Loading ...

Play interactive tourEdit tour

Windows Analysis Report sb.exe

Overview

General Information

Sample Name:sb.exe
Analysis ID:492126
MD5:e310cb3185d95e3dda42f0230b569d84
SHA1:c20c8aa953f7df7e9b117258a0d31530e23ffc55
SHA256:82867648313483db4a6115e0cc2b34c06719ffdb6667e50e625e2dc130adfbca
Tags:arostetelemaccaexe
Infos:

Most interesting Screenshot:

Detection

AveMaria
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AveMaria stealer
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Installs a raw input device (often for capturing keystrokes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Potential key logger detected (key state polling based)
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)

Classification

Process Tree

  • System is w10x64
  • sb.exe (PID: 6404 cmdline: 'C:\Users\user\Desktop\sb.exe' MD5: E310CB3185D95E3DDA42F0230B569D84)
    • conhost.exe (PID: 6408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: AveMaria

{"C2 url": "cachepallioniwarznpa.icu", "port": 5200}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
      00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
          Process Memory Space: sb.exe PID: 6404JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.sb.exe.27e053f.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x16478:$a1: \Opera Software\Opera Stable\Login Data
            • 0x167a0:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x160e8:$a3: \Google\Chrome\User Data\Default\Login Data
            0.2.sb.exe.27e053f.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.sb.exe.27e053f.1.raw.unpackJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
                0.2.sb.exe.27e053f.1.raw.unpackAveMaria_WarZoneunknownunknown
                • 0x18520:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
                • 0x18274:$str2: MsgBox.exe
                • 0x18148:$str6: Ave_Maria
                • 0x177e8:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                • 0x16e08:$str8: SMTP Password
                • 0x160e8:$str11: \Google\Chrome\User Data\Default\Login Data
                • 0x177c0:$str12: \sqlmap.dll
                0.2.sb.exe.27e053f.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x15878:$a1: \Opera Software\Opera Stable\Login Data
                • 0x15ba0:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x154e8:$a3: \Google\Chrome\User Data\Default\Login Data
                Click to see the 7 entries

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 0.2.sb.exe.27e053f.1.raw.unpackMalware Configuration Extractor: AveMaria {"C2 url": "cachepallioniwarznpa.icu", "port": 5200}
                Multi AV Scanner detection for submitted fileShow sources
                Source: sb.exeVirustotal: Detection: 38%Perma Link
                Source: sb.exeReversingLabs: Detection: 42%
                Yara detected AveMaria stealerShow sources
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, type: MEMORY
                Source: 0.2.sb.exe.31e0000.3.unpackAvira: Label: TR/Downloader.Gen
                Source: 0.2.sb.exe.27e053f.1.unpackAvira: Label: TR/Patched.Ren.Gen3
                Source: sb.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Users\user\Desktop\sb.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                Source: sb.exeStatic PE information: certificate valid
                Source: sb.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: sb.exe, 00000000.00000002.374832358.00000000031FB000.00000004.00000001.sdmp
                Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: sb.exe, 00000000.00000002.374832358.00000000031FB000.00000004.00000001.sdmp
                Source: Binary string: C:\Users\W7H64\Desktop\VCSamples-master\VC2010Samples\ATL\General\DispSink\DispClient\Free real estate.pdb source: sb.exe

                Networking:

                barindex
                C2 URLs / IPs found in malware configurationShow sources
                Source: Malware configuration extractorURLs: cachepallioniwarznpa.icu
                Source: sb.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: sb.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: sb.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: sb.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: sb.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                Source: sb.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                Source: sb.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: sb.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: sb.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: sb.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: sb.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                Source: sb.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                Source: sb.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: sb.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: sb.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: sb.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: sb.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: sb.exe, 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
                Source: sb.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: sb.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: sb.exe, 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpBinary or memory string: GetRawInputData
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CB8A55 GetKeyState,GetKeyState,GetKeyState,GetKeyState,

                E-Banking Fraud:

                barindex
                Yara detected AveMaria stealerShow sources
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, type: MEMORY

