Loading ...

Play interactive tourEdit tour

Windows Analysis Report sFau6gAKEk.exe

Overview

General Information

Sample Name:sFau6gAKEk.exe
Analysis ID:491718
MD5:3441a429a71ac1ad6e910efdd06cacd3
SHA1:d4f2ab9a718b2da7c4b1d1863dbc6a83b3e29264
SHA256:d3763d5c2317a279fc6ffce59700fb96f10570178d81c01a912db7b17811798c
Tags:exenjratRAT
Infos:

Most interesting Screenshot:

Detection

Njrat
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Njrat
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to retrieve information about pressed keystrokes
Enables debug privileges

Classification

Process Tree

  • System is w10x64
  • sFau6gAKEk.exe (PID: 5200 cmdline: 'C:\Users\user\Desktop\sFau6gAKEk.exe' MD5: 3441A429A71AC1AD6E910EFDD06CACD3)
  • cleanup

Malware Configuration

Threatname: Njrat

{"Host": "strigoo.duckdns.org", "Port": "9889", "Mutex Name": "aed1603e66c64f9fafe", "Network Seprator": "@!#&^%$", "Campaign ID": "NYAN CAT", "Version": "0.7NC"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: sFau6gAKEk.exe PID: 5200JoeSecurity_NjratYara detected NjratJoe Security

    Sigma Overview

    No Sigma rule has matched

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 0.2.sFau6gAKEk.exe.1850000.1.raw.unpackMalware Configuration Extractor: Njrat {"Host": "strigoo.duckdns.org", "Port": "9889", "Mutex Name": "aed1603e66c64f9fafe", "Network Seprator": "@!#&^%$", "Campaign ID": "NYAN CAT", "Version": "0.7NC"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: sFau6gAKEk.exeVirustotal: Detection: 50%Perma Link
    Source: sFau6gAKEk.exeReversingLabs: Detection: 33%
    Yara detected NjratShow sources
    Source: Yara matchFile source: Process Memory Space: sFau6gAKEk.exe PID: 5200, type: MEMORYSTR
    Source: sFau6gAKEk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\user\source\repos\pump1000\pump1000\obj\Debug\pump1000.pdb source: sFau6gAKEk.exe, 00000000.00000002.515359849.000000001CA19000.00000004.00020000.sdmp

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49748 -> 181.141.1.250:9889
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: strigoo.duckdns.org
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: strigoo.duckdns.org
    Source: global trafficTCP traffic: 192.168.2.5:49748 -> 181.141.1.250:9889
    Source: Joe Sandbox ViewASN Name: EPMTelecomunicacionesSAESPCO EPMTelecomunicacionesSAESPCO
    Source: sFau6gAKEk.exe, 00000000.00000002.513438487.0000000003D92000.00000004.00000001.sdmpString found in binary or memory: https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com
    Source: sFau6gAKEk.exe, 00000000.00000002.513438487.0000000003D92000.00000004.00000001.sdmpString found in binary or memory: https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com(
    Source: unknownDNS traffic detected: queries for: strigoo.duckdns.org
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B9E4A GetAsyncKeyState,

    E-Banking Fraud:

