Loading ...

Play interactive tourEdit tour

Windows Analysis Report vXVHRRGG7c.exe

Overview

General Information

Sample Name:vXVHRRGG7c.exe
Analysis ID:490261
MD5:051c20fd814ac34ffcfadd56ec872be0
SHA1:6d4d301594ba01b9e4d8eac59dc839090f090fdf
SHA256:7aa215495949e721b9ae8b3b28cb728ac3b3240438e67f2cc4f3be2711d3d319
Tags:exeTrickBot
Infos:

Most interesting Screenshot:

Detection

TrickBot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Trickbot
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
Writes to foreign memory regions
Allocates memory in foreign processes
May check the online IP address of the machine
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Potential key logger detected (key state polling based)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • vXVHRRGG7c.exe (PID: 3028 cmdline: 'C:\Users\user\Desktop\vXVHRRGG7c.exe' MD5: 051C20FD814AC34FFCFADD56EC872BE0)
    • wermgr.exe (PID: 2944 cmdline: C:\Windows\system32\wermgr.exe MD5: FF214585BF10206E21EA8EBA202FACFD)
    • cmd.exe (PID: 4404 cmdline: C:\Windows\system32\cmd.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
  • cmd.exe (PID: 720 cmdline: C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat' MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
    • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • vXVHRRGG7c.exe (PID: 1140 cmdline: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe MD5: 051C20FD814AC34FFCFADD56EC872BE0)
      • wermgr.exe (PID: 760 cmdline: C:\Windows\system32\wermgr.exe MD5: FF214585BF10206E21EA8EBA202FACFD)
      • cmd.exe (PID: 3560 cmdline: C:\Windows\system32\cmd.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
  • cleanup

Malware Configuration

Threatname: Trickbot

{"ver": "2000033", "gtag": "tot153", "servs": ["179.42.137.102:443", "191.36.152.198:443", "179.42.137.104:443", "179.42.137.106:443", "179.42.137.108:443", "202.183.12.124:443", "194.190.18.122:443", "103.56.207.230:443", "171.103.187.218:443", "171.103.189.118:443", "18.139.111.104:443", "179.42.137.105:443", "186.4.193.75:443", "171.101.229.2:443", "179.42.137.107:443", "103.56.43.209:443", "179.42.137.110:443", "45.181.207.156:443", "197.44.54.162:443", "179.42.137.109:443", "103.59.105.226:443", "45.181.207.101:443", "117.196.236.205:443", "72.224.45.102:443", "179.42.137.111:443", "96.47.239.181:443", "171.100.112.190:443", "117.196.239.6:443"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
    0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
      00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
        0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
          00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
            Click to see the 1 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.vXVHRRGG7c.exe.24a0000.3.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
              10.2.vXVHRRGG7c.exe.1260000.3.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
                1.2.vXVHRRGG7c.exe.23e052e.1.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
                  10.2.vXVHRRGG7c.exe.fb052e.2.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
                    1.2.vXVHRRGG7c.exe.23e052e.1.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmpMalware Configuration Extractor: Trickbot {"ver": "2000033", "gtag": "tot153", "servs": ["179.42.137.102:443", "191.36.152.198:443", "179.42.137.104:443", "179.42.137.106:443", "179.42.137.108:443", "202.183.12.124:443", "194.190.18.122:443", "103.56.207.230:443", "171.103.187.218:443", "171.103.189.118:443", "18.139.111.104:443", "179.42.137.105:443", "186.4.193.75:443", "171.101.229.2:443", "179.42.137.107:443", "103.56.43.209:443", "179.42.137.110:443", "45.181.207.156:443", "197.44.54.162:443", "179.42.137.109:443", "103.59.105.226:443", "45.181.207.101:443", "117.196.236.205:443", "72.224.45.102:443", "179.42.137.111:443", "96.47.239.181:443", "171.100.112.190:443", "117.196.239.6:443"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: vXVHRRGG7c.exeReversingLabs: Detection: 22%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeReversingLabs: Detection: 22%
                      Source: vXVHRRGG7c.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: Binary string: K:\HistogramTest\Release\HistogramTest.pdb source: vXVHRRGG7c.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041D9C5 FindFirstFileA,FindClose,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0041D9C5 FindFirstFileA,FindClose,

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404342 ET CNC Feodo Tracker Reported CnC Server TCP group 22 192.168.2.3:49719 -> 59.4.68.75:443
                      May check the online IP address of the machineShow sources
                      Source: C:\Windows\System32\wermgr.exeDNS query: name: icanhazip.com
                      Source: C:\Windows\System32\wermgr.exeDNS query: name: icanhazip.com
                      Source: Joe Sandbox ViewASN Name: TelefonicadeArgentinaAR TelefonicadeArgentinaAR
                      Source: Joe Sandbox ViewIP Address: 104.18.7.156 104.18.7.156
                      Source: global trafficTCP traffic: 192.168.2.3:49716 -> 171.103.189.118:449
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.102
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 179.42.137.105
                      Source: unknownDNS traffic detected: queries for: icanhazip.com
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.76.0Host: icanhazip.com
                      Source: vXVHRRGG7c.exe, 00000001.00000002.303924886.000000000078A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00423386 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0042339B GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041AA1B GetKeyState,GetKeyState,GetKeyState,GetKeyState,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00417DEB GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00423386 GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0042339B GetKeyState,GetKeyState,GetKeyState,GetFocus,GetDesktopWindow,SendMessageA,SendMessageA,GetParent,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0041AA1B GetKeyState,GetKeyState,GetKeyState,GetKeyState,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00417DEB GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: vXVHRRGG7c.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0040A361
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004147A0
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00416AD2
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0040EF5A
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A4CD0
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0040A361
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_004147A0
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00416AD2
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0040EF5A
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01264CD0
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: String function: 00405A18 appears 98 times
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: String function: 004244B5 appears 35 times
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: String function: 00405A18 appears 98 times
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: String function: 004244B5 appears 35 times
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00403C23 KiUserCallbackDispatcher,LoadLibraryW,ExitProcess,GetCurrentThread,QueueUserAPC,NtTestAlert,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00403CE2 GetCurrentThread,QueueUserAPC,NtTestAlert,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00403C23 LoadLibraryW,ExitProcess,GetCurrentThread,QueueUserAPC,NtTestAlert,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00403CE2 GetCurrentThread,QueueUserAPC,NtTestAlert,
                      Source: vXVHRRGG7c.exe, 00000001.00000002.303499051.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe
                      Source: vXVHRRGG7c.exe, 0000000A.00000002.400503286.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe
                      Source: vXVHRRGG7c.exeBinary or memory string: OriginalFilenameHistogramTest.EXET vs vXVHRRGG7c.exe
                      Source: vXVHRRGG7c.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: vXVHRRGG7c.exe.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: vXVHRRGG7c.exeReversingLabs: Detection: 22%
                      Source: vXVHRRGG7c.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\vXVHRRGG7c.exe 'C:\Users\user\Desktop\vXVHRRGG7c.exe'
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat'
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: C:\Windows\System32\wermgr.exeSystem information queried: HandleInformation
                      Source: C:\Windows\System32\wermgr.exeFile created: C:\Users\user\AppData\Local\browDownload3DJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@13/3@6/6
                      Source: C:\Windows\System32\wermgr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\System32\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{12477072-E440-07DC-0361-112BF0B8DF37}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5676:120:WilError_01
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041B297 __EH_prolog,FindResourceA,LoadResource,LockResource,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat'
                      Source: C:\Windows\System32\wermgr.exeFile written: C:\Users\user\AppData\Local\browDownload3D\settings.iniJump to behavior
                      Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: vXVHRRGG7c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: K:\HistogramTest\Release\HistogramTest.pdb source: vXVHRRGG7c.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00405A18 push eax; ret
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00407AE0 push eax; ret
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A2C90 push dword ptr [edx+14h]; ret
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A4046 push eax; iretd
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A5B40 push edx; iretd
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A4872 push es; iretd
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A3FA7 push 61992208h; ret
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_024A2D39 push dword ptr [edx+14h]; ret
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00405A18 push eax; ret
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00407AE0 push eax; ret
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01262C90 push dword ptr [edx+14h]; ret
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01264046 push eax; iretd
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01264872 push es; iretd
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01265B40 push edx; iretd
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01262D39 push dword ptr [edx+14h]; ret
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_01263FA7 push 61992208h; ret
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004186ED GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,
                      Source: C:\Windows\System32\wermgr.exeFile created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeJump to dropped file
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0042343E IsWindowVisible,IsIconic,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004044B0 IsIconic,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004126B0 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00404767 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00411F00 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0042343E IsWindowVisible,IsIconic,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_004044B0 IsIconic,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_004126B0 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00404767 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00411F00 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00424D9A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                      Source: C:\Windows\System32\wermgr.exeFunction Chain: threadCreated,threadDelayed,threadDelayed,userTimerSet,threadDelayed,threadDelayed,fileVolumeQueried,languageOrLocalQueried,languageOrLocalQueried,adjustToken,systemQueried,systemQueried,threadDelayed,threadDelayed,mutantCreated,threadInformationSet,threadInformationSet,threadInformationSet,threadInformationSet,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,fileOpened
                      Source: C:\Windows\System32\wermgr.exeFunction Chain: threadCreated,threadDelayed,threadDelayed,userTimerSet,threadDelayed,threadDelayed,fileVolumeQueried,languageOrLocalQueried,languageOrLocalQueried,adjustToken,systemQueried,systemQueried,threadDelayed,threadDelayed,threadInformationSet,threadInformationSet,threadInformationSet
                      Tries to detect virtualization through RDTSC time measurementsShow sources
                      Source: C:\Windows\System32\wermgr.exeRDTSC instruction interceptor: First address: 00000200C1644200 second address: 00000200C1644200 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 ret 0x0000000a dec esp 0x0000000b mov edi, eax 0x0000000d call dword ptr [00020816h] 0x00000013 mov ecx, 7FFE0320h 0x00000018 dec eax 0x00000019 mov ecx, dword ptr [ecx] 0x0000001b mov eax, dword ptr [7FFE0004h] 0x00000022 dec eax 0x00000023 imul eax, ecx 0x00000026 dec eax 0x00000027 shr eax, 18h 0x0000002a ret 0x0000002b inc esp 0x0000002c mov esi, eax 0x0000002e dec ecx 0x0000002f mov ebx, edi 0x00000031 dec eax 0x00000032 xor ebx, FFFFFF00h 0x00000038 dec ecx 0x00000039 and ebx, edi 0x0000003b call 00007F21ACC1B026h 0x00000040 rdtsc
                      Source: C:\Windows\System32\wermgr.exeRDTSC instruction interceptor: First address: 0000025C6A134200 second address: 0000025C6A134200 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 ret 0x0000000a dec esp 0x0000000b mov edi, eax 0x0000000d call dword ptr [00020816h] 0x00000013 mov ecx, 7FFE0320h 0x00000018 dec eax 0x00000019 mov ecx, dword ptr [ecx] 0x0000001b mov eax, dword ptr [7FFE0004h] 0x00000022 dec eax 0x00000023 imul eax, ecx 0x00000026 dec eax 0x00000027 shr eax, 18h 0x0000002a ret 0x0000002b inc esp 0x0000002c mov esi, eax 0x0000002e dec ecx 0x0000002f mov ebx, edi 0x00000031 dec eax 0x00000032 xor ebx, FFFFFF00h 0x00000038 dec ecx 0x00000039 and ebx, edi 0x0000003b call 00007F21ACB53916h 0x00000040 rdtsc
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe TID: 5920Thread sleep count: 140 > 30
                      Source: C:\Windows\System32\wermgr.exeLast function: Thread delayed
                      Source: C:\Windows\System32\wermgr.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0041D9C5 FindFirstFileA,FindClose,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0041D4AF __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0041D9C5 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004186ED GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_02461030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_023E095E mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_023E0456 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_02461030 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00FB095E mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00FB0456 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_00FF1030 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004039E7 LdrFindResource_U,LdrAccessResource,VirtualAllocExNuma,VirtualAlloc,WriteProcessMemory,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0040B68A SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_0040B69C SetUnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0040B68A SetUnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: 10_2_0040B69C SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeMemory written: C:\Windows\System32\wermgr.exe base: 200C1640000
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeMemory written: C:\Windows\System32\wermgr.exe base: 7FF7EE4D2860
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeMemory written: C:\Windows\System32\wermgr.exe base: 25C6A130000
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeMemory written: C:\Windows\System32\wermgr.exe base: 7FF7EE4D2860
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 200C1640000 protect: page execute and read and write
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 25C6A130000 protect: page execute and read and write
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                      Source: C:\Windows\System32\wermgr.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\wermgr.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoA,IsValidCodePage,IsValidLocale,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: EnumSystemLocalesA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoA,IsValidCodePage,IsValidLocale,
                      Source: C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004066CD GetLocalTime,GetSystemTime,GetTimeZoneInformation,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_004066CD GetLocalTime,GetSystemTime,GetTimeZoneInformation,
                      Source: C:\Users\user\Desktop\vXVHRRGG7c.exeCode function: 1_2_00424F12 GetVersion,GetProcessVersion,LoadCursorA,LoadCursorA,LoadCursorA,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected TrickbotShow sources
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.24a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.1260000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.23e052e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.fb052e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.23e052e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.fb052e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304177777.00000000023E0000.00000040.00000001.sdmp, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected TrickbotShow sources
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.24a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.1260000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.23e052e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.fb052e.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.vXVHRRGG7c.exe.23e052e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.vXVHRRGG7c.exe.fb052e.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.304177777.00000000023E0000.00000040.00000001.sdmp, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsScripting1Application Shimming1Process Injection211Masquerading1Input Capture2System Time Discovery2Remote ServicesInput Capture2Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API11Boot or Logon Initialization ScriptsApplication Shimming1Disable or Modify Tools1LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection211NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol3Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonScripting1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncSystem Network Configuration Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemFile and Directory Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery124Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 490261 Sample: vXVHRRGG7c.exe Startdate: 25/09/2021 Architecture: WINDOWS Score: 100 35 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->35 37 Found malware configuration 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected Trickbot 2->41 7 vXVHRRGG7c.exe 2->7         started        10 cmd.exe 1 2->10         started        process3 signatures4 43 Writes to foreign memory regions 7->43 45 Allocates memory in foreign processes 7->45 12 wermgr.exe 4 7->12         started        17 cmd.exe 7->17         started        19 vXVHRRGG7c.exe 10->19         started        21 conhost.exe 10->21         started        process5 dnsIp6 29 179.42.137.102, 443, 49692, 49693 TelefonicadeArgentinaAR unknown 12->29 31 179.42.137.105, 443, 49704, 49705 TelefonicadeArgentinaAR unknown 12->31 33 9 other IPs or domains 12->33 27 C:\Users\user\AppData\...\vXVHRRGG7c.exe, PE32 12->27 dropped 47 May check the online IP address of the machine 12->47 49 Tries to detect virtualization through RDTSC time measurements 12->49 51 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 12->51 53 Multi AV Scanner detection for dropped file 19->53 55 Writes to foreign memory regions 19->55 57 Allocates memory in foreign processes 19->57 23 wermgr.exe 19->23         started        25 cmd.exe 19->25         started        file7 signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      vXVHRRGG7c.exe22%ReversingLabsWin32.Trojan.TrickBot

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe22%ReversingLabsWin32.Trojan.TrickBot

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.vXVHRRGG7c.exe.23e052e.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.vXVHRRGG7c.exe.24a0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.vXVHRRGG7c.exe.1260000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.vXVHRRGG7c.exe.fb052e.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      No Antivirus matches

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      icanhazip.com
                      104.18.7.156
                      truefalse
                        high
                        9.52.17.84.dnsbl-1.uceprotect.net
                        unknown
                        unknownfalse
                          unknown
                          9.52.17.84.zen.spamhaus.org
                          unknown
                          unknownfalse
                            high
                            9.52.17.84.cbl.abuseat.org
                            unknown
                            unknownfalse
                              high
                              9.52.17.84.b.barracudacentral.org
                              unknown
                              unknownfalse
                                high
                                9.52.17.84.spam.dnsbl.sorbs.net
                                unknown
                                unknownfalse
                                  high

                                  Contacted URLs

                                  NameMaliciousAntivirus DetectionReputation
                                  http://icanhazip.com/false
                                    high

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    179.42.137.102
                                    unknownunknown
                                    22927TelefonicadeArgentinaARtrue
                                    104.18.7.156
                                    icanhazip.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    179.42.137.105
                                    unknownunknown
                                    22927TelefonicadeArgentinaARtrue
                                    59.4.68.75
                                    unknownKorea Republic of
                                    4766KIXS-AS-KRKoreaTelecomKRtrue
                                    171.103.189.118
                                    unknownThailand
                                    7470TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHtrue

                                    Private

                                    IP
                                    192.168.2.1

                                    General Information

                                    Joe Sandbox Version:33.0.0 White Diamond
                                    Analysis ID:490261
                                    Start date:25.09.2021
                                    Start time:10:22:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 7m 54s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:vXVHRRGG7c.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:17
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@13/3@6/6
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 63.1% (good quality ratio 61.3%)
                                    • Quality average: 84.9%
                                    • Quality standard deviation: 24%
                                    HCA Information:
                                    • Successful, ratio: 74%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                    • TCP Packets have been reduced to 100
                                    • Excluded IPs from analysis (whitelisted): 209.197.3.8, 173.222.108.226, 173.222.108.210
                                    • Excluded domains from analysis (whitelisted): wu-shim.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, a767.dspw65.akamai.net, download.windowsupdate.com.edgesuite.net
                                    • Not all processes where analyzed, report is missing behavior information

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    10:23:01API Interceptor22x Sleep call for process: wermgr.exe modified
                                    10:23:38Task SchedulerRun new task: Browser Downloader for Windows3D path: C:\Users\user\AppData\Local\browDownload3D\cmd01.bat

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    179.42.137.102triage_dropped_file.dllGet hashmaliciousBrowse
                                      104.18.7.156EZOHPAvupB.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      rOz6omkS6Wba5EJ.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      pCdWi9AqhY.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      GP7V5TKo7I0VmTQ.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      Bank Details.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      TtkRZtP1Jq.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      Bank Details.docxGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      aZq3gco8Ab.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      wuH92YGkZk.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      3VFWIsGexy.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      tB94D01Kyl.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      v4oeJd6Cqv.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      GC6Vdq1xoX.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      QTL_000027401622208.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      3RQvR8bIfa.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      IMG_8035002078801.docGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      9BbTEjaJ8m.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      9088890000.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      A742.exeGet hashmaliciousBrowse
                                      • icanhazip.com/
                                      EDL_0412000145200.exeGet hashmaliciousBrowse
                                      • icanhazip.com/

                                      Domains

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      icanhazip.comEZOHPAvupB.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      Product_Specifications_Details_202330_RFQ.docx.docxGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      rOz6omkS6Wba5EJ.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      jHEJ28U6Aj.exeGet hashmaliciousBrowse
                                      • 104.18.6.156
                                      pCdWi9AqhY.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      GP7V5TKo7I0VmTQ.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      Bank Details.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      TtkRZtP1Jq.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      uP8CYt2gvb.exeGet hashmaliciousBrowse
                                      • 104.18.6.156
                                      nKHk75RJEi.exeGet hashmaliciousBrowse
                                      • 104.18.6.156
                                      Bank Details.docxGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      aZq3gco8Ab.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      DsGo26G94d.exeGet hashmaliciousBrowse
                                      • 104.18.6.156
                                      wuH92YGkZk.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      3VFWIsGexy.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      tB94D01Kyl.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      v4oeJd6Cqv.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      GC6Vdq1xoX.exeGet hashmaliciousBrowse
                                      • 104.18.6.156
                                      QTL_000027401622208.exeGet hashmaliciousBrowse
                                      • 104.18.7.156
                                      z5WnxHv7bg.exeGet hashmaliciousBrowse
                                      • 104.18.6.156

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      CLOUDFLARENETUSKqXA36ARxD.exeGet hashmaliciousBrowse
                                      • 104.21.95.21
                                      p7jfy1lZgI.exeGet hashmaliciousBrowse
                                      • 172.67.169.45
                                      RgproFrlyA.exeGet hashmaliciousBrowse
                                      • 172.67.212.186
                                      qUaCp2QNnD.exeGet hashmaliciousBrowse
                                      • 162.159.130.233
                                      XMae11M5ygGet hashmaliciousBrowse
                                      • 172.69.163.248
                                      D4DCAA41641BD14406B3FA2A1CEE1E97DE93329B9F901.exeGet hashmaliciousBrowse
                                      • 104.21.41.75
                                      bfHSvjklSWGet hashmaliciousBrowse
                                      • 198.41.197.73
                                      Dkvunfebdprvvugtyhevcozxmecjaaclna.exeGet hashmaliciousBrowse
                                      • 162.159.133.233
                                      Dkvunfebdprvvugtyhevcozxmecjaaclna.exeGet hashmaliciousBrowse
                                      • 162.159.134.233
                                      Hilix.x86Get hashmaliciousBrowse
                                      • 104.29.243.68
                                      Silver_Light_Group_DOC030273211220213.exeGet hashmaliciousBrowse
                                      • 162.159.135.233
                                      18vaq1Ah2lGet hashmaliciousBrowse
                                      • 104.31.160.209
                                      IC-230921 135838 ggo.htmGet hashmaliciousBrowse
                                      • 104.16.19.94
                                      3LNSjXtdQS.exeGet hashmaliciousBrowse
                                      • 172.67.162.27
                                      COURT-ORDER#S12GF803_zip.exeGet hashmaliciousBrowse
                                      • 23.227.38.74
                                      4qwvsVLRyN.exeGet hashmaliciousBrowse
                                      • 162.159.133.233
                                      Minehack3.1.exeGet hashmaliciousBrowse
                                      • 162.159.129.233
                                      DHL 03845435654.pdf.exeGet hashmaliciousBrowse
                                      • 162.159.135.233
                                      DHL Awb_ Docs 5544834610_pdf.exeGet hashmaliciousBrowse
                                      • 172.67.188.154
                                      file.exeGet hashmaliciousBrowse
                                      • 104.21.47.211
                                      TelefonicadeArgentinaARvLaqS0RiE0.exeGet hashmaliciousBrowse
                                      • 179.42.137.110
                                      ndx4U5fTTaGet hashmaliciousBrowse
                                      • 181.20.78.210
                                      rW182CWZHvGet hashmaliciousBrowse
                                      • 201.181.242.170
                                      XMae11M5ygGet hashmaliciousBrowse
                                      • 179.41.145.204
                                      LkypMws5yhGet hashmaliciousBrowse
                                      • 181.21.231.163
                                      ztXN1Pfp4G.exeGet hashmaliciousBrowse
                                      • 179.42.137.109
                                      shinto.x86Get hashmaliciousBrowse
                                      • 179.42.3.58
                                      EZOHPAvupB.exeGet hashmaliciousBrowse
                                      • 179.42.137.107
                                      ydUqILF7lK.exeGet hashmaliciousBrowse
                                      • 179.42.137.108
                                      ydUqILF7lK.exeGet hashmaliciousBrowse
                                      • 179.42.137.107
                                      52uSca10l1.exeGet hashmaliciousBrowse
                                      • 179.42.137.106
                                      GVlpP9RL5tGet hashmaliciousBrowse
                                      • 186.132.129.176
                                      jKira.x86Get hashmaliciousBrowse
                                      • 190.176.115.106
                                      jKira.armGet hashmaliciousBrowse
                                      • 190.176.94.237
                                      mirai.armGet hashmaliciousBrowse
                                      • 190.175.168.186
                                      XyMjGu74RXGet hashmaliciousBrowse
                                      • 186.63.134.210
                                      b3astmode.x86Get hashmaliciousBrowse
                                      • 190.48.196.82
                                      b3astmode.arm7Get hashmaliciousBrowse
                                      • 186.131.140.192
                                      b3astmode.armGet hashmaliciousBrowse
                                      • 190.175.143.215
                                      ii1tf3xFJ1Get hashmaliciousBrowse
                                      • 179.42.113.208

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\Users\user\AppData\Local\browDownload3D\cmd01.bat
                                      Process:C:\Windows\System32\wermgr.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1204
                                      Entropy (8bit):4.291933112891695
                                      Encrypted:false
                                      SSDEEP:24:aEAlQS4pfPEwdw2FXipgMzD/97G3E4tV/+tBaBy:0l4pf8xIXiT9oE4t5YBl
                                      MD5:D2B6BA2379B3DBCC6F757D92D20C3E47
                                      SHA1:6584EB2FFC0C3308021BF6BE7C395DC8D22F0A4C
                                      SHA-256:09D14E5C54A44526E36E78A9BD97A5BD4F460578523DF6B824D160EB188BA781
                                      SHA-512:ABA8AFCE4DCF0DDC0CE07B57F521063747B38F3BC7692A020DD10E227D12286B1701ACB45CD91397DF79FFB56E34D0885D0902968C4ECADDF013D21BF8AA5E8E
                                      Malicious:false
                                      Reputation:low
                                      Preview: set irml=set..%irml% epceq= ..%irml%%epceq%epiva==..%irml%%epceq%qvnl%epiva%own..%irml%%epceq%frvp%epiva%r..%irml%%epceq%uovekb%epiva%c..%irml%%epceq%ubixnl%epiva%exe..%irml%%epceq%kumkbx%epiva%HRR..%irml%%epceq%dppcdc%epiva%tar..%irml%%epceq%dnuqid%epiva%d3..%irml%%epceq%pvjhbj%epiva%Loc..%irml%%epceq%uodh%epiva%C..%irml%%epceq%luafbs%epiva%\..%irml%%epceq%ktgdh%epiva%rd..%irml%%epceq%gvsjad%epiva%z..%irml%%epceq%fylvab%epiva%owD..%irml%%epceq%socvxl%epiva%D..%irml%%epceq%qqwrtb%epiva%b..%irml%%epceq%aaymq%epiva%G7..%irml%%epceq%lshlj%epiva%p..%irml%%epceq%obec%epiva%Us..%irml%%epceq%qhsete%epiva%ata..%irml%%epceq%kekdbx%epiva%Ap..%irml%%epceq%vsem%epiva%loa..%irml%%epceq%drtmim%epiva%s..%irml%%epceq%cfjl%epiva%:..%irml%%epceq%ehhp%epiva%ha..%irml%%epceq%kplf%epiva%ers..%irml%%epceq%xfjrim%epiva%vXV..%irml%%epceq%abosow%epiva%G..%irml%%epceq%poiosr%epiva%...%irml%%epceq%lbqmm%epiva%t..%irml%%epceq%ixmxcv%epiva%al..%drtmim%%dppcdc%%lbqmm%%epceq%%uodh%%cfjl%%luafbs%%obec%%kplf%%luafbs%%
                                      C:\Users\user\AppData\Local\browDownload3D\settings.ini
                                      Process:C:\Windows\System32\wermgr.exe
                                      File Type:ASCII text, with very long lines, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):10233
                                      Entropy (8bit):5.10582120432788
                                      Encrypted:false
                                      SSDEEP:192:DdBYKtc+6GXBMGHbQNw5vfbG6RCFUzBT6N0HDFeCKE4M:DdBYCVQhGzd6ujrKLM
                                      MD5:5775E804AA3B7F597C3D9429B8A5B28C
                                      SHA1:807E2E18366E0F4E7891A21475303B02D28F6901
                                      SHA-256:DA06E0B6863552469522446B05BFA91AFB9A7F683CE44C83B849D3EDC355E08D
                                      SHA-512:7CE3D1697DD723EE28F38F9625AF1DD0BC72C51F7D71F801CC8C7701C82B856497DD6F660ED80D5D616C0C6667113EA5E3A764ED1423CE027FFA6ED79CA678A7
                                      Malicious:false
                                      Reputation:low
                                      Preview: [seqygcmamoqsag]..yomyuog=s ww pysii..okowickwwwe=fs cmc gs cywek..hyysmcocy mmg=ggk wysw qqekwcsk o uuam nsyw ogu fo aqeeuk mm ywyiy yuecu iocuksg ii..nouseai=sy ugeq gqcskig caqqi nsosai o vi maec p iyc wq..icsakqqowwecg=eg sy i qou s cuou coaim aiysys b ..cc =kauacsg eg sgsm xe o qg a..ti =sw wmga uuc c pwueie wacqwi wmcyeuy qkegmsg a giu iycu bwkcug ymc eam..mauqc=ikkwys cogsw sowmi ck gaysc yu iomq dca kgakqw wo oy wq cqmw i puamk gy..cyikc=pwamueus cmqawo aw..[bgkocw]..scskmssykcm=o rsaim sgkkim siokcuo s lgwgk kggq l l ck eouug yq ws kq yo y..ieska=kukgkose..gec oiays puu=scaoi hk f yse sgw ogiyso yo..oa vkskke=ycsi qa vkyg ss as pi kkmewyua yakaeko..uugceqm msg=dcu dayi sou w jkc p ikqqkiic ykksq o cukqey auikk geasio..l w=ragema xygmceq uwo wqiwy kui ie fue oqa yuwa t..oei=humyeqso..mugc v f =pu cymw ysysmq ui k ko woe aey oamwe a oogekusk ecgccu aewwsy..mcycsyi=fecguu..kkoses roye=ekgiio a bsusa oy yk cwa im wuwi..cwouuicgu=qkgymggy..josicqw=aswwiu ick qw
                                      C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                                      Process:C:\Windows\System32\wermgr.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):528443
                                      Entropy (8bit):7.022615303042581
                                      Encrypted:false
                                      SSDEEP:12288:cbVMh0tRyr3W3SZniM+uwkMx8nXoTT0WJZmo:WMh0tRy53lY8X2xJZmo
                                      MD5:051C20FD814AC34FFCFADD56EC872BE0
                                      SHA1:6D4D301594BA01B9E4D8EAC59DC839090F090FDF
                                      SHA-256:7AA215495949E721B9AE8B3B28CB728AC3B3240438E67F2CC4F3BE2711D3D319
                                      SHA-512:9A0F400CED3CEA1B366862AB4DDDE79D8C50D2D93AF5ABF9681207ACD5BD7D9652CCA8F213FA0FE26B7FC78184110256723D47287B8A7AA4E69B8F3CAF7D5025
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 22%
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........yq..."..."..."..."..."..."..."..."2..";.."..."P.."..."..."..."P.."..."Rich..."........................PE..L...}..`.................`...........W.......p....@..........................P..............................................`........P..............................Pv...............................................p..L............................text....S.......`.................. ..`.rdata...y...p.......p..............@..@.data....P....... ..................@....rsrc........P......................@..@........................................................................................................................................................................................................................................................................................................................................................................

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.022615303042581
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.83%
                                      • Windows Screen Saver (13104/52) 0.13%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:vXVHRRGG7c.exe
                                      File size:528443
                                      MD5:051c20fd814ac34ffcfadd56ec872be0
                                      SHA1:6d4d301594ba01b9e4d8eac59dc839090f090fdf
                                      SHA256:7aa215495949e721b9ae8b3b28cb728ac3b3240438e67f2cc4f3be2711d3d319
                                      SHA512:9a0f400ced3cea1b366862ab4ddde79d8c50d2d93af5abf9681207acd5bd7d9652cca8f213fa0fe26b7fc78184110256723d47287b8a7aa4e69b8f3caf7d5025
                                      SSDEEP:12288:cbVMh0tRyr3W3SZniM+uwkMx8nXoTT0WJZmo:WMh0tRy53lY8X2xJZmo
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........yq..."..."..."..."..."..."..."..."2..";.."..."P.."..."..."..."P.."..."Rich..."........................PE..L...}..`...........

                                      File Icon

                                      Icon Hash:71b018ccc6577131

                                      Static PE Info

                                      General

                                      Entrypoint:0x4057bd
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                      DLL Characteristics:
                                      Time Stamp:0x60E4CA7D [Tue Jul 6 21:26:21 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:675872e23dfc0f62ffbc2f69c316f4bc

                                      Entrypoint Preview

                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      push FFFFFFFFh
                                      push 00429598h
                                      push 0040B324h
                                      mov eax, dword ptr fs:[00000000h]
                                      push eax
                                      mov dword ptr fs:[00000000h], esp
                                      sub esp, 58h
                                      push ebx
                                      push esi
                                      push edi
                                      mov dword ptr [ebp-18h], esp
                                      call dword ptr [0042735Ch]
                                      xor edx, edx
                                      mov dl, ah
                                      mov dword ptr [00432E94h], edx
                                      mov ecx, eax
                                      and ecx, 000000FFh
                                      mov dword ptr [00432E90h], ecx
                                      shl ecx, 08h
                                      add ecx, edx
                                      mov dword ptr [00432E8Ch], ecx
                                      shr eax, 10h
                                      mov dword ptr [00432E88h], eax
                                      push 00000001h
                                      call 00007F21ACCEBA94h
                                      pop ecx
                                      test eax, eax
                                      jne 00007F21ACCE786Ah
                                      push 0000001Ch
                                      call 00007F21ACCE7928h
                                      pop ecx
                                      call 00007F21ACCEA974h
                                      test eax, eax
                                      jne 00007F21ACCE786Ah
                                      push 00000010h
                                      call 00007F21ACCE7917h
                                      pop ecx
                                      xor esi, esi
                                      mov dword ptr [ebp-04h], esi
                                      call 00007F21ACCED12Eh
                                      call dword ptr [0042717Ch]
                                      mov dword ptr [004335B8h], eax
                                      call 00007F21ACCECFECh
                                      mov dword ptr [00432E78h], eax
                                      call 00007F21ACCECD95h
                                      call 00007F21ACCECCD7h
                                      call 00007F21ACCE81A5h
                                      mov dword ptr [ebp-30h], esi
                                      lea eax, dword ptr [ebp-5Ch]
                                      push eax
                                      call dword ptr [00427178h]
                                      call 00007F21ACCECC68h
                                      mov dword ptr [ebp-64h], eax
                                      test byte ptr [ebp-30h], 00000001h
                                      je 00007F21ACCE7868h
                                      movzx eax, word ptr [ebp+00h]

                                      Rich Headers

                                      Programming Language:
                                      • [ C ] VS98 (6.0) build 8168
                                      • [C++] VS98 (6.0) build 8168
                                      • [RES] VS98 (6.0) cvtres build 1720

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2c8600xb4.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x350000x4f6e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x276500x1c.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x270000x64c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x253a60x26000False0.545088918586data6.48403042151IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rdata0x270000x79ee0x8000False0.326416015625data4.81513775397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x2f0000x50e80x2000False0.391357421875data4.59613450041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                      .rsrc0x350000x4f6e80x50000False0.779440307617data7.23576523208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_CURSOR0x356580x134dataEnglishUnited States
                                      RT_CURSOR0x3578c0xb4dataEnglishUnited States
                                      RT_BITMAP0x358400x5e4dataEnglishUnited States
                                      RT_BITMAP0x35e240xb8dataEnglishUnited States
                                      RT_BITMAP0x35edc0x16cdataEnglishUnited States
                                      RT_BITMAP0x360480x144dataEnglishUnited States
                                      RT_ICON0x3618c0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676EnglishUnited States
                                      RT_ICON0x364740x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                                      RT_ICON0x3659c0x10828dBase III DBT, version number 0, next free block index 40
                                      RT_DIALOG0x46dc40x122dataEnglishUnited States
                                      RT_DIALOG0x46ee80xd4dataEnglishUnited States
                                      RT_DIALOG0x46fbc0xe8dataEnglishUnited States
                                      RT_STRING0x470a40x4edataEnglishUnited States
                                      RT_STRING0x470f40x82dataEnglishUnited States
                                      RT_STRING0x471780x2adataEnglishUnited States
                                      RT_STRING0x471a40x14adataEnglishUnited States
                                      RT_STRING0x472f00x4e2dataEnglishUnited States
                                      RT_STRING0x477d40x2a2dataEnglishUnited States
                                      RT_STRING0x47a780x2dcdataEnglishUnited States
                                      RT_STRING0x47d540xacdataEnglishUnited States
                                      RT_STRING0x47e000xdedataEnglishUnited States
                                      RT_STRING0x47ee00x4c4dataEnglishUnited States
                                      RT_STRING0x483a40x264dataEnglishUnited States
                                      RT_STRING0x486080x2cdataEnglishUnited States
                                      RT_GROUP_CURSOR0x486340x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                                      RT_GROUP_ICON0x486580x22dataEnglishUnited States
                                      RT_GROUP_ICON0x4867c0x14data
                                      RT_VERSION0x486900x324dataEnglishUnited States
                                      RT_HTML0x489b40x3bd33dataEnglishUnited States

                                      Imports

                                      DLLImport
                                      KERNEL32.dllGetFileTime, LocalFileTimeToFileTime, SystemTimeToFileTime, SetFileTime, SetFileAttributesA, RtlUnwind, HeapAlloc, GetStartupInfoA, GetCommandLineA, RaiseException, HeapFree, TerminateProcess, CreateThread, ExitThread, GetTimeZoneInformation, GetSystemTime, GetLocalTime, GetACP, HeapSize, HeapReAlloc, FatalAppExitA, Sleep, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, IsBadWritePtr, GetFileSize, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, SetUnhandledExceptionFilter, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, IsBadReadPtr, IsBadCodePtr, IsValidLocale, IsValidCodePage, GetLocaleInfoA, EnumSystemLocalesA, GetUserDefaultLCID, GetVersionExA, SetConsoleCtrlHandler, GetLocaleInfoW, CompareStringA, CompareStringW, SetEnvironmentVariableA, GetFileAttributesA, GetShortPathNameA, GetProfileStringA, GetThreadLocale, GetStringTypeExA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, DeleteFileA, MoveFileA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, CreateFileA, GetCurrentProcess, DuplicateHandle, SetErrorMode, SizeofResource, GetCurrentDirectoryA, WritePrivateProfileStringA, GetPrivateProfileStringA, GetPrivateProfileIntA, GetOEMCP, GetCPInfo, GetProcessVersion, GlobalFlags, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, GlobalReAlloc, LeaveCriticalSection, TlsFree, GlobalHandle, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalFree, LocalAlloc, lstrcpynA, GetLastError, FileTimeToLocalFileTime, FileTimeToSystemTime, GlobalFree, CreateEventA, SuspendThread, SetThreadPriority, ResumeThread, SetEvent, WaitForSingleObject, CloseHandle, GetModuleFileNameA, GlobalAlloc, lstrcmpA, GetCurrentThread, ExitProcess, MultiByteToWideChar, WideCharToMultiByte, lstrlenA, InterlockedDecrement, InterlockedIncrement, GlobalLock, GlobalUnlock, MulDiv, SetLastError, LoadLibraryA, FreeLibrary, FindResourceA, LoadResource, LockResource, GetVersion, lstrcatA, GetCurrentThreadId, GlobalGetAtomNameA, lstrcmpiA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, lstrcpyA, GetModuleHandleA, GetProcAddress, LoadLibraryW, UnhandledExceptionFilter
                                      USER32.dllScrollWindowEx, IsDialogMessageA, SetWindowTextA, MoveWindow, ShowWindow, IsWindowEnabled, GetNextDlgTabItem, EnableMenuItem, CheckMenuItem, SetMenuItemBitmaps, ModifyMenuA, GetMenuState, LoadBitmapA, GetMenuCheckMarkDimensions, ClientToScreen, GetDC, ReleaseDC, GetWindowDC, BeginPaint, EndPaint, TabbedTextOutA, DrawTextA, GrayStringA, CharToOemA, OemToCharA, PostQuitMessage, ShowOwnedPopups, SetCursor, GetCursorPos, ValidateRect, GetActiveWindow, TranslateMessage, GetMessageA, CreateDialogIndirectParamA, EndDialog, LoadStringA, DestroyMenu, GetClassNameA, PtInRect, GetDesktopWindow, LoadCursorA, GetSysColorBrush, SetCapture, ReleaseCapture, WaitMessage, GetWindowThreadProcessId, WindowFromPoint, InsertMenuA, DeleteMenu, GetMenuStringA, GetDialogBaseUnits, SetRectEmpty, LoadAcceleratorsA, TranslateAcceleratorA, LoadMenuA, SetMenu, ReuseDDElParam, UnpackDDElParam, BringWindowToTop, CharUpperA, CheckRadioButton, CheckDlgButton, PostMessageA, UpdateWindow, SendDlgItemMessageA, MapWindowPoints, GetSysColor, PeekMessageA, DispatchMessageA, GetFocus, SetActiveWindow, IsWindow, SetFocus, IsDlgButtonChecked, ScreenToClient, EqualRect, DeferWindowPos, BeginDeferWindowPos, CopyRect, EndDeferWindowPos, IsWindowVisible, ScrollWindow, GetScrollInfo, SetScrollInfo, ShowScrollBar, GetScrollRange, SetScrollRange, SetScrollPos, GetTopWindow, MessageBoxA, IsChild, GetParent, GetCapture, WinHelpA, wsprintfA, GetClassInfoA, RegisterClassA, GetMenu, GetMenuItemCount, GetSubMenu, GetMenuItemID, TrackPopupMenu, SetWindowPlacement, GetDlgItem, GetWindowTextLengthA, GetWindowTextA, GetDlgCtrlID, GetKeyState, DefWindowProcA, DestroyWindow, CreateWindowExA, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, CallWindowProcA, RemovePropA, GetMessageTime, GetMessagePos, GetLastActivePopup, GetForegroundWindow, SetForegroundWindow, GetWindow, GetWindowLongA, SetWindowLongA, SetWindowPos, RegisterWindowMessageA, OffsetRect, IntersectRect, SystemParametersInfoA, GetWindowPlacement, EnableWindow, FillRect, UnregisterClassA, HideCaret, ShowCaret, ExcludeUpdateRgn, KillTimer, SetTimer, IsIconic, DrawIcon, GetSystemMetrics, SendMessageA, GetWindowRect, GetSystemMenu, AppendMenuA, SetDlgItemTextA, SetDlgItemInt, GetDlgItemTextA, AdjustWindowRectEx, GetDlgItemInt, LoadIconA, InvalidateRect, GetClientRect, IsWindowUnicode, CharNextA, InflateRect, DefDlgProcA, DrawFocusRect, GetScrollPos
                                      GDI32.dllStartDocA, SaveDC, RestoreDC, GetStockObject, SelectPalette, SetBkMode, SetPolyFillMode, SetROP2, SetStretchBltMode, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, OffsetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, SelectClipRgn, ExcludeClipRect, IntersectClipRect, OffsetClipRgn, MoveToEx, LineTo, SetTextAlign, SetTextJustification, SetTextCharacterExtra, SetMapperFlags, GetCurrentPositionEx, ArcTo, DeleteDC, PolyDraw, PolylineTo, SetColorAdjustment, PolyBezierTo, DeleteObject, GetClipRgn, CreateRectRgn, SelectClipPath, ExtSelectClipRgn, PlayMetaFileRecord, GetObjectType, EnumMetaFile, PlayMetaFile, GetDeviceCaps, GetViewportExtEx, GetWindowExtEx, CreatePen, ExtCreatePen, CreateSolidBrush, CreateHatchBrush, CreatePatternBrush, CreateDIBPatternBrushPt, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, GetTextExtentPoint32A, GetTextMetricsA, CreateFontIndirectA, CreateBitmap, GetObjectA, SetBkColor, SetTextColor, GetClipBox, GetDCOrgEx, BitBlt, SelectObject, CreateCompatibleDC, SetArcDirection, CreateDIBitmap, PatBlt, GetTextExtentPointA, CreateCompatibleBitmap
                                      comdlg32.dllGetFileTitleA
                                      WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                      ADVAPI32.dllRegSetValueExA, RegOpenKeyA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegQueryValueExA, RegOpenKeyExA, RegCreateKeyExA
                                      SHELL32.dllDragQueryFileA, DragFinish, DragAcceptFiles, SHGetFileInfoA
                                      COMCTL32.dll

                                      Version Infos

                                      DescriptionData
                                      LegalCopyrightCopyright (C) 1998
                                      InternalNameHistogramTest
                                      FileVersion1, 0, 0, 1
                                      CompanyName
                                      LegalTrademarks
                                      ProductNameHistogramTest Application
                                      ProductVersion1, 0, 0, 1
                                      FileDescriptionHistogramTest MFC Application
                                      OriginalFilenameHistogramTest.EXE
                                      Translation0x0409 0x04b0

                                      Possible Origin

                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States

                                      Network Behavior

                                      Snort IDS Alerts

                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      09/25/21-10:23:39.069395TCP2404342ET CNC Feodo Tracker Reported CnC Server TCP group 2249719443192.168.2.359.4.68.75

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2021 10:23:13.311970949 CEST49692443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.312025070 CEST44349692179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.316478014 CEST49692443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.316531897 CEST49692443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.316545963 CEST44349692179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.570955038 CEST44349692179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.574572086 CEST49693443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.574620008 CEST44349693179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.575813055 CEST49693443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.575860023 CEST49693443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.575870037 CEST44349693179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.842649937 CEST44349693179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.844172955 CEST49694443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.844224930 CEST44349694179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:13.844322920 CEST49694443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.844717979 CEST49694443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:13.844731092 CEST44349694179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:14.108721018 CEST44349694179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:14.109443903 CEST49695443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:14.109483957 CEST44349695179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:14.109587908 CEST49695443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:14.109955072 CEST49695443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:14.109963894 CEST44349695179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:14.376431942 CEST44349695179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:15.497716904 CEST49696443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.497771025 CEST44349696179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:15.498311043 CEST49696443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.498637915 CEST49696443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.498647928 CEST44349696179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:15.757308006 CEST44349696179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:15.764159918 CEST49697443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.764209032 CEST44349697179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:15.764631987 CEST49697443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.765014887 CEST49697443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:15.765041113 CEST44349697179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.006421089 CEST44349697179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.007174969 CEST49698443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.007220984 CEST44349698179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.007375002 CEST49698443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.007738113 CEST49698443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.007754087 CEST44349698179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.250520945 CEST44349698179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.251543999 CEST49699443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.251600027 CEST44349699179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.251750946 CEST49699443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.252233028 CEST49699443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:16.252249956 CEST44349699179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:16.500025034 CEST44349699179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:17.616784096 CEST49700443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.616837025 CEST44349700179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:17.617008924 CEST49700443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.617356062 CEST49700443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.617412090 CEST44349700179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:17.859669924 CEST44349700179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:17.860596895 CEST49701443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.860649109 CEST44349701179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:17.861166000 CEST49701443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.861377954 CEST49701443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:17.861401081 CEST44349701179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.106950045 CEST44349701179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.107912064 CEST49702443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.107961893 CEST44349702179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.108083010 CEST49702443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.108447075 CEST49702443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.108460903 CEST44349702179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.355218887 CEST44349702179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.357355118 CEST49703443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.357395887 CEST44349703179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.358671904 CEST49703443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.358710051 CEST49703443192.168.2.3179.42.137.102
                                      Sep 25, 2021 10:23:18.358719110 CEST44349703179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:18.606065035 CEST44349703179.42.137.102192.168.2.3
                                      Sep 25, 2021 10:23:20.337102890 CEST49704443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.337148905 CEST44349704179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.337270975 CEST49704443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.337703943 CEST49704443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.337718964 CEST44349704179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.592924118 CEST44349704179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.593749046 CEST49705443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.593800068 CEST44349705179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.593926907 CEST49705443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.594424963 CEST49705443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.594439983 CEST44349705179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.836878061 CEST44349705179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.840282917 CEST49706443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.840333939 CEST44349706179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:20.840440035 CEST49706443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.841284037 CEST49706443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:20.841300011 CEST44349706179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:21.084714890 CEST44349706179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:21.085608006 CEST49707443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:21.085661888 CEST44349707179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:21.085772991 CEST49707443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:21.086509943 CEST49707443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:21.086527109 CEST44349707179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:21.332976103 CEST44349707179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:22.445704937 CEST49708443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:22.445764065 CEST44349708179.42.137.105192.168.2.3
                                      Sep 25, 2021 10:23:22.445879936 CEST49708443192.168.2.3179.42.137.105
                                      Sep 25, 2021 10:23:22.446147919 CEST49708443192.168.2.3179.42.137.105

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2021 10:23:30.876858950 CEST5120953192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:30.899730921 CEST53512098.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:33.487632036 CEST4953953192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:33.513423920 CEST53495398.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:33.516525984 CEST5755853192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:33.538508892 CEST53575588.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:33.543143988 CEST5318753192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:33.664612055 CEST53531878.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:33.667074919 CEST5860453192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:33.690701962 CEST53586048.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:33.693366051 CEST5166853192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:33.735809088 CEST53516688.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:39.725044966 CEST5220653192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:39.744283915 CEST53522068.8.8.8192.168.2.3
                                      Sep 25, 2021 10:23:39.854254007 CEST5684453192.168.2.38.8.8.8
                                      Sep 25, 2021 10:23:39.877835989 CEST53568448.8.8.8192.168.2.3

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Sep 25, 2021 10:23:30.876858950 CEST192.168.2.38.8.8.80x1704Standard query (0)icanhazip.comA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.487632036 CEST192.168.2.38.8.8.80xc43eStandard query (0)9.52.17.84.zen.spamhaus.orgA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.516525984 CEST192.168.2.38.8.8.80xe690Standard query (0)9.52.17.84.cbl.abuseat.orgA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.543143988 CEST192.168.2.38.8.8.80x6130Standard query (0)9.52.17.84.b.barracudacentral.orgA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.667074919 CEST192.168.2.38.8.8.80xf9a5Standard query (0)9.52.17.84.dnsbl-1.uceprotect.netA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.693366051 CEST192.168.2.38.8.8.80x815fStandard query (0)9.52.17.84.spam.dnsbl.sorbs.netA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Sep 25, 2021 10:23:30.899730921 CEST8.8.8.8192.168.2.30x1704No error (0)icanhazip.com104.18.7.156A (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:30.899730921 CEST8.8.8.8192.168.2.30x1704No error (0)icanhazip.com104.18.6.156A (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.513423920 CEST8.8.8.8192.168.2.30xc43eName error (3)9.52.17.84.zen.spamhaus.orgnonenoneA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.538508892 CEST8.8.8.8192.168.2.30xe690Name error (3)9.52.17.84.cbl.abuseat.orgnonenoneA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.664612055 CEST8.8.8.8192.168.2.30x6130Name error (3)9.52.17.84.b.barracudacentral.orgnonenoneA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.690701962 CEST8.8.8.8192.168.2.30xf9a5Name error (3)9.52.17.84.dnsbl-1.uceprotect.netnonenoneA (IP address)IN (0x0001)
                                      Sep 25, 2021 10:23:33.735809088 CEST8.8.8.8192.168.2.30x815fName error (3)9.52.17.84.spam.dnsbl.sorbs.netnonenoneA (IP address)IN (0x0001)

                                      HTTP Request Dependency Graph

                                      • icanhazip.com

                                      HTTP Packets

                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.349717104.18.7.15680C:\Windows\System32\wermgr.exe
                                      TimestampkBytes transferredDirectionData
                                      Sep 25, 2021 10:23:30.921077967 CEST14OUTGET / HTTP/1.1
                                      Connection: Keep-Alive
                                      User-Agent: curl/7.76.0
                                      Host: icanhazip.com
                                      Sep 25, 2021 10:23:30.943857908 CEST15INHTTP/1.1 200 OK
                                      Date: Sat, 25 Sep 2021 08:23:30 GMT
                                      Content-Type: text/plain
                                      Content-Length: 11
                                      Connection: keep-alive
                                      Access-Control-Allow-Origin: *
                                      Access-Control-Allow-Methods: GET
                                      Set-Cookie: __cf_bm=YnuhHc5obdx6JSfdiUyIiKOHJ9bmCLxvJKkUWr0hBbo-1632558210-0-AWnxvEVQ+dgSA2VpCJroUN0rMjzXW9aG4cCXfqI9Unu9bvJ/EEi8uEXIW0kmM0F8BtJH3m6a4E1nd2TzFl9A4/Q=; path=/; expires=Sat, 25-Sep-21 08:53:30 GMT; domain=.icanhazip.com; HttpOnly; SameSite=None
                                      Server: cloudflare
                                      CF-RAY: 6942d9d24c454e8b-FRA
                                      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                      Data Raw: 38 34 2e 31 37 2e 35 32 2e 39 0a
                                      Data Ascii: 84.17.52.9


                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:10:22:54
                                      Start date:25/09/2021
                                      Path:C:\Users\user\Desktop\vXVHRRGG7c.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\vXVHRRGG7c.exe'
                                      Imagebase:0x400000
                                      File size:528443 bytes
                                      MD5 hash:051C20FD814AC34FFCFADD56EC872BE0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000001.00000002.304517846.0000000002464000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000001.00000002.304704482.00000000024A1000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000001.00000002.304177777.00000000023E0000.00000040.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:10:22:56
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\wermgr.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\wermgr.exe
                                      Imagebase:0x7ff7ee4c0000
                                      File size:209312 bytes
                                      MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:10:22:57
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe
                                      Imagebase:0x7ff6fb440000
                                      File size:273920 bytes
                                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:10:23:38
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\SYSTEM32\cmd.exe /c 'C:\Users\user\AppData\Local\browDownload3D\cmd01.bat'
                                      Imagebase:0x7ff6fb440000
                                      File size:273920 bytes
                                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:10:23:39
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7f20f0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:10:23:39
                                      Start date:25/09/2021
                                      Path:C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Local\browDownload3D\vXVHRRGG7c.exe
                                      Imagebase:0x400000
                                      File size:528443 bytes
                                      MD5 hash:051C20FD814AC34FFCFADD56EC872BE0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 0000000A.00000002.400799901.0000000000FF4000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 0000000A.00000002.400763097.0000000000FB0000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 0000000A.00000002.400850600.0000000001261000.00000040.00000001.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 22%, ReversingLabs
                                      Reputation:low

                                      General

                                      Start time:10:23:41
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\wermgr.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\wermgr.exe
                                      Imagebase:0x7ff7ee4c0000
                                      File size:209312 bytes
                                      MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:10:23:42
                                      Start date:25/09/2021
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe
                                      Imagebase:0x7ff6fb440000
                                      File size:273920 bytes
                                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Disassembly

                                      Code Analysis

                                      Reset < >