                System Summary:

                barindex
                Malicious sample detected (through community Yara rule)Show sources
                Source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                Source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                Source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
                Source: sb.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CC0074
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CD401C
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CFAD78
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CF16A0
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CF26B6
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CF9230
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CF9354
                Source: sb.exeVirustotal: Detection: 38%
                Source: sb.exeReversingLabs: Detection: 42%
                Source: C:\Users\user\Desktop\sb.exeFile read: C:\Users\user\Desktop\sb.exeJump to behavior
                Source: sb.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\sb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\sb.exe 'C:\Users\user\Desktop\sb.exe'
                Source: C:\Users\user\Desktop\sb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\sb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6408:120:WilError_01
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CB2C5D __EH_prolog3_catch_GS,LoadLibraryExA,LoadLibraryExA,FindResourceA,LoadResource,SizeofResource,FreeLibrary,
                Source: C:\Users\user\Desktop\sb.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
                Source: classification engineClassification label: mal60.troj.winEXE@2/0@0/0
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CB249C CoCreateInstance,
                Source: sb.exeStatic file information: File size 1627136 > 1048576
                Source: C:\Users\user\Desktop\sb.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
                Source: sb.exeStatic PE information: certificate valid
                Source: sb.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x12a200
                Source: sb.exeStatic PE information: More than 200 imports for KERNEL32.dll
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: sb.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: sb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: sb.exe, 00000000.00000002.374832358.00000000031FB000.00000004.00000001.sdmp
                Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: sb.exe, 00000000.00000002.374832358.00000000031FB000.00000004.00000001.sdmp
                Source: Binary string: C:\Users\W7H64\Desktop\VCSamples-master\VC2010Samples\ATL\General\DispSink\DispClient\Free real estate.pdb source: sb.exe
                Source: sb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: sb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: sb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: sb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: sb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CFBEC3 push ecx; ret
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CBEE06 push ecx; ret

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Contains functionality to hide user accountsShow sources
                Source: sb.exe, 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                Source: sb.exe, 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread|"
                Source: C:\Users\user\Desktop\sb.exe TID: 2224Thread sleep count: 70 > 30
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CDBC81 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CDD54C mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CBCAC7 mov esi, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CE73DD mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CBC9B1 GetProcessHeap,HeapAlloc,InterlockedPopEntrySList,VirtualAlloc,RaiseException,InterlockedPopEntrySList,VirtualFree,InterlockedPushEntrySList,
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CDBC81 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CBDF6A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\Desktop\sb.exeCode function: 0_2_00CBEFC2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                Stealing of Sensitive Information:

                barindex
                Yara detected AveMaria stealerShow sources
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: sb.exe PID: 6404, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AveMaria stealerShow sources
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.27e053f.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.sb.exe.31e0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading2Input Capture21System Time Discovery1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Information Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Users1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                sb.exe38%VirustotalBrowse
                sb.exe42%ReversingLabsWin32.Trojan.Streamer

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.sb.exe.31e0000.3.unpack100%AviraTR/Downloader.GenDownload File
                0.2.sb.exe.27e053f.1.unpack100%AviraTR/Patched.Ren.Gen3Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                cachepallioniwarznpa.icu0%VirustotalBrowse
                cachepallioniwarznpa.icu0%Avira URL Cloudsafe
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                cachepallioniwarznpa.icutrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#sb.exefalse
                • URL Reputation: safe
                unknown
                https://sectigo.com/CPS0sb.exefalse
                • URL Reputation: safe
                unknown
                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#sb.exefalse
                • URL Reputation: safe
                unknown
                http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ysb.exefalse
                • URL Reputation: safe
                unknown
                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0sb.exefalse
                • URL Reputation: safe
                unknown
                http://ocsp.sectigo.com0sb.exefalse
                • URL Reputation: safe
                unknown
                https://github.com/syohex/java-simple-mine-sweeperC:sb.exe, 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmpfalse
                  high

                  Contacted IPs

                  No contacted IP infos

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:492126
                  Start date:28.09.2021
                  Start time:11:48:03
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 31s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:sb.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:24
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal60.troj.winEXE@2/0@0/0
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 100% (good quality ratio 91.8%)
                  • Quality average: 76%
                  • Quality standard deviation: 30.9%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240s for sample files taking high CPU consumption
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 20.82.209.183, 20.54.110.249, 40.112.88.60, 173.222.108.226, 173.222.108.210, 20.199.120.151, 20.199.120.85, 80.67.82.211, 80.67.82.235, 20.82.209.104, 23.211.4.86, 23.203.67.116
                  • Excluded domains from analysis (whitelisted): a767.dspw65.akamai.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, cdn.onenote.net.edgekey.net, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e1553.dspg.akamaiedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Not all processes where analyzed, report is missing behavior information