    barindex
    Yara detected NjratShow sources
    Source: Yara matchFile source: Process Memory Space: sFau6gAKEk.exe PID: 5200, type: MEMORYSTR
    Source: sFau6gAKEk.exeStatic PE information: No import functions for PE file found
    Source: sFau6gAKEk.exe, 00000000.00000002.511842194.000000000176A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exe, 00000000.00000002.515359849.000000001CA19000.00000004.00020000.sdmpBinary or memory string: OriginalFilenamepump1000.exe2 vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exe, 00000000.00000002.515359849.000000001CA19000.00000004.00020000.sdmpBinary or memory string: OriginalFilenametiny_runpe.dll6 vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exe, 00000000.00000002.515359849.000000001CA19000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSxLYSyDf.exe4 vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exe, 00000000.00000002.513438487.0000000003D92000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClient9889.exe4 vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exe, 00000000.00000002.511405225.0000000000F06000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametlaqBuoRv.exe, vs sFau6gAKEk.exe
    Source: sFau6gAKEk.exeBinary or memory string: OriginalFilenametlaqBuoRv.exe, vs sFau6gAKEk.exe
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167BAB6A
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167BA43E
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167BE816
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167BF5C2
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B1447
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B149F
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B2A8A
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B29FD
    Source: sFau6gAKEk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: sFau6gAKEk.exeVirustotal: Detection: 50%
    Source: sFau6gAKEk.exeReversingLabs: Detection: 33%
    Source: sFau6gAKEk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeMutant created: \Sessions\1\BaseNamedObjects\aed1603e66c64f9fafe
    Source: classification engineClassification label: mal80.troj.winEXE@1/0@1/1
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
    Source: sFau6gAKEk.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: sFau6gAKEk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: sFau6gAKEk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\user\source\repos\pump1000\pump1000\obj\Debug\pump1000.pdb source: sFau6gAKEk.exe, 00000000.00000002.515359849.000000001CA19000.00000004.00020000.sdmp
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B3271 push ds; retf
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeCode function: 0_2_00007FFA167B31DB push edi; retf
    Source: initial sampleStatic PE information: section name: .text entropy: 7.61141443582
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeWindow / User API: threadDelayed 6931
    Source: C:\Users\user\Desktop\sFau6gAKEk.exe TID: 3976Thread sleep count: 78 > 30
    Source: C:\Users\user\Desktop\sFau6gAKEk.exe TID: 3976Thread sleep time: -78000s >= -30000s
    Source: C:\Users\user\Desktop\sFau6gAKEk.exe TID: 5116Thread sleep count: 6931 > 30
    Source: C:\Users\user\Desktop\sFau6gAKEk.exe TID: 6132Thread sleep count: 31 > 30
    Source: C:\Users\user\Desktop\sFau6gAKEk.exe TID: 6132Thread sleep time: -31000s >= -30000s
    Source: sFau6gAKEk.exe, 00000000.00000002.515527260.000000001DB71000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeMemory allocated: page read and write | page guard
    Source: sFau6gAKEk.exe, 00000000.00000002.513513095.0000000003DA7000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: sFau6gAKEk.exe, 00000000.00000002.513024357.0000000002570000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: sFau6gAKEk.exe, 00000000.00000002.513024357.0000000002570000.00000002.00020000.sdmpBinary or memory string: Progman
    Source: sFau6gAKEk.exe, 00000000.00000002.513024357.0000000002570000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
    Source: sFau6gAKEk.exe, 00000000.00000002.513024357.0000000002570000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
    Source: sFau6gAKEk.exe, 00000000.00000002.513024357.0000000002570000.00000002.00020000.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeQueries volume information: C:\Users\user\Desktop\sFau6gAKEk.exe VolumeInformation
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Desktop\sFau6gAKEk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected NjratShow sources
    Source: Yara matchFile source: Process Memory Space: sFau6gAKEk.exe PID: 5200, type: MEMORYSTR

    Remote Access Functionality:

    barindex
    Yara detected NjratShow sources
    Source: Yara matchFile source: Process Memory Space: sFau6gAKEk.exe PID: 5200, type: MEMORYSTR

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1Input Capture11Security Software Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol21SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    sFau6gAKEk.exe50%VirustotalBrowse
    sFau6gAKEk.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    strigoo.duckdns.org1%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    strigoo.duckdns.org1%VirustotalBrowse
    strigoo.duckdns.org0%Avira URL Cloudsafe
    https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com0%VirustotalBrowse
    https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com0%Avira URL Cloudsafe
    https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com(0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    strigoo.duckdns.org
    181.141.1.250
    truetrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    strigoo.duckdns.orgtrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.comsFau6gAKEk.exe, 00000000.00000002.513438487.0000000003D92000.00000004.00000001.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://19a35f0c-6367-45ec-aec7-f047bc9f0ebe.com(sFau6gAKEk.exe, 00000000.00000002.513438487.0000000003D92000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    low

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    181.141.1.250
    strigoo.duckdns.orgColombia
    13489EPMTelecomunicacionesSAESPCOtrue

    General Information

    Joe Sandbox Version:33.0.0 White Diamond
    Analysis ID:491718
    Start date:27.09.2021
    Start time:20:35:32
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 6m 4s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:sFau6gAKEk.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:24
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal80.troj.winEXE@1/0@1/1
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 0.4% (good quality ratio 0.2%)
    • Quality average: 50%
    • Quality standard deviation: 50%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 2.20.86.117, 95.100.54.203, 20.199.120.182, 20.82.210.154, 40.112.88.60, 93.184.221.240, 20.199.120.85, 20.82.209.183, 23.10.249.43, 23.10.249.26
    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, client.wns.windows.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtQueryValueKey calls found.

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    EPMTelecomunicacionesSAESPCODu7uHwvCQCGet hashmaliciousBrowse
    • 181.135.128.163
    2hrxC5NcX5Get hashmaliciousBrowse
    • 190.151.230.115
    bfHSvjklSWGet hashmaliciousBrowse
    • 201.184.41.14
    DetectSafeBrowsing.exeGet hashmaliciousBrowse
    • 190.9.216.31
    XyMjGu74RXGet hashmaliciousBrowse
    • 181.142.153.220
    FGLqhK6ZvkGet hashmaliciousBrowse
    • 181.133.113.199
    b3astmode.x86Get hashmaliciousBrowse
    • 181.135.96.142
    b3astmode.arm7Get hashmaliciousBrowse
    • 190.28.71.143
    CPWpaRIC4Q.dllGet hashmaliciousBrowse
    • 181.129.167.82
    StSCDEPGxM.exeGet hashmaliciousBrowse
    • 181.141.7.190
    dark.arm7Get hashmaliciousBrowse
    • 190.29.50.138
    x2HPpQ02mDGet hashmaliciousBrowse
    • 190.128.61.51
    xzK3v4YYYxGet hashmaliciousBrowse
    • 201.184.16.36
    gHQh80mu53Get hashmaliciousBrowse
    • 181.133.113.195
    HoGxvkYZd5Get hashmaliciousBrowse
    • 190.251.194.144
    qAwuBBElh2Get hashmaliciousBrowse
    • 181.131.221.49
    k3dBuYbiCSGet hashmaliciousBrowse
    • 181.131.221.53
    nogBoEEoTKGet hashmaliciousBrowse
    • 181.131.49.107
    ChK3a1uHDf.exeGet hashmaliciousBrowse
    • 181.140.202.66
    Documentacion.PDF.vbsGet hashmaliciousBrowse
    • 181.140.202.66

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    No created / dropped files found

    Static File Info

    General

    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
    Entropy (8bit):6.689643149365699
    TrID:
    • Win64 Executable GUI Net Framework (217006/5) 49.88%
    • Win64 Executable GUI (202006/5) 46.43%
    • Win64 Executable (generic) (12005/4) 2.76%
    • Generic Win/DOS Executable (2004/3) 0.46%
    • DOS Executable Generic (2002/1) 0.46%
    File name:sFau6gAKEk.exe
    File size:322560
    MD5:3441a429a71ac1ad6e910efdd06cacd3
    SHA1:d4f2ab9a718b2da7c4b1d1863dbc6a83b3e29264
    SHA256:d3763d5c2317a279fc6ffce59700fb96f10570178d81c01a912db7b17811798c
    SHA512:e9564dd693fc9391aa6d121c714e807820f2dce50c4809a11914274adfeec1ce721caf72b4801916fa35a9abcb078e3242ac2e28b54aa558ca0f54bf8dee5b8a
    SSDEEP:3072:KX2p9qmX3OyGLKRB5jPCO3rv5Pc/qNnxRlWN2OD/a3/8HMN8/xo2eNeBiKzYdW0:9p9qK7/5PC2b5Pc/qVblPk/o/8HMF2
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...3.Ka.........."...................... .....@..... ....................... ............@...@......@............... .....

    File Icon

    Icon Hash:067179717179b10e

    Static PE Info

    General

    Entrypoint:0x140000000
    Entrypoint Section:
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x614BB633 [Wed Sep 22 23:03:15 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:v4.0.30319
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:

    Entrypoint Preview

    Instruction
    dec ebp
    pop edx
    nop
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax+eax], al
    add byte ptr [eax], al

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x2bb1e.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x22de40x22e00False0.824344758065data7.61141443582IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rsrc0x260000x2bb1e0x2bc00False0.166422991071data5.10147118742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x261300x2b528data
    RT_GROUP_ICON0x516580x14data
    RT_VERSION0x5166c0x2c8data
    RT_MANIFEST0x519340x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

    Version Infos

    DescriptionData
    Translation0x0000 0x04b0
    LegalCopyright
    Assembly Version1.2.3.4
    InternalNametlaqBuoRv.exe
    FileVersion1.2.3.4
    CompanyNamecomp
    Commentsdesc
    ProductNameProd
    ProductVersion1.2.3.4
    FileDescription
    OriginalFilenametlaqBuoRv.exe

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    09/27/21-20:36:41.157663UDP254DNS SPOOF query response with TTL of 1 min. and no authority53547958.8.8.8192.168.2.5
    09/27/21-20:36:42.094591TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497489889192.168.2.5181.141.1.250

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Sep 27, 2021 20:36:41.163624048 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:41.340255976 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:36:41.340745926 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:42.094590902 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:42.472625017 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:36:42.472764969 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:42.854248047 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:36:47.023997068 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:47.400763035 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:36:47.529781103 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:36:47.533756018 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:36:47.974504948 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:05.593466997 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:05.594152927 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:05.982108116 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:11.385684013 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:11.799866915 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:19.715012074 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:20.096765041 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:23.669635057 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:23.670413971 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:24.056149960 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:41.743467093 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:41.744005919 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:42.299736023 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:42.300081968 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:42.419102907 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:42.729366064 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:43.118599892 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:44.092459917 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:44.697590113 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:52.218457937 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:37:52.719830036 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:59.804486990 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:37:59.805205107 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:00.545722008 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:00.802254915 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:01.029953003 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:16.595279932 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:16.986154079 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:17.858325958 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:17.859158993 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:18.301340103 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:24.721905947 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:25.407793999 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:35.925228119 CEST988949748181.141.1.250192.168.2.5
    Sep 27, 2021 20:38:35.925582886 CEST497489889192.168.2.5181.141.1.250
    Sep 27, 2021 20:38:36.377545118 CEST988949748181.141.1.250192.168.2.5

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Sep 27, 2021 20:36:25.465249062 CEST6206053192.168.2.58.8.8.8
    Sep 27, 2021 20:36:25.485941887 CEST53620608.8.8.8192.168.2.5
    Sep 27, 2021 20:36:40.932399035 CEST6180553192.168.2.58.8.8.8
    Sep 27, 2021 20:36:40.992331982 CEST53618058.8.8.8192.168.2.5
    Sep 27, 2021 20:36:41.041933060 CEST5479553192.168.2.58.8.8.8
    Sep 27, 2021 20:36:41.157663107 CEST53547958.8.8.8192.168.2.5
    Sep 27, 2021 20:36:55.782915115 CEST4955753192.168.2.58.8.8.8
    Sep 27, 2021 20:36:55.807166100 CEST53495578.8.8.8192.168.2.5
    Sep 27, 2021 20:36:57.541328907 CEST6173353192.168.2.58.8.8.8
    Sep 27, 2021 20:36:57.572690010 CEST53617338.8.8.8192.168.2.5
    Sep 27, 2021 20:37:04.382503986 CEST6544753192.168.2.58.8.8.8
    Sep 27, 2021 20:37:04.396823883 CEST53654478.8.8.8192.168.2.5
    Sep 27, 2021 20:37:15.689558983 CEST5244153192.168.2.58.8.8.8
    Sep 27, 2021 20:37:15.725284100 CEST53524418.8.8.8192.168.2.5
    Sep 27, 2021 20:37:17.727601051 CEST6217653192.168.2.58.8.8.8
    Sep 27, 2021 20:37:17.746182919 CEST53621768.8.8.8192.168.2.5
    Sep 27, 2021 20:37:19.690520048 CEST5959653192.168.2.58.8.8.8
    Sep 27, 2021 20:37:19.703618050 CEST53595968.8.8.8192.168.2.5
    Sep 27, 2021 20:37:32.844564915 CEST6529653192.168.2.58.8.8.8
    Sep 27, 2021 20:37:32.852586985 CEST6318353192.168.2.58.8.8.8
    Sep 27, 2021 20:37:32.865221977 CEST53631838.8.8.8192.168.2.5
    Sep 27, 2021 20:37:32.877125025 CEST53652968.8.8.8192.168.2.5
    Sep 27, 2021 20:37:37.121504068 CEST6015153192.168.2.58.8.8.8
    Sep 27, 2021 20:37:37.134706974 CEST53601518.8.8.8192.168.2.5
    Sep 27, 2021 20:37:37.264803886 CEST5696953192.168.2.58.8.8.8
    Sep 27, 2021 20:37:37.283998966 CEST53569698.8.8.8192.168.2.5
    Sep 27, 2021 20:37:55.935003042 CEST5516153192.168.2.58.8.8.8
    Sep 27, 2021 20:37:55.969389915 CEST53551618.8.8.8192.168.2.5
    Sep 27, 2021 20:37:58.238720894 CEST5475753192.168.2.58.8.8.8
    Sep 27, 2021 20:37:58.251852989 CEST53547578.8.8.8192.168.2.5
    Sep 27, 2021 20:37:59.521214008 CEST4999253192.168.2.58.8.8.8
    Sep 27, 2021 20:37:59.535160065 CEST53499928.8.8.8192.168.2.5
    Sep 27, 2021 20:38:04.107105970 CEST6007553192.168.2.58.8.8.8
    Sep 27, 2021 20:38:04.120048046 CEST53600758.8.8.8192.168.2.5
    Sep 27, 2021 20:38:04.941230059 CEST5501653192.168.2.58.8.8.8
    Sep 27, 2021 20:38:04.953919888 CEST53550168.8.8.8192.168.2.5
    Sep 27, 2021 20:38:20.822839975 CEST6434553192.168.2.58.8.8.8
    Sep 27, 2021 20:38:20.836070061 CEST53643458.8.8.8192.168.2.5
    Sep 27, 2021 20:38:34.330269098 CEST5712853192.168.2.58.8.8.8
    Sep 27, 2021 20:38:34.357846975 CEST53571288.8.8.8192.168.2.5
    Sep 27, 2021 20:38:37.614662886 CEST5479153192.168.2.58.8.8.8
    Sep 27, 2021 20:38:37.628191948 CEST53547918.8.8.8192.168.2.5
    Sep 27, 2021 20:38:39.959268093 CEST5046353192.168.2.58.8.8.8
    Sep 27, 2021 20:38:39.972946882 CEST53504638.8.8.8192.168.2.5

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Sep 27, 2021 20:36:41.041933060 CEST192.168.2.58.8.8.80xada8Standard query (0)strigoo.duckdns.orgA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Sep 27, 2021 20:36:41.157663107 CEST8.8.8.8192.168.2.50xada8No error (0)strigoo.duckdns.org181.141.1.250A (IP address)IN (0x0001)

    Code Manipulations

    Statistics

    System Behavior

    General

    Start time:20:36:29
    Start date:27/09/2021
    Path:C:\Users\user\Desktop\sFau6gAKEk.exe
    Wow64 process (32bit):false
    Commandline:'C:\Users\user\Desktop\sFau6gAKEk.exe'
    Imagebase:0xee0000
    File size:322560 bytes
    MD5 hash:3441A429A71AC1AD6E910EFDD06CACD3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >