe.10590000.2.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            8.2.mobsync.exe.10590000.2.raw.unpackREMCOS_RAT_variantsunknownunknown
            • 0x60553:$str_a1: C:\Windows\System32\cmd.exe
            • 0x604cf:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x604cf:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x5facf:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x60127:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x5f703:$str_b2: Executing file:
            • 0x60697:$str_b3: GetDirectListeningPort
            • 0x5fee7:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x6026b:$str_b5: licence_code.txt
            • 0x6010f:$str_b7: \update.vbs
            • 0x5f773:$str_b9: Downloaded file:
            • 0x5f73f:$str_b10: Downloading file:
            • 0x5f727:$str_b12: Failed to upload file:
            • 0x6065f:$str_b13: StartForward
            • 0x6067f:$str_b14: StopForward
            • 0x600b7:$str_b15: fso.DeleteFile "
            • 0x6004b:$str_b16: On Error Resume Next
            • 0x600e7:$str_b17: fso.DeleteFolder "
            • 0x5f717:$str_b18: Uploaded file:
            • 0x5f7b3:$str_b19: Unable to delete:
            • 0x6007f:$str_b20: while fso.FileExists("
            18.2.dialer.exe.10590000.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              18.2.dialer.exe.10590000.2.unpackREMCOS_RAT_variantsunknownunknown
              • 0x5f953:$str_a1: C:\Windows\System32\cmd.exe
              • 0x5f8cf:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x5f8cf:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x5eecf:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x5f527:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x5eb03:$str_b2: Executing file:
              • 0x5fa97:$str_b3: GetDirectListeningPort
              • 0x5f2e7:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x5f66b:$str_b5: licence_code.txt
              • 0x5f50f:$str_b7: \update.vbs
              • 0x5eb73:$str_b9: Downloaded file:
              • 0x5eb3f:$str_b10: Downloading file:
              • 0x5eb27:$str_b12: Failed to upload file:
              • 0x5fa5f:$str_b13: StartForward
              • 0x5fa7f:$str_b14: StopForward
              • 0x5f4b7:$str_b15: fso.DeleteFile "
              • 0x5f44b:$str_b16: On Error Resume Next
              • 0x5f4e7:$str_b17: fso.DeleteFolder "
              • 0x5eb17:$str_b18: Uploaded file:
              • 0x5ebb3:$str_b19: Unable to delete:
              • 0x5f47f:$str_b20: while fso.FileExists("
              8.2.mobsync.exe.10590000.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 31 entries

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "204.44.86.179:49151:0123qwegus.duckdns.org:49151:0", "Assigned name": "septttt", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-ZXIQGD", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
                Yara detected Remcos RATShow sources
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356879289.00000000006E8000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mobsync.exe PID: 4692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 6544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: secinit.exe PID: 6672, type: MEMORYSTR
                Source: 8.0.mobsync.exe.10590000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 18.2.dialer.exe.10590000.2.unpackAvira: Label: TR/Dropper.Gen
                Source: 8.0.mobsync.exe.10590000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 8.2.mobsync.exe.10590000.2.unpackAvira: Label: TR/Dropper.Gen
                Source: 18.0.dialer.exe.10590000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 19.0.secinit.exe.10590000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 19.0.secinit.exe.10590000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 19.0.secinit.exe.10590000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 18.0.dialer.exe.10590000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 8.0.mobsync.exe.10590000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 18.0.dialer.exe.10590000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 8.0.mobsync.exe.10590000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 18.0.dialer.exe.10590000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 19.2.secinit.exe.10590000.1.unpackAvira: Label: TR/Dropper.Gen
                Source: 19.0.secinit.exe.10590000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: mobsync.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
                Source: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00406176 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004456A9 FindFirstFileExA,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00406176 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004456A9 FindFirstFileExA,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00407C57 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00406930 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2032776 ET TROJAN Remocs 3.x Unencrypted Checkin 192.168.2.5:49707 -> 204.44.86.179:49151
                Source: TrafficSnort IDS: 2032777 ET TROJAN Remocs 3.x Unencrypted Server Response 204.44.86.179:49151 -> 192.168.2.5:49707
                C2 URLs / IPs found in malware configurationShow sources
                Source: Malware configuration extractorURLs: 204.44.86.179
                Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
                Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 204.44.86.179:49151
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownTCP traffic detected without corresponding DNS query: 204.44.86.179
                Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0041242F Sleep,URLDownloadToFileW,
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004126A5 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004089BC GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004126A5 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,

                E-Banking Fraud:

                barindex
                Yara detected Remcos RATShow sources
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356879289.00000000006E8000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mobsync.exe PID: 4692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 6544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: secinit.exe PID: 6672, type: MEMORYSTR

                System Summary:

                barindex
                Malicious sample detected (through community Yara rule)Show sources
                Source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Initial sample is a PE file and has a suspicious nameShow sources
                Source: initial sampleStatic PE information: Filename: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                Source: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                Source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: C:\Users\Public\Libraries\xzvghsC.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00412598 ExitWindowsEx,LoadLibraryA,GetProcAddress,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00412598 ExitWindowsEx,LoadLibraryA,GetProcAddress,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042E02D
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004330D1
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0043424F
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042220F
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0045F930
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0041A3F8
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004304DB
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0044C56A
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004335CD
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0043E6E0
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0044A725
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004378EC
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004228AD
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0045F930
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004339E5
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004229F0
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0042E02D
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004330D1
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0043424F
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0042220F
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0041A3F8
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004304DB
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0044C56A
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004335CD
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0043E6E0
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0044A725
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004378EC
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004228AD
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004339E5
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004229F0
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00437B1B
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00410BF5
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00437D4A
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeCode function: String function: 0243CEC4 appears 45 times
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeCode function: String function: 0243DEAC appears 88 times
                Source: C:\Windows\SysWOW64\dialer.exeCode function: String function: 0042EDF6 appears 36 times
                Source: C:\Windows\SysWOW64\dialer.exeCode function: String function: 0042F460 appears 43 times
                Source: C:\Windows\SysWOW64\dialer.exeCode function: String function: 00402064 appears 75 times
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: String function: 021BFDFB appears 63 times
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: String function: 0042EDF6 appears 36 times
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: String function: 0042F460 appears 33 times
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: String function: 00402064 appears 73 times
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00413ACA CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
                Source: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                Source: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: Cshgvzx.exe.0.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                Source: Cshgvzx.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeFile read: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe 'C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe'
                Source: unknownProcess created: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe 'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe
                Source: unknownProcess created: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe 'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\dialer.exe C:\Windows\System32\dialer.exe
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\dialer.exe C:\Windows\System32\dialer.exe
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004132F7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004132F7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Cshgvzxpdvyucjurgvmywubhtofxefb[1]Jump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/5@3/3
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00415D4C OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D1AD GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CreateMutexA,CloseHandle,
                Source: C:\Windows\SysWOW64\mobsync.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-ZXIQGD
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D41E FindResourceA,LoadResource,LockResource,SizeofResource,
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17C push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17C push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17C push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9A push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9A push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9A push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9C push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9C push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDF9C push 004063DCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDFD4 push 00406414h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDFD4 push 00406414h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDFD4 push 00406414h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE48C push 004068CCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE48C push 004068CCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE48C push 004068CCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDCBC push 00406121h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDCBC push 00406121h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BDCBC push 00406121h; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BF8D8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17A push 004065BCh; ret
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BE17C push 004065BCh; ret
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeFile created: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeJump to dropped file
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00405C3E ShellExecuteW,URLDownloadToFileW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00415D4C OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run CshgvzxJump to behavior
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run CshgvzxJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Delayed program exit foundShow sources
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D455 Sleep,ExitProcess,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0040D455 Sleep,ExitProcess,
                Source: C:\Windows\SysWOW64\mobsync.exe TID: 6280Thread sleep time: -75000s >= -30000s
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe TID: 1412Thread sleep count: 48 > 30
                Source: C:\Windows\SysWOW64\mobsync.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
                Source: C:\Windows\SysWOW64\mobsync.exeAPI coverage: 7.6 %
                Source: C:\Windows\SysWOW64\dialer.exeAPI coverage: 2.0 %
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00406176 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004456A9 FindFirstFileExA,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004170AC FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00406176 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0040A3AF FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0040A5CA FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004456A9 FindFirstFileExA,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004077EE __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_00407C57 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00406930 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042F07F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0040D072 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0044697D GetProcessHeap,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0043B789 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0043B789 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeCode function: 0_3_021BD330 LdrInitializeThunk,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042F1CD SetUnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042F07F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004360A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042F62C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0042F1CD SetUnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0042F07F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_004360A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: 18_2_0042F62C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: EC0000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F50000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F60000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F70000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F80000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: ED0000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: EE0000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: EF0000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F00000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 10590000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F10000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: F20000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: C60000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: CF0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: D00000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: D10000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: D20000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: C70000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: C80000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: C90000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: CA0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: 10590000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: CB0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: CC0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 430000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 4C0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 4D0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 4E0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 4F0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 440000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 450000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 460000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 470000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 10590000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 480000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 490000
                Allocates memory in foreign processesShow sources
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 10590000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 430000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 4C0000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 4D0000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 4E0000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 4F0000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 440000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 450000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 460000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 470000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 480000 protect: page execute and read and write
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory allocated: C:\Windows\SysWOW64\secinit.exe base: 490000 protect: page execute and read and write
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 10590000 value starts with: 4D5A
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\dialer.exe base: 10590000 value starts with: 4D5A
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeMemory written: C:\Windows\SysWOW64\secinit.exe base: 10590000 value starts with: 4D5A
                Contains functionality to inject code into remote processesShow sources
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00413ACA CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
                Creates a thread in another existing process (thread injection)Show sources
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeThread created: C:\Windows\SysWOW64\mobsync.exe EIP: EC0000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeThread created: C:\Windows\SysWOW64\mobsync.exe EIP: F80000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeThread created: C:\Windows\SysWOW64\mobsync.exe EIP: F00000
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeThread created: C:\Windows\SysWOW64\mobsync.exe EIP: F20000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\dialer.exe EIP: C60000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\dialer.exe EIP: D20000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\dialer.exe EIP: CA0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\dialer.exe EIP: CC0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\secinit.exe EIP: 430000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\secinit.exe EIP: 4F0000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\secinit.exe EIP: 470000
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeThread created: C:\Windows\SysWOW64\secinit.exe EIP: 490000
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe
                Source: C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\dialer.exe C:\Windows\System32\dialer.exe
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeProcess created: C:\Windows\SysWOW64\secinit.exe C:\Windows\System32\secinit.exe
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00414923 StrToIntA,mouse_event,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetLocaleInfoA,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: GetLocaleInfoA,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: EnumSystemLocalesW,
                Source: C:\Windows\SysWOW64\dialer.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0042F2AB cpuid
                Source: C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_00404E64 GetLocalTime,CreateEventA,CreateThread,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_0044190C _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: 8_2_004166F6 GetComputerNameExW,GetUserNameW,

                Stealing of Sensitive Information:

                barindex
                Yara detected Remcos RATShow sources
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356879289.00000000006E8000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mobsync.exe PID: 4692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 6544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: secinit.exe PID: 6672, type: MEMORYSTR
                Contains functionality to steal Firefox passwords or cookiesShow sources
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: \key3.db
                Source: C:\Windows\SysWOW64\dialer.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
                Source: C:\Windows\SysWOW64\dialer.exeCode function: \key3.db
                Contains functionality to steal Chrome passwords or cookiesShow sources
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\SysWOW64\dialer.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data

                Remote Access Functionality:

                barindex
                Yara detected Remcos RATShow sources
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10590000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10591897.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10590000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.10591897.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.dialer.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.secinit.exe.10590000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mobsync.exe.10591897.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.356879289.00000000006E8000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mobsync.exe PID: 4692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 6544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: secinit.exe PID: 6672, type: MEMORYSTR
                Detected Remcos RATShow sources
                Source: mobsync.exeString found in binary or memory: Remcos_Mutex_Inj
                Source: mobsync.exe, 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov|
                Source: dialer.exeString found in binary or memory: Remcos_Mutex_Inj
                Source: dialer.exe, 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov|
                Source: secinit.exe, 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
                Source: secinit.exe, 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicence_code.txtSoftware\WDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceUserAccess level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\SETTINGSoverridepth_unenc3.1.5 Prov|
                Source: C:\Windows\SysWOW64\mobsync.exeCode function: cmd.exe
                Source: C:\Windows\SysWOW64\dialer.exeCode function: cmd.exe

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsNative API1Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information1OS Credential Dumping1System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                Default AccountsCommand and Scripting Interpreter1Windows Service1Access Token Manipulation1Obfuscated Files or Information2Input Capture11Account Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsService Execution2Registry Run Keys / Startup Folder1Windows Service1Software Packing1Credentials In Files2System Service Discovery1SMB/Windows Admin SharesClipboard Data2Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Process Injection521Masquerading1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder1Virtualization/Sandbox Evasion1LSA SecretsSystem Information Discovery23SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsSecurity Software Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol12Jamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection521DCSyncVirtualization/Sandbox Evasion1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemProcess Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 479213 Sample: RFQ-Order_Sheet#43254363-Se... Startdate: 07/09/2021 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 4 other signatures 2->45 6 RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe 1 18 2->6         started        11 Cshgvzx.exe 13 2->11         started        13 Cshgvzx.exe 14 2->13         started        process3 dnsIp4 25 cdn.discordapp.com 162.159.135.233, 443, 49699, 49700 CLOUDFLARENETUS United States 6->25 27 192.168.2.1 unknown unknown 6->27 23 C:\Users\Public\Libraries\...\Cshgvzx.exe, PE32 6->23 dropped 47 Writes to foreign memory regions 6->47 49 Creates a thread in another existing process (thread injection) 6->49 51 Injects a PE file into a foreign processes 6->51 15 mobsync.exe 2 6->15         started        19 dialer.exe 11->19         started        53 Allocates memory in foreign processes 13->53 21 secinit.exe 13->21         started        file5 signatures6 process7 dnsIp8 29 204.44.86.179, 49151, 49707 ASN-QUADRANET-GLOBALUS United States 15->29 31 Contains functionality to steal Chrome passwords or cookies 15->31 33 Contains functionality to inject code into remote processes 15->33 35 Contains functionality to steal Firefox passwords or cookies 15->35 37 Delayed program exit found 19->37 signatures9

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                No Antivirus matches

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                19.2.secinit.exe.500000.0.unpack100%AviraHEUR/AGEN.1141389Download File
                8.0.mobsync.exe.10590000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                18.2.dialer.exe.10590000.2.unpack100%AviraTR/Dropper.GenDownload File
                8.0.mobsync.exe.10590000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                8.2.mobsync.exe.10590000.2.unpack100%AviraTR/Dropper.GenDownload File
                18.0.dialer.exe.10590000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                8.2.mobsync.exe.400000.0.unpack100%AviraHEUR/AGEN.1141389Download File
                19.0.secinit.exe.10590000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                19.0.secinit.exe.10590000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                19.0.secinit.exe.10590000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                18.0.dialer.exe.10590000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                8.0.mobsync.exe.10590000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                18.0.dialer.exe.10590000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                8.0.mobsync.exe.10590000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                18.0.dialer.exe.10590000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                18.2.dialer.exe.400000.0.unpack100%AviraHEUR/AGEN.1141389Download File
                19.2.secinit.exe.10590000.1.unpack100%AviraTR/Dropper.GenDownload File
                19.0.secinit.exe.10590000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                204.44.86.1790%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                cdn.discordapp.com
                162.159.135.233
                truefalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  204.44.86.179true
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  204.44.86.179
                  unknownUnited States
                  8100ASN-QUADRANET-GLOBALUStrue
                  162.159.135.233
                  cdn.discordapp.comUnited States
                  13335CLOUDFLARENETUSfalse

                  Private

                  IP
                  192.168.2.1

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:479213
                  Start date:07.09.2021
                  Start time:18:15:44
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 12m 12s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:28
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@9/5@3/3
                  EGA Information:
                  • Successful, ratio: 40%
                  HDC Information:
                  • Successful, ratio: 80.4% (good quality ratio 76.6%)
                  • Quality average: 82.3%
                  • Quality standard deviation: 26.3%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.50.102.62, 40.112.88.60, 20.82.209.183, 80.67.82.235, 80.67.82.211
                  • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                  • Execution Graph export aborted for target Cshgvzx.exe, PID 5296 because there are no executed function
                  • Execution Graph export aborted for target Cshgvzx.exe, PID 5384 because there are no executed function
                  • Execution Graph export aborted for target RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe, PID 5256 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  18:16:40API Interceptor1x Sleep call for process: RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe modified
                  18:16:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Cshgvzx C:\Users\Public\Libraries\xzvghsC.url
                  18:16:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Cshgvzx C:\Users\Public\Libraries\xzvghsC.url
                  18:17:00API Interceptor2x Sleep call for process: Cshgvzx.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  204.44.86.179Invoice-packing list BL NO. 212142500 MRKU7550471 ML-IN4104393.tarGet hashmaliciousBrowse
                    New_Order_for_September#442625272-doc-signed copy.exeGet hashmaliciousBrowse
                      New_Order_for_September#442625272-doc-signed copy.exeGet hashmaliciousBrowse
                        162.159.135.233mosoxxxHack.exeGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/710557342755848243/876828681815871488/clp.exe
                        Sales-contract-deaho-180521-poweruae.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/843685789120331799/844316591284944986/poiu.exe
                        PURCHASE ORDER E3007921.EXEGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/809311531652087809/839820005927550996/Youngest_Snake.exe
                        Waybill Document 22700456.exeGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
                        COMPANY REQUIREMENT.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/819674896988242004/819677189900861500/harcout.exe
                        Email data form.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/789279517516365865/789279697203757066/angelx.scr
                        Down Payment.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/788946375533789214/788947376849027092/atlasx.scr
                        Vessel details.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/780175015496777751/781048233136226304/mocux.exe
                        Teklif Rusya 24 09 2020.docGet hashmaliciousBrowse
                        • cdn.discordapp.com/attachments/733818080668680222/758418625429372978/p2.jpg

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        cdn.discordapp.com2101222_OrdineFornitore del.ppamGet hashmaliciousBrowse
                        • 162.159.133.233
                        ORDER 33212762.ppamGet hashmaliciousBrowse
                        • 162.159.135.233
                        38fd2cb3083f33b50606b7821453769103bde24335734.exeGet hashmaliciousBrowse
                        • 162.159.133.233
                        JSYInjvdnM.exeGet hashmaliciousBrowse
                        • 162.159.129.233
                        SecuriteInfo.com.W32.AIDetect.malware2.7985.exeGet hashmaliciousBrowse
                        • 162.159.134.233
                        WAYBILL.EXEGet hashmaliciousBrowse
                        • 162.159.133.233
                        Eklenen yeni siparis.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        KlErfuBsH2.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        H32ChHNoNW.exeGet hashmaliciousBrowse
                        • 162.159.133.233
                        Wdq9HRCTrG.exeGet hashmaliciousBrowse
                        • 162.159.134.233
                        bk0Yz4tRBL.exeGet hashmaliciousBrowse
                        • 162.159.133.233
                        Ouiojcejoyugnzyrllxqhjgpjgtmcpzvnp.exeGet hashmaliciousBrowse
                        • 162.159.133.233
                        hhnkZPwzxi.exeGet hashmaliciousBrowse
                        • 162.159.133.233
                        X117Xdqctj.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        ffe39579163c231521098435348019227cca339b735ef.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        Ko6lDa3LMx.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        Invoice-packing list BL NO. 212142500 MRKU7550471 ML-IN4104393.tarGet hashmaliciousBrowse
                        • 162.159.129.233
                        UwQkw83lMK.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        qqlbBIsqPQ.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        Bxs1wBHcNS.exeGet hashmaliciousBrowse
                        • 162.159.133.233

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        ASN-QUADRANET-GLOBALUSBahcfFNy25bmV1c.exeGet hashmaliciousBrowse
                        • 154.81.38.79
                        Invoice-packing list BL NO. 212142500 MRKU7550471 ML-IN4104393.tarGet hashmaliciousBrowse
                        • 204.44.86.179
                        PO23456.docGet hashmaliciousBrowse
                        • 104.223.93.90
                        Swift Copy.docGet hashmaliciousBrowse
                        • 104.223.93.90
                        mipsGet hashmaliciousBrowse
                        • 104.223.82.208
                        DHL-Express-Document.docGet hashmaliciousBrowse
                        • 104.223.93.90
                        DHL-Express-Description.docGet hashmaliciousBrowse
                        • 104.223.93.90
                        iq12CZCZjTGet hashmaliciousBrowse
                        • 198.96.89.47
                        ORDER ACKNOWLEDGEMENT & PROFORMA INVOICE.PDF.EXEGet hashmaliciousBrowse
                        • 154.81.38.104
                        udpGet hashmaliciousBrowse
                        • 204.44.93.54
                        lgTwTtkeIRGet hashmaliciousBrowse
                        • 155.94.178.138
                        try.exeGet hashmaliciousBrowse
                        • 69.174.100.168
                        RmjhrUdTri.exeGet hashmaliciousBrowse
                        • 172.93.187.66
                        synaGet hashmaliciousBrowse
                        • 155.94.178.138
                        New_Order_for_September#442625272-doc-signed copy.exeGet hashmaliciousBrowse
                        • 204.44.86.179
                        New_Order_for_September#442625272-doc-signed copy.exeGet hashmaliciousBrowse
                        • 204.44.86.179
                        mirai.x86Get hashmaliciousBrowse
                        • 107.150.24.141
                        BALLANCE PAYMENT.docGet hashmaliciousBrowse
                        • 104.223.93.90
                        5sNHIrfRwn.exeGet hashmaliciousBrowse
                        • 107.150.23.149
                        1073645267891287347.jarGet hashmaliciousBrowse
                        • 172.93.187.66
                        CLOUDFLARENETUSz5WnxHv7bg.exeGet hashmaliciousBrowse
                        • 104.18.6.156
                        0HsDg7f3eG.exeGet hashmaliciousBrowse
                        • 104.18.6.156
                        3RQvR8bIfa.exeGet hashmaliciousBrowse
                        • 104.18.7.156
                        Swift 07.09.21.exeGet hashmaliciousBrowse
                        • 66.235.200.146
                        IMG_80350001.exeGet hashmaliciousBrowse
                        • 104.18.6.156
                        IMG_8035002078801.docGet hashmaliciousBrowse
                        • 104.18.7.156
                        DLT_85620000107.exeGet hashmaliciousBrowse
                        • 23.227.38.74
                        SvgoEJMLe7.dllGet hashmaliciousBrowse
                        • 172.67.70.134
                        a1gc77epIx.dllGet hashmaliciousBrowse
                        • 104.26.6.139
                        OKS.exeGet hashmaliciousBrowse
                        • 172.67.188.154
                        eDpXMjvZO0.exeGet hashmaliciousBrowse
                        • 172.67.173.58
                        9c2NwBeaMN.exeGet hashmaliciousBrowse
                        • 104.21.34.192
                        famz6.docGet hashmaliciousBrowse
                        • 23.227.38.74
                        2101222_OrdineFornitore del.ppamGet hashmaliciousBrowse
                        • 162.159.133.233
                        SYuBVzCs5U.exeGet hashmaliciousBrowse
                        • 172.67.221.88
                        cs.exeGet hashmaliciousBrowse
                        • 172.67.164.78
                        ORDER 33212762.ppamGet hashmaliciousBrowse
                        • 162.159.134.233
                        vbc(1).exeGet hashmaliciousBrowse
                        • 104.21.89.140
                        ENQUIRYSMRT119862021-ERW PIPES.pdf.exeGet hashmaliciousBrowse
                        • 172.67.196.70
                        COAU7229898130.xlsxGet hashmaliciousBrowse
                        • 104.21.8.222

                        JA3 Fingerprints

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        37f463bf4616ecd445d4a1937da06e19uYZQ72bfTF.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        yGY3UQymu4.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        cGJ916maFX.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        OffboardDiagLauncher.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        scan_doc001091121.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        FedEx AWB# 8611746580734 ,PDF.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        RFQ_PARTS PRICELIST 110-10007046,pdf.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        RFQ 2021-09.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        Quote.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        purchase order.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        bt2091.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        b3qnpvoALc.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        8X0Zj8zIDN.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        OKS.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        eDpXMjvZO0.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        Ted_Yeung.htmlGet hashmaliciousBrowse
                        • 162.159.135.233
                        Ted_Yeung.htmlGet hashmaliciousBrowse
                        • 162.159.135.233
                        Qly2dKZwCy.exeGet hashmaliciousBrowse
                        • 162.159.135.233
                        2101222_OrdineFornitore del.ppamGet hashmaliciousBrowse
                        • 162.159.135.233
                        aJkjc0EPD2.exeGet hashmaliciousBrowse
                        • 162.159.135.233

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
                        Process:C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):792576
                        Entropy (8bit):6.622449628761002
                        Encrypted:false
                        SSDEEP:6144:5CZ5dEs7ZrwziKYDZ2/avaYvqfbUacyHeP/hz0Xkb5fjUOCMXjqfZPFVb/4rr7ZW:QZ5l7ZrwzLCMHHi5rUlI64rimoAzyZV
                        MD5:06534C059B111776B838F793C6444622
                        SHA1:7EBDA7124A60DE107A00960D9FE0563FD3CD2760
                        SHA-256:933A4D2ABFDF0F91550A102808D00ADACE6EB9DF89EA9E254E2DF7601B02DD8F
                        SHA-512:9E1498B78D6682F1CDE8717A85570DF742D4FA2D7C59D554AFB938AF4DB1EEFFB13522682068D81EFC676DDD4DD80741ABCF1B1AE94560B01AD2C4FDF69D9CDD
                        Malicious:true
                        Reputation:low
                        Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......4.............@..............................................@..............................L#...p...&.......................j..................................................................................CODE....|........................... ..`DATA.....z.......|..................@...BSS.....A4...p.......`...................idata..L#.......$...`..............@....tls.....................................rdata..............................@..P.reloc...j.......l..................@..P.rsrc....&...p...&..................@..P....................................@..P........................................................................................................................................
                        C:\Users\Public\Libraries\xzvghsC.url
                        Process:C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Cshgvzx\\Cshgvzx.exe">), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):96
                        Entropy (8bit):4.866547012067739
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMKf6ABvsGKd7ovn:HRYFVmTWDyz/vsb7yn
                        MD5:2DDF040A20140597A72FE56E21E798F0
                        SHA1:5DCAFBE1835C1A8AC7A97586B6BEF970A6FFC60B
                        SHA-256:01ED6321AF738C2093089DD77FDE2C2B54A70655499BC8490B835FDEB4A66FDE
                        SHA-512:1369F56AEF6B4FFBB5EBE1AC161FB52693B535259CEF4D0F0842A7C7789F65A9FAFE825C2FFB1D5CCE5563930C0A2DDECBF0CEC6E63E559B6344856E3857C054
                        Malicious:false
                        Yara Hits:
                        • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\xzvghsC.url, Author: @itsreallynick (Nick Carr)
                        Reputation:low
                        Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Cshgvzx\\Cshgvzx.exe"..IconIndex=3..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Cshgvzxpdvyucjurgvmywubhtofxefb[1]
                        Process:C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):579072
                        Entropy (8bit):7.997266864646308
                        Encrypted:true
                        SSDEEP:12288:VIjmqCh/9ePXG9kqy8Yc73pGyho53rgTgbPJ+H7it/rEj/sOf3rr:HqCh8vM3FYZy65cTgbE76z9Of/
                        MD5:B5DC22D709B4D41A4B7160A90C203274
                        SHA1:48663BAE9BB24E3EBB48F72A81B4CA2AE875D864
                        SHA-256:89AFE9CCEFAC3D8481859648551A0F4E7C279F453137E2E6881AFA28EB9262C3
                        SHA-512:8AC8EDC4FDC5C682250C7C76E595E40D905A1D5E771D356979209CAA8969F7B3808D7038033A1DFC05A86BA8CB56297BDE124D11B80BF940709EE57F5B3A43A1
                        Malicious:false
                        Reputation:low
                        Preview: .....O$.l................VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t...:....".:.. .vl.)G=....?p}.......i.-..0.3dVi...............i..Ap)q.'N.+L..m......h.....D.$.|N......a._.B.I.n.*..A......s..D....*.i..Ap)q.'N.+L..m......h.....D.$.|N......a._.B.I.n.*..A......s..D....*.i..Ap)q.'N..O...`$.....CJ..Z.i..8........++?N.b7D..\..~q....g.|o..&.a.\.R&vA...c..|qS..W.......N%...?."\.$UD..C...8...?..&5..Es.l_......)...b>.W.f&..Oh%..j&....-3?IvL...X...CA[...u......]........l_.D....=Kb3+&..4..6..a...16..#...Z..B....u...w......%.....lF..xzs....x.....5-D........'.%..@.$.4.
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Cshgvzxpdvyucjurgvmywubhtofxefb[2]
                        Process:C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):579072
                        Entropy (8bit):7.997266864646308
                        Encrypted:true
                        SSDEEP:12288:VIjmqCh/9ePXG9kqy8Yc73pGyho53rgTgbPJ+H7it/rEj/sOf3rr:HqCh8vM3FYZy65cTgbE76z9Of/
                        MD5:B5DC22D709B4D41A4B7160A90C203274
                        SHA1:48663BAE9BB24E3EBB48F72A81B4CA2AE875D864
                        SHA-256:89AFE9CCEFAC3D8481859648551A0F4E7C279F453137E2E6881AFA28EB9262C3
                        SHA-512:8AC8EDC4FDC5C682250C7C76E595E40D905A1D5E771D356979209CAA8969F7B3808D7038033A1DFC05A86BA8CB56297BDE124D11B80BF940709EE57F5B3A43A1
                        Malicious:false
                        Reputation:low
                        Preview: .....O$.l................VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t./dt........z".`a.9.z'I5dw.VI)_.W.....G0.2.m.>.t...:....".:.. .vl.)G=....?p}.......i.-..0.3dVi...............i..Ap)q.'N.+L..m......h.....D.$.|N......a._.B.I.n.*..A......s..D....*.i..Ap)q.'N.+L..m......h.....D.$.|N......a._.B.I.n.*..A......s..D....*.i..Ap)q.'N..O...`$.....CJ..Z.i..8........++?N.b7D..\..~q....g.|o..&.a.\.R&vA...c..|qS..W.......N%...?."\.$UD..C...8...?..&5..Es.l_......)...b>.W.f&..Oh%..j&....-3?IvL...X...CA[...u......]........l_.D....=Kb3+&..4..6..a...16..#...Z..B....u...w......%.....lF..xzs....x.....5-D........'.%..@.$.4.

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.622449628761002
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.66%
                        • Win32 Executable Delphi generic (14689/80) 0.15%
                        • Windows Screen Saver (13104/52) 0.13%
                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        File name:RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                        File size:792576
                        MD5:06534c059b111776b838f793c6444622
                        SHA1:7ebda7124a60de107a00960d9fe0563fd3cd2760
                        SHA256:933a4d2abfdf0f91550a102808d00adace6eb9df89ea9e254e2df7601b02dd8f
                        SHA512:9e1498b78d6682f1cde8717a85570df742d4fa2d7c59d554afb938af4db1eeffb13522682068d81efc676ddd4dd80741abcf1b1ae94560b01ad2c4fdf69d9cdd
                        SSDEEP:6144:5CZ5dEs7ZrwziKYDZ2/avaYvqfbUacyHeP/hz0Xkb5fjUOCMXjqfZPFVb/4rr7ZW:QZ5l7ZrwzLCMHHi5rUlI64rimoAzyZV
                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                        File Icon

                        Icon Hash:acaca4b2a2968ea2

                        Static PE Info

                        General

                        Entrypoint:0x45ef34
                        Entrypoint Section:CODE
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                        DLL Characteristics:
                        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:4dfd1417e7c3ef71650aaaaec402ef1c

                        Entrypoint Preview

                        Instruction
                        push ebp
                        mov ebp, esp
                        add esp, FFFFFFF0h
                        mov eax, 0045ECE4h
                        call 00007FC97CBCE9D1h
                        nop
                        nop
                        mov eax, dword ptr [004A6964h]
                        mov eax, dword ptr [eax]
                        call 00007FC97CC1D553h
                        mov ecx, dword ptr [004A69F8h]
                        mov eax, dword ptr [004A6964h]
                        mov eax, dword ptr [eax]
                        mov edx, dword ptr [0045E840h]
                        call 00007FC97CC1D553h
                        mov eax, dword ptr [004A6964h]
                        mov eax, dword ptr [eax]
                        call 00007FC97CC1D5C7h
                        call 00007FC97CBCC5FEh
                        nop
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xfb0000x234c.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1070000x12600.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000x6a90.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xff0000x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        CODE0x10000x5df7c0x5e000False0.528699509641data6.55764320265IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        DATA0x5f0000x47af40x47c00False0.249173154399data5.2159972367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        BSS0xa70000x534410x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .idata0xfb0000x234c0x2400False0.3623046875data4.99388267016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .tls0xfe0000x100x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .rdata0xff0000x180x200False0.052734375data0.203013767787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                        .reloc0x1000000x6a900x6c00False0.62037037037data6.66625425433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                        .rsrc0x1070000x126000x12600False0.194608312075data3.98030669674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_CURSOR0x107b600x134data
                        RT_CURSOR0x107c940x134data
                        RT_CURSOR0x107dc80x134data
                        RT_CURSOR0x107efc0x134data
                        RT_CURSOR0x1080300x134data
                        RT_CURSOR0x1081640x134data
                        RT_CURSOR0x1082980x134data
                        RT_BITMAP0x1083cc0x1d0data
                        RT_BITMAP0x10859c0x1e4data
                        RT_BITMAP0x1087800x1d0data
                        RT_BITMAP0x1089500x1d0data
                        RT_BITMAP0x108b200x1d0data
                        RT_BITMAP0x108cf00x1d0data
                        RT_BITMAP0x108ec00x1d0data
                        RT_BITMAP0x1090900x1d0data
                        RT_BITMAP0x1092600x1d0data
                        RT_BITMAP0x1094300x1d0data
                        RT_BITMAP0x1096000xe8GLS_BINARY_LSB_FIRSTEnglishUnited States
                        RT_ICON0x1096e80x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                        RT_ICON0x109b500x10a8dataEnglishUnited States
                        RT_ICON0x10abf80x25a8dataEnglishUnited States
                        RT_ICON0x10d1a00x94a8dataEnglishUnited States
                        RT_DIALOG0x1166480x52data
                        RT_STRING0x11669c0x270data
                        RT_STRING0x11690c0x230data
                        RT_STRING0x116b3c0x1d4data
                        RT_STRING0x116d100xecdata
                        RT_STRING0x116dfc0x320data
                        RT_STRING0x11711c0xc8data
                        RT_STRING0x1171e40x100data
                        RT_STRING0x1172e40x238data
                        RT_STRING0x11751c0x3f4data
                        RT_STRING0x1179100x378data
                        RT_STRING0x117c880x3e8data
                        RT_STRING0x1180700x234data
                        RT_STRING0x1182a40xecdata
                        RT_STRING0x1183900x1b4data
                        RT_STRING0x1185440x3e4data
                        RT_STRING0x1189280x358data
                        RT_STRING0x118c800x2b4data
                        RT_RCDATA0x118f340x10data
                        RT_RCDATA0x118f440x304data
                        RT_RCDATA0x1192480x162Delphi compiled form 'T__691894828'
                        RT_GROUP_CURSOR0x1193ac0x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1193c00x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1193d40x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1193e80x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1193fc0x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1194100x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_CURSOR0x1194240x14Lotus unknown worksheet or configuration, revision 0x1
                        RT_GROUP_ICON0x1194380x3edataEnglishUnited States

                        Imports

                        DLLImport
                        kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                        user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                        kernel32.dlllstrcpyA, lstrcmpiA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                        version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                        gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
                        user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                        kernel32.dllSleep
                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                        ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                        oleaut32.dllGetErrorInfo, SysFreeString
                        comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        09/07/21-18:17:02.843080TCP2032776ET TROJAN Remocs 3.x Unencrypted Checkin4970749151192.168.2.5204.44.86.179
                        09/07/21-18:17:03.200734TCP2032777ET TROJAN Remocs 3.x Unencrypted Server Response4915149707204.44.86.179192.168.2.5

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Sep 7, 2021 18:16:40.805983067 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.823441982 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.823641062 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.848623991 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.866441965 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.871298075 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.871368885 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.871440887 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.925801992 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.943326950 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.943347931 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.943449020 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.958729029 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.975713968 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996124029 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996148109 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996165991 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996182919 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996196985 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996212006 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996213913 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996232033 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996237040 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996249914 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996268034 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996273041 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996301889 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996345043 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996728897 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996747971 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996764898 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996782064 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.996804953 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.996845961 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.997556925 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.997576952 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.997595072 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.997617960 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.997647047 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.997689962 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.998397112 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.998424053 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.998440981 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.998461008 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.998524904 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.998550892 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.999190092 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.999213934 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.999229908 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.999249935 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:40.999281883 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:40.999330044 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.000032902 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000057936 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000071049 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000093937 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000125885 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.000144958 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.000844955 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000865936 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000885010 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000888109 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.000907898 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.000915051 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.000972033 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.001048088 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.003463030 CEST49700443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013081074 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013103008 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013114929 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013128042 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013138056 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013173103 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013179064 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013411045 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013430119 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013447046 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013463974 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.013488054 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013506889 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.013514042 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.014241934 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.014259100 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.014280081 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.014288902 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.014300108 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.014309883 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.014329910 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.014345884 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.015038967 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015064955 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015083075 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015099049 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015129089 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.015151978 CEST49699443192.168.2.5162.159.135.233
                        Sep 7, 2021 18:16:41.015888929 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015908003 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015923977 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015939951 CEST44349699162.159.135.233192.168.2.5
                        Sep 7, 2021 18:16:41.015968084 CEST49699443192.168.2.5162.159.135.233

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Sep 7, 2021 18:16:28.112014055 CEST6180553192.168.2.58.8.8.8
                        Sep 7, 2021 18:16:28.151379108 CEST53618058.8.8.8192.168.2.5
                        Sep 7, 2021 18:16:40.749583960 CEST5479553192.168.2.58.8.8.8
                        Sep 7, 2021 18:16:40.787383080 CEST53547958.8.8.8192.168.2.5
                        Sep 7, 2021 18:16:54.049629927 CEST4955753192.168.2.58.8.8.8
                        Sep 7, 2021 18:16:54.109647989 CEST53495578.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:01.117063999 CEST6173353192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:01.160197973 CEST53617338.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:01.364059925 CEST6544753192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:01.399791002 CEST53654478.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:11.635313988 CEST5244153192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:11.671046019 CEST53524418.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:22.133663893 CEST6217653192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:22.166584015 CEST53621768.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:37.328597069 CEST5959653192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:37.372284889 CEST53595968.8.8.8192.168.2.5
                        Sep 7, 2021 18:17:41.054203033 CEST6529653192.168.2.58.8.8.8
                        Sep 7, 2021 18:17:41.091835976 CEST53652968.8.8.8192.168.2.5
                        Sep 7, 2021 18:18:12.110825062 CEST6318353192.168.2.58.8.8.8
                        Sep 7, 2021 18:18:12.145008087 CEST53631838.8.8.8192.168.2.5
                        Sep 7, 2021 18:18:13.867377996 CEST6015153192.168.2.58.8.8.8
                        Sep 7, 2021 18:18:13.915498018 CEST53601518.8.8.8192.168.2.5

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Sep 7, 2021 18:16:40.749583960 CEST192.168.2.58.8.8.80x3851Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.364059925 CEST192.168.2.58.8.8.80xfb4bStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.635313988 CEST192.168.2.58.8.8.80x8fbfStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Sep 7, 2021 18:16:40.787383080 CEST8.8.8.8192.168.2.50x3851No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:16:40.787383080 CEST8.8.8.8192.168.2.50x3851No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:16:40.787383080 CEST8.8.8.8192.168.2.50x3851No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:16:40.787383080 CEST8.8.8.8192.168.2.50x3851No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:16:40.787383080 CEST8.8.8.8192.168.2.50x3851No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.399791002 CEST8.8.8.8192.168.2.50xfb4bNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.399791002 CEST8.8.8.8192.168.2.50xfb4bNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.399791002 CEST8.8.8.8192.168.2.50xfb4bNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.399791002 CEST8.8.8.8192.168.2.50xfb4bNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:01.399791002 CEST8.8.8.8192.168.2.50xfb4bNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.671046019 CEST8.8.8.8192.168.2.50x8fbfNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.671046019 CEST8.8.8.8192.168.2.50x8fbfNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.671046019 CEST8.8.8.8192.168.2.50x8fbfNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.671046019 CEST8.8.8.8192.168.2.50x8fbfNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                        Sep 7, 2021 18:17:11.671046019 CEST8.8.8.8192.168.2.50x8fbfNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)

                        HTTPS Packets

                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                        Sep 7, 2021 18:16:40.871368885 CEST162.159.135.233443192.168.2.549699CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                        CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                        Sep 7, 2021 18:17:01.542766094 CEST162.159.135.233443192.168.2.549706CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                        CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                        Sep 7, 2021 18:17:11.782536983 CEST162.159.135.233443192.168.2.549708CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                        CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:18:16:33
                        Start date:07/09/2021
                        Path:C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe'
                        Imagebase:0x400000
                        File size:792576 bytes
                        MD5 hash:06534C059B111776B838F793C6444622
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:low

                        General

                        Start time:18:16:52
                        Start date:07/09/2021
                        Path:C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
                        Imagebase:0x400000
                        File size:792576 bytes
                        MD5 hash:06534C059B111776B838F793C6444622
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:low

                        General

                        Start time:18:16:59
                        Start date:07/09/2021
                        Path:C:\Windows\SysWOW64\mobsync.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\mobsync.exe
                        Imagebase:0x7ff797770000
                        File size:93184 bytes
                        MD5 hash:44C19378FA529DD88674BAF647EBDC3C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.492585881.00000000030E7000.00000004.00000020.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.491601903.0000000000400000.00000040.00000001.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.492970715.0000000010590000.00000040.00000001.sdmp, Author: unknown
                        Reputation:moderate

                        General

                        Start time:18:17:00
                        Start date:07/09/2021
                        Path:C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
                        Imagebase:0x400000
                        File size:792576 bytes
                        MD5 hash:06534C059B111776B838F793C6444622
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:low

                        General

                        Start time:18:17:20
                        Start date:07/09/2021
                        Path:C:\Windows\SysWOW64\dialer.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\dialer.exe
                        Imagebase:0xe10000
                        File size:32768 bytes
                        MD5 hash:F176211F7372248224D02AC023573870
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.331608026.0000000002F98000.00000004.00000020.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000002.331374887.0000000000400000.00000040.00000001.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000002.331771013.0000000010590000.00000040.00000001.sdmp, Author: unknown
                        Reputation:moderate

                        General

                        Start time:18:17:32
                        Start date:07/09/2021
                        Path:C:\Windows\SysWOW64\secinit.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\secinit.exe
                        Imagebase:0x12a0000
                        File size:9728 bytes
                        MD5 hash:174A363BB5A2D88B224546C15DD10906
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000013.00000002.356743910.0000000000500000.00000040.00000001.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000013.00000002.356991304.0000000010590000.00000040.00000001.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.356879289.00000000006E8000.00000004.00000020.sdmp, Author: Joe Security
                        Reputation:moderate

                        Disassembly

                        Code Analysis

                        Reset < >