                  Simulations

                  Behavior and APIs

                  No simulations

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  No context

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  No created / dropped files found

                  Static File Info

                  General

                  File type:PE32 executable (console) Intel 80386, for MS Windows
                  Entropy (8bit):3.7813426384094133
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:sb.exe
                  File size:1627136
                  MD5:e310cb3185d95e3dda42f0230b569d84
                  SHA1:c20c8aa953f7df7e9b117258a0d31530e23ffc55
                  SHA256:82867648313483db4a6115e0cc2b34c06719ffdb6667e50e625e2dc130adfbca
                  SHA512:a0c4a70bc09ea2eb36a1a27af65891d866beec07a1c21208e0b05e549d3d2f7619bef9012dab9e121e53a6a1a56d642bfb5435520292dd879e30f4db71789bbd
                  SSDEEP:12288:EjTG/NEiKx8FAuRg7Q7X/CRLL6/mkIHTydNNAF4B0laLpfqFR:EiAuRg7SFWIyFR
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................a...............................................r...T.......T.+.....T.......Rich............PE..L..

                  File Icon

                  Icon Hash:00828e8e8686b000

                  Static PE Info

                  General

                  Entrypoint:0x40eb3e
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows cui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x6147C4FD [Sun Sep 19 23:17:17 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:9d3536f958f133fe568939841471fa60

                  Authenticode Signature

                  Signature Valid:true
                  Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                  Signature Validation Error:The operation completed successfully
                  Error Number:0
                  Not Before, Not After
                  • 9/7/2021 5:00:00 PM 9/8/2022 4:59:59 PM
                  Subject Chain
                  • CN=SAN MARINO INVESTMENTS PTY LTD, O=SAN MARINO INVESTMENTS PTY LTD, S=Victoria, C=AU
                  Version:3
                  Thumbprint MD5:5F47B0139E6B49D14882A7ABD4026C5A
                  Thumbprint SHA-1:D877BC4EA5A61864AA45BCB3F7EBDCD8ACBC5D5D
                  Thumbprint SHA-256:72A2371C9873A8CF56E98A6EACB267DEC076593AC0A6917DC10B479F19B9EA6F
                  Serial:00D79739187C585E453C00AFC11D77B523

                  Entrypoint Preview

                  Instruction
                  call 00007F8CE8A092C1h
                  jmp 00007F8CE8A08C1Eh
                  ret
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  mov eax, dword ptr [eax]
                  pop ebp
                  ret
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  mov eax, dword ptr [eax]
                  pop ebp
                  ret
                  mov ecx, dword ptr [0044E638h]
                  xor eax, eax
                  cmp ecx, 0040EB48h
                  setne al
                  ret
                  int3
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 0Fh
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F8CE8A093AFh
                  push ecx
                  lea ecx, dword ptr [esp+08h]
                  sub ecx, eax
                  and ecx, 07h
                  add eax, ecx
                  sbb ecx, ecx
                  or eax, ecx
                  pop ecx
                  jmp 00007F8CE8A09399h
                  push ebp
                  mov ebp, esp
                  sub esp, 00000324h
                  push ebx
                  push 00000017h
                  call 00007F8CE8A062A0h
                  test eax, eax
                  je 00007F8CE8A08DF7h
                  mov ecx, dword ptr [ebp+08h]
                  int 29h
                  push 00000003h
                  call 00007F8CE8A08FBAh
                  mov dword ptr [esp], 000002CCh
                  lea eax, dword ptr [ebp-00000324h]
                  push 00000000h
                  push eax
                  call 00007F8CE8A0C023h
                  add esp, 0Ch
                  mov dword ptr [ebp-00000274h], eax
                  mov dword ptr [ebp-00000278h], ecx
                  mov dword ptr [ebp-0000027Ch], edx
                  mov dword ptr [ebp-00000280h], ebx
                  mov dword ptr [ebp-00000284h], esi
                  mov dword ptr [ebp-00000288h], edi
                  mov word ptr [ebp-0000025Ch], ss
                  mov word ptr [ebp+00FFFD98h], cs

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5c4a40xf0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x18b0000x1e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x18ae000x2600
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x18c0000x3914.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x587300x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x588280x18.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x587880x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x4e0000x638.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x4c3fa0x4c400False0.454738729508data6.61929420007IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x4e0000x107c40x10800False0.418604995265data5.4012865504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x5f0000x12b5540x12a200False0.175606001048data2.35283899818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x18b0000x1e00x200False0.53125data4.71229819329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x18c0000x39140x3a00False0.747306034483data6.62483061725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_MANIFEST0x18b0600x17dXML 1.0 document textEnglishUnited States

                  Imports

                  DLLImport
                  KERNEL32.dllGetProcessHeaps, GetProcessId, GetProcessTimes, GetQueuedCompletionStatus, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDefaultLCID, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadId, GetThreadLocale, GetThreadPriority, GetTickCount, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetUserDefaultLangID, GetUserDefaultLocaleName, GetVersion, GetVersionExW, GetWindowsDirectoryW, HeapAlloc, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSetInformation, HeapSize, InitOnceExecuteOnce, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, IsWow64Process, K32GetPerformanceInfo, K32GetProcessMemoryInfo, K32QueryWorkingSetEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExA, LoadLibraryExW, LoadLibraryW, LocalFree, LockFileEx, MapViewOfFile, MoveFileW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, OutputDebugStringW, PeekNamedPipe, PostQueuedCompletionStatus, ProcessIdToSessionId, QueryDosDeviceW, QueryPerformanceCounter, QueryPerformanceFrequency, QueryThreadCycleTime, RaiseException, ReadConsoleW, ReadFile, ReadProcessMemory, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, RemoveDirectoryW, ReplaceFileW, ResetEvent, ResumeThread, GetEnvironmentStringsW, RtlCaptureStackBackTrace, RtlUnwind, SearchPathW, SetConsoleCtrlHandler, SetCurrentDirectoryW, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFileAttributesW, SetFilePointerEx, SetHandleInformation, SetInformationJobObject, SetLastError, SetNamedPipeHandleState, SetProcessShutdownParameters, SetStdHandle, SetThreadPriority, SetUnhandledExceptionFilter, SignalObjectAndWait, Sleep, SleepConditionVariableSRW, SleepEx, SuspendThread, SwitchToThread, GetProcessHandleCount, TerminateJobObject, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TransactNamedPipe, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, UnlockFileEx, UnmapViewOfFile, UnregisterWaitEx, VirtualAlloc, VirtualAllocEx, VirtualFree, VirtualFreeEx, VirtualProtect, VirtualProtectEx, VirtualQuery, VirtualQueryEx, WaitForSingleObject, WaitForSingleObjectEx, WaitNamedPipeW, WakeAllConditionVariable, WideCharToMultiByte, Wow64GetThreadContext, WriteConsoleW, WriteFile, WriteProcessMemory, lstrlenW, GetModuleFileNameA, SizeofResource, SetThreadLocale, InitializeCriticalSectionEx, FindResourceA, lstrlenA, GlobalAlloc, FreeConsole, IsDBCSLeadByte, LoadResource, DecodePointer, GlobalLock, lstrcmpiA, GlobalUnlock, MulDiv, InterlockedFlushSList, FlushInstructionCache, InterlockedPushEntrySList, InterlockedPopEntrySList, GetProcessHeap, GetProcAddress, GetDriveTypeW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryW, GetConsoleMode, GetConsoleCP, GetComputerNameExW, GetCommandLineW, GetCommandLineA, GetCPInfo, GetACP, FreeLibrary, FreeEnvironmentStringsW, FormatMessageA, FlushViewOfFile, FlushFileBuffers, FindNextFileW, FindFirstFileExW, FindClose, FileTimeToSystemTime, ExpandEnvironmentStringsW, ExitProcess, EnumSystemLocalesW, EnumSystemLocalesEx, EnterCriticalSection, EncodePointer, DuplicateHandle, DisconnectNamedPipe, DeleteFileW, DeleteCriticalSection, DebugBreak, CreateThread, CreateSemaphoreW, CreateRemoteThread, CreateProcessW, CreateNamedPipeW, CreateMutexW, CreateJobObjectW, CreateIoCompletionPort, CreateFileW, CreateFileMappingW, CreateEventW, CreateDirectoryW, ConnectNamedPipe, CompareStringW, CloseHandle, AssignProcessToJobObject, GetOEMCP, GetNativeSystemInfo, GetModuleHandleW, GetModuleHandleExW, GetModuleHandleA, GetModuleFileNameW, GetLongPathNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileType, GetFileSizeEx, GetFileInformationByHandleEx, GetFileInformationByHandle, GetFileAttributesW, SystemTimeToTzSpecificLocalTime, GetExitCodeProcess, RtlCaptureContext, AcquireSRWLockExclusive
                  USER32.dllRegisterClassExA, InvalidateRect, ReleaseDC, BeginPaint, EndPaint, UnregisterClassW, TranslateMessage, SetProcessWindowStation, SetProcessDPIAware, SendMessageTimeoutW, RegisterClassW, PostMessageW, IsWindow, GetWindowThreadProcessId, GetUserObjectInformationW, GetThreadDesktop, PtInRect, GetMessageW, FindWindowExW, DispatchMessageW, DestroyWindow, DefWindowProcW, CreateWindowStationW, CreateWindowExW, GetClientRect, CharNextW, SetFocus, GetParent, CharNextA, GetKeyState, GetFocus, AllowSetForegroundWindow, CloseDesktop, CloseWindowStation, CreateDesktopW, GetProcessWindowStation, UnregisterClassA, UnionRect, LoadCursorA, GetDC, SetWindowPos, EqualRect, IntersectRect, CreateWindowExA, DefWindowProcA, MessageBoxA, GetWindowLongA, IsChild, CallWindowProcA, SetWindowLongA, OffsetRect, GetClassInfoExA, ShowWindow, SetWindowRgn
                  GDI32.dllCloseMetaFile, SetWindowOrgEx, CreateRectRgnIndirect, SetWindowExtEx, GetDeviceCaps, DeleteDC, CreateMetaFileA, TextOutA, Rectangle, SetViewportOrgEx, RestoreDC, LPtoDP, CreateDCA, SetMapMode, SetTextAlign, DeleteMetaFile, SaveDC
                  ADVAPI32.dllConvertSidToStringSidW, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertStringSidToSidW, CopySid, CreateProcessAsUserW, CreateRestrictedToken, CreateWellKnownSid, DuplicateToken, DuplicateTokenEx, EqualSid, EventRegister, EventUnregister, EventWrite, FreeSid, GetAce, GetKernelObjectSecurity, GetLengthSid, GetNamedSecurityInfoW, GetSecurityDescriptorSacl, GetSecurityInfo, GetSidSubAuthority, GetTokenInformation, ImpersonateLoggedOnUser, ImpersonateNamedPipeClient, InitializeSid, IsValidSid, LookupPrivilegeValueW, MapGenericMask, OpenProcessToken, RegCloseKey, RegCreateKeyExW, RegDeleteValueW, RegDisablePredefinedCache, RegOpenKeyExW, RegQueryValueExW, RegSetValueExW, RevertToSelf, SetEntriesInAclW, SetKernelObjectSecurity, SetSecurityInfo, SetThreadToken, SetTokenInformation, SystemFunction036, RegEnumKeyExA, RegDeleteValueA, RegOpenKeyExA, RegQueryInfoKeyA, RegSetValueExA, RegCreateKeyExA, RegDeleteKeyA, RegQueryInfoKeyW, AccessCheck
                  SHELL32.dllSHGetKnownFolderPath, SHGetFolderPathW, CommandLineToArgvW
                  ole32.dllOleRegGetUserType, OleRegGetMiscStatus, CoTaskMemRealloc, OleRegEnumVerbs, CreateDataAdviseHolder, WriteClassStm, CoTaskMemFree, CreateOleAdviseHolder, CoCreateInstance, StringFromGUID2, CoTaskMemAlloc, ReadClassStm, OleSaveToStream
                  OLEAUT32.dllGetErrorInfo, SetErrorInfo, CreateErrorInfo, VariantClear, VariantCopy, UnRegisterTypeLib, LoadRegTypeLib, VariantInit, LoadTypeLib, SysFreeString, RegisterTypeLib, SysStringByteLen, SysAllocStringByteLen, SysAllocString, OleCreatePropertyFrame, DispCallFunc, SysStringLen, VariantChangeType, VarUI4FromStr
                  SHLWAPI.dllPathMatchSpecW
                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock
                  VERSION.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                  WINMM.dlltimeGetTime

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Network Port Distribution

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Sep 28, 2021 11:49:30.395595074 CEST6402153192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:30.430952072 CEST53640218.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:53.463736057 CEST6078453192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:53.496028900 CEST53607848.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:54.142466068 CEST5114353192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:54.177561045 CEST53511438.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:54.918437004 CEST5600953192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:54.954066038 CEST53560098.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:54.957982063 CEST5902653192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:54.987188101 CEST53590268.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:55.492863894 CEST4957253192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:55.512423992 CEST53495728.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:56.018507004 CEST6082353192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:56.060745001 CEST53608238.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:56.488229990 CEST5213053192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:56.508285046 CEST53521308.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:56.752593994 CEST5510253192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:56.774513006 CEST53551028.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:56.821130991 CEST5623653192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:56.840874910 CEST53562368.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:56.961891890 CEST5652753192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:57.051326036 CEST53565278.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:57.714659929 CEST4955953192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:57.786499977 CEST53495598.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:58.701886892 CEST5265053192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:58.721467018 CEST53526508.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:59.124200106 CEST6329753192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:59.141499996 CEST53632978.8.8.8192.168.2.3
                  Sep 28, 2021 11:49:59.428098917 CEST5836153192.168.2.38.8.8.8
                  Sep 28, 2021 11:49:59.447551966 CEST53583618.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:04.014899969 CEST5361553192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:04.033655882 CEST53536158.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:06.862585068 CEST5072853192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:06.885427952 CEST53507288.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:17.668047905 CEST5377753192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:17.688069105 CEST53537778.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:33.446851015 CEST5710653192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:33.466629028 CEST53571068.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:33.992844105 CEST6035253192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:34.028847933 CEST53603528.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:49.282088995 CEST5677353192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:49.324666977 CEST53567738.8.8.8192.168.2.3
                  Sep 28, 2021 11:50:57.420393944 CEST6098253192.168.2.38.8.8.8
                  Sep 28, 2021 11:50:57.441384077 CEST53609828.8.8.8192.168.2.3
                  Sep 28, 2021 11:51:23.579899073 CEST5805853192.168.2.38.8.8.8
                  Sep 28, 2021 11:51:23.598867893 CEST53580588.8.8.8192.168.2.3
                  Sep 28, 2021 11:51:33.562012911 CEST6436753192.168.2.38.8.8.8
                  Sep 28, 2021 11:51:33.581454992 CEST53643678.8.8.8192.168.2.3
                  Sep 28, 2021 11:51:58.063532114 CEST5153953192.168.2.38.8.8.8
                  Sep 28, 2021 11:51:58.091603041 CEST53515398.8.8.8192.168.2.3
                  Sep 28, 2021 11:52:45.367397070 CEST5539353192.168.2.38.8.8.8
                  Sep 28, 2021 11:52:45.387176991 CEST53553938.8.8.8192.168.2.3
                  Sep 28, 2021 11:52:59.463311911 CEST5058553192.168.2.38.8.8.8
                  Sep 28, 2021 11:52:59.484613895 CEST53505858.8.8.8192.168.2.3

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:11:49:08
                  Start date:28/09/2021
                  Path:C:\Users\user\Desktop\sb.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\sb.exe'
                  Imagebase:0xcb0000
                  File size:1627136 bytes
                  MD5 hash:E310CB3185D95E3DDA42F0230B569D84
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.374825576.00000000031F6000.00000002.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000000.00000002.374727716.00000000027E0000.00000040.00000001.sdmp, Author: Joe Security
                  Reputation:low

                  General

                  Start time:11:49:09
                  Start date:28/09/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7f20f0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >