Loading ...

Play interactive tourEdit tour

Windows Analysis Report IfakQb9U15.exe

Overview

General Information

Sample Name:IfakQb9U15.exe
Analysis ID:510140
MD5:36f662b3c9a54c0c2427602f1463eb69
SHA1:7e46615097282ac51ef08d3e4ac7d65ce6684a07
SHA256:d836a03e0b7eeabbc971de7d3e6fcc11bf06e13e633d11118c7429b3abb3c4ed
Tags:exeSmokeLoader
Infos:

Most interesting Screenshot:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • IfakQb9U15.exe (PID: 4748 cmdline: 'C:\Users\user\Desktop\IfakQb9U15.exe' MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • IfakQb9U15.exe (PID: 2456 cmdline: 'C:\Users\user\Desktop\IfakQb9U15.exe' MD5: 36F662B3C9A54C0C2427602F1463EB69)
      • explorer.exe (PID: 3472 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • jjevwiw (PID: 6372 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • jjevwiw (PID: 6404 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
  • jjevwiw (PID: 5852 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • jjevwiw (PID: 5868 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
  • cleanup

Malware Configuration

Threatname: SmokeLoader

{"C2 list": ["http://gejajoo7.top/", "http://sysaheu9.top/"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            28.0.jjevwiw.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              28.2.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                28.1.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  14.1.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    27.2.jjevwiw.30815a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                      Click to see the 7 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://gejajoo7.top/", "http://sysaheu9.top/"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: IfakQb9U15.exeVirustotal: Detection: 38%Perma Link
                      Source: IfakQb9U15.exeReversingLabs: Detection: 75%
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: IfakQb9U15.exeAvira: detected
                      Antivirus detection for URL or domainShow sources
                      Source: http://sysaheu9.top/Avira URL Cloud: Label: malware
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: gejajoo7.topVirustotal: Detection: 9%Perma Link
                      Source: sysaheu9.topVirustotal: Detection: 12%Perma Link
                      Antivirus detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwAvira: detection malicious, Label: TR/Redcap.yyhtm
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwReversingLabs: Detection: 75%
                      Machine Learning detection for sampleShow sources
                      Source: IfakQb9U15.exeJoe Sandbox ML: detected
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwJoe Sandbox ML: detected
                      Source: 14.0.jjevwiw.400000.1.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.2.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 1.0.IfakQb9U15.exe.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.3.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.1.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 27.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 13.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.2.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.3.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: IfakQb9U15.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: Binary string: C:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: Binary string: HC:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe

                      Networking:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\explorer.exeDomain query: gejajoo7.top
                      Source: C:\Windows\explorer.exeDomain query: sysaheu9.top
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: http://gejajoo7.top/
                      Source: Malware configuration extractorURLs: http://sysaheu9.top/
                      Source: unknownDNS traffic detected: queries for: clientconfig.passport.net

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY
                      Source: IfakQb9U15.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401927 Sleep,NtTerminateProcess,3_2_00401927
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401942 Sleep,NtTerminateProcess,3_2_00401942
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401949 Sleep,NtTerminateProcess,3_2_00401949
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401956 Sleep,NtTerminateProcess,3_2_00401956
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00402026 LocalAlloc,NtQuerySystemInformation,3_2_00402026
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_004018C9 Sleep,NtTerminateProcess,3_2_004018C9
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401886 Sleep,NtTerminateProcess,3_2_00401886
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_1_00402026 LocalAlloc,NtQuerySystemInformation,3_1_00402026
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,13_2_04B20110
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401927 Sleep,NtTerminateProcess,14_2_00401927
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401942 Sleep,NtTerminateProcess,14_2_00401942
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401949 Sleep,NtTerminateProcess,14_2_00401949
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401956 Sleep,NtTerminateProcess,14_2_00401956
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00402026 LocalAlloc,NtQuerySystemInformation,14_2_00402026
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_004018C9 Sleep,NtTerminateProcess,14_2_004018C9
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401886 Sleep,NtTerminateProcess,14_2_00401886
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 28_2_00402026 LocalAlloc,NtQuerySystemInformation,28_2_00402026
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\jjevwiw D836A03E0B7EEABBC971DE7D3E6FCC11BF06E13E633D11118C7429B3ABB3C4ED
                      Source: IfakQb9U15.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: jjevwiw.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: IfakQb9U15.exeVirustotal: Detection: 38%
                      Source: IfakQb9U15.exeReversingLabs: Detection: 75%
                      Source: IfakQb9U15.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe' Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/2@3/0
                      Source: IfakQb9U15.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: IfakQb9U15.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: Binary string: HC:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_03022E12 push eax; retf 1_2_03022E22
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00402EED push eax; ret 3_2_00402FC7
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_1_00402EED push eax; ret 3_1_00402FC7
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B12E12 push eax; retf 13_2_04B12E22
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00402EED push eax; ret 14_2_00402FC7
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 28_2_00402EED push eax; ret 28_2_00402FC7
                      Source: IfakQb9U15.exeStatic PE information: section name: .befifup
                      Source: jjevwiw.5.drStatic PE information: section name: .befifup
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.47772772393
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.47772772393
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to dropped file

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Deletes itself after installationShow sources
                      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\ifakqb9u15.exeJump to behavior
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jjevwiw:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: IfakQb9U15.exe, 00000003.00000002.314378875.0000000001F90000.00000004.00000001.sdmp, jjevwiw, 0000000E.00000002.376786636.0000000000657000.00000004.00000020.sdmp, jjevwiw, 0000001C.00000002.507811575.0000000001FB0000.00000004.00000001.sdmpBinary or memory string: ASWHOOK
                      Checks if the current machine is a virtual machine (disk enumeration)Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Windows\explorer.exe TID: 6024Thread sleep count: 563 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 3000Thread sleep count: 378 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 3000Thread sleep time: -37800s >= -30000sJump to behavior
                      Source: C:\Windows\explorer.exe TID: 328Thread sleep count: 456 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 328Thread sleep time: -45600s >= -30000sJump to behavior
                      Source: C:\Windows\explorer.exe TID: 6760Thread sleep count: 390 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 6768Thread sleep count: 251 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwLast function: Thread delayed
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 563Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 378Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 456Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 390Jump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSystem information queried: ModuleInformationJump to behavior
                      Source: explorer.exe, 00000005.00000000.302263602.000000000891C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
                      Source: explorer.exe, 00000005.00000000.283570446.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.297854831.000000000374F000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
                      Source: explorer.exe, 00000005.00000000.282249776.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b};`
                      Source: explorer.exe, 00000005.00000000.302357156.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
                      Source: explorer.exe, 00000005.00000000.298561446.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
                      Source: explorer.exe, 00000005.00000000.302357156.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}`

                      Anti Debugging:

                      barindex
                      Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSystem information queried: CodeIntegrityInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSystem information queried: CodeIntegrityInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSystem information queried: CodeIntegrityInformationJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_03020083 push dword ptr fs:[00000030h]1_2_03020083
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B10083 push dword ptr fs:[00000030h]13_2_04B10083
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20042 push dword ptr fs:[00000030h]13_2_04B20042
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_004026CF EntryPoint,CreateFileW,MapViewOfFile,LdrLoadDll,3_2_004026CF

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Benign windows process drops PE filesShow sources
                      Source: C:\Windows\explorer.exeFile created: jjevwiw.5.drJump to dropped file
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\explorer.exeDomain query: gejajoo7.top
                      Source: C:\Windows\explorer.exeDomain query: sysaheu9.top
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwMemory written: C:\Users\user\AppData\Roaming\jjevwiw base: 400000 value starts with: 4D5AJump to behavior
                      Contains functionality to inject code into remote processesShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,13_2_04B20110
                      Creates a thread in another existing process (thread injection)Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeThread created: C:\Windows\explorer.exe EIP: 30C1920Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwThread created: unknown EIP: 3A71920Jump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe' Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: explorer.exe, 00000005.00000000.276042708.00000000089FF000.00000004.00000001.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                      Source: explorer.exe, 00000005.00000000.265816430.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_00405E0E GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,1_2_00405E0E

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsExploitation for Client Execution1DLL Side-Loading1Process Injection512Masquerading11OS Credential DumpingSystem Time Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion12LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection512Security Account ManagerSecurity Software Discovery411SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Hidden Files and Directories1NTDSVirtualization/Sandbox Evasion12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing3Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncSystem Information Discovery4Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510140 Sample: IfakQb9U15.exe Startdate: 27/10/2021 Architecture: WINDOWS Score: 100 31 clientconfig.passport.net 2->31 37 Multi AV Scanner detection for domain / URL 2->37 39 Found malware configuration 2->39 41 Antivirus detection for URL or domain 2->41 43 6 other signatures 2->43 8 IfakQb9U15.exe 2->8         started        10 jjevwiw 2->10         started        13 jjevwiw 2->13         started        signatures3 process4 signatures5 15 IfakQb9U15.exe 8->15         started        53 Antivirus detection for dropped file 10->53 55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 2 other signatures 10->59 18 jjevwiw 10->18         started        20 jjevwiw 13->20         started        process6 signatures7 61 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Checks if the current machine is a virtual machine (disk enumeration) 15->65 22 explorer.exe 2 15->22 injected 67 Creates a thread in another existing process (thread injection) 18->67 process8 dnsIp9 33 sysaheu9.top 22->33 35 gejajoo7.top 22->35 27 C:\Users\user\AppData\Roaming\jjevwiw, PE32 22->27 dropped 29 C:\Users\user\...\jjevwiw:Zone.Identifier, ASCII 22->29 dropped 45 System process connects to network (likely due to code injection or exploit) 22->45 47 Benign windows process drops PE files 22->47 49 Deletes itself after installation 22->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->51 file10 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      IfakQb9U15.exe38%VirustotalBrowse
                      IfakQb9U15.exe75%ReversingLabsWin32.Ransomware.StopCrypt
                      IfakQb9U15.exe100%AviraTR/Redcap.yyhtm
                      IfakQb9U15.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\jjevwiw100%AviraTR/Redcap.yyhtm
                      C:\Users\user\AppData\Roaming\jjevwiw100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\jjevwiw75%ReversingLabsWin32.Ransomware.StopCrypt

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      28.2.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.1.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.2.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.2.jjevwiw.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      14.0.jjevwiw.400000.2.unpack100%AviraTR/Redcap.yyhtmDownload File
                      14.2.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.0.jjevwiw.400000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.jjevwiw.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      1.2.IfakQb9U15.exe.31415a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.3.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.1.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      14.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.0.jjevwiw.400000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.IfakQb9U15.exe.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      3.0.IfakQb9U15.exe.400000.2.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.3.unpack100%AviraTR/Redcap.yyhtmDownload File
                      1.1.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.1.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.jjevwiw.4b215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      27.2.jjevwiw.30815a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      SourceDetectionScannerLabelLink
                      clientconfig.passport.net0%VirustotalBrowse
                      gejajoo7.top10%VirustotalBrowse
                      sysaheu9.top12%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://gejajoo7.top/0%Avira URL Cloudsafe
                      http://sysaheu9.top/100%Avira URL Cloudmalware

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      clientconfig.passport.net
                      unknown
                      unknowntrueunknown
                      gejajoo7.top
                      unknown
                      unknowntrueunknown
                      sysaheu9.top
                      unknown
                      unknowntrueunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://gejajoo7.top/true
                      • Avira URL Cloud: safe
                      unknown
                      http://sysaheu9.top/true
                      • Avira URL Cloud: malware
                      unknown

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:510140
                      Start date:27.10.2021
                      Start time:14:07:11
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 25s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:IfakQb9U15.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:28
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@9/2@3/0
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 80.2% (good quality ratio 62.1%)
                      • Quality average: 43.3%
                      • Quality standard deviation: 31%
                      HCA Information:
                      • Successful, ratio: 67%
                      • Number of executed functions: 25
                      • Number of non-executed functions: 3
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 23.203.70.208, 96.16.150.73, 20.50.102.62, 204.79.197.200, 13.107.21.200, 23.211.6.115, 23.211.4.86, 20.82.210.154, 23.203.78.112, 80.67.82.235, 80.67.82.211, 40.112.88.60
                      • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e15275.g.akamaiedge.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, go.microsoft.com, wildcard.weather.microsoft.com.edgekey.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, tile-service.weather.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net
                      • Not all processes where analyzed, report is missing behavior information

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      14:08:57Task SchedulerRun new task: Firefox Default Browser Agent 7A4EC823D5D4514B path: C:\Users\user\AppData\Roaming\jjevwiw

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Roaming\jjevwiwcx6hZvW5HV.exeGet hashmaliciousBrowse

                        Created / dropped Files

                        C:\Users\user\AppData\Roaming\jjevwiw
                        Process:C:\Windows\explorer.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):189952
                        Entropy (8bit):6.772121581791356
                        Encrypted:false
                        SSDEEP:3072:5+d4MmCHgQlJeblXMLQPAkilxUj3RMsOEd7lj/CrzeuVMO6P2+BwvHJ3/Rg:Ad4aHgaulXyQ4kicim9/C+ynVP
                        MD5:36F662B3C9A54C0C2427602F1463EB69
                        SHA1:7E46615097282AC51EF08D3E4AC7D65CE6684A07
                        SHA-256:D836A03E0B7EEABBC971DE7D3E6FCC11BF06E13E633D11118C7429B3ABB3C4ED
                        SHA-512:35B60C6DA50B94484A77F40C3446BEB1D5562128F5585731A09328140C68C7B57F1727CC0783B439DAFB5660C93CA1BD4E1C3F443261545AAA9B22C0DE9A1599
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 75%
                        Joe Sandbox View:
                        • Filename: cx6hZvW5HV.exe, Detection: malicious, Browse
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L...b.u_.....................p......8'.......0....@..........................@......E........................................m..<......xi...........................1..............................0T..@............0..x............................text...U........................... ..`.rdata...E...0...F..................@..@.data....<...........d..............@....befifupr............x..............@..@.rsrc...xi......j...|..............@..@........................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Roaming\jjevwiw:Zone.Identifier
                        Process:C:\Windows\explorer.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview: [ZoneTransfer]....ZoneId=0

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.772121581791356
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.94%
                        • Clipper DOS Executable (2020/12) 0.02%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • VXD Driver (31/22) 0.00%
                        File name:IfakQb9U15.exe
                        File size:189952
                        MD5:36f662b3c9a54c0c2427602f1463eb69
                        SHA1:7e46615097282ac51ef08d3e4ac7d65ce6684a07
                        SHA256:d836a03e0b7eeabbc971de7d3e6fcc11bf06e13e633d11118c7429b3abb3c4ed
                        SHA512:35b60c6da50b94484a77f40c3446beb1d5562128f5585731a09328140c68c7b57f1727cc0783b439dafb5660c93ca1bd4e1c3f443261545aaa9b22c0de9a1599
                        SSDEEP:3072:5+d4MmCHgQlJeblXMLQPAkilxUj3RMsOEd7lj/CrzeuVMO6P2+BwvHJ3/Rg:Ad4aHgaulXyQ4kicim9/C+ynVP
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L...b.u_...

                        File Icon

                        Icon Hash:b4fc36b6b694c6e2

                        Static PE Info

                        General

                        Entrypoint:0x402738
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x5F75D462 [Thu Oct 1 13:06:42 2020 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:fa148d0c70a978454538a9c9c0513fc1

                        Entrypoint Preview

                        Instruction
                        call 00007F3D40B969A6h
                        jmp 00007F3D40B9315Eh
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        sub esp, 20h
                        mov eax, dword ptr [ebp+08h]
                        push esi
                        push edi
                        push 00000008h
                        pop ecx
                        mov esi, 00413244h
                        lea edi, dword ptr [ebp-20h]
                        rep movsd
                        mov dword ptr [ebp-08h], eax
                        mov eax, dword ptr [ebp+0Ch]
                        pop edi
                        mov dword ptr [ebp-04h], eax
                        pop esi
                        test eax, eax
                        je 00007F3D40B932DEh
                        test byte ptr [eax], 00000008h
                        je 00007F3D40B932D9h
                        mov dword ptr [ebp-0Ch], 01994000h
                        lea eax, dword ptr [ebp-0Ch]
                        push eax
                        push dword ptr [ebp-10h]
                        push dword ptr [ebp-1Ch]
                        push dword ptr [ebp-20h]
                        call dword ptr [004130A4h]
                        leave
                        retn 0008h
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        push ecx
                        push esi
                        mov esi, dword ptr [ebp+0Ch]
                        push esi
                        call 00007F3D40B95834h
                        mov dword ptr [ebp+0Ch], eax
                        mov eax, dword ptr [esi+0Ch]
                        pop ecx
                        test al, 82h
                        jne 00007F3D40B932E9h
                        call 00007F3D40B942CFh
                        mov dword ptr [eax], 00000009h
                        or dword ptr [esi+0Ch], 20h
                        or eax, FFFFFFFFh
                        jmp 00007F3D40B93404h
                        test al, 40h
                        je 00007F3D40B932DFh
                        call 00007F3D40B942B4h
                        mov dword ptr [eax], 00000022h
                        jmp 00007F3D40B932B5h
                        push ebx
                        xor ebx, ebx
                        test al, 01h
                        je 00007F3D40B932E8h
                        mov dword ptr [esi+04h], ebx
                        test al, 10h
                        je 00007F3D40B9335Dh
                        mov ecx, dword ptr [esi+08h]
                        and eax, FFFFFFFEh
                        mov dword ptr [esi], ecx
                        mov dword ptr [esi+0Ch], eax
                        mov eax, dword ptr [esi+0Ch]
                        and eax, FFFFFFEFh
                        or eax, 02h
                        mov dword ptr [esi+0Ch], eax
                        mov dword ptr [esi+04h], ebx
                        mov dword ptr [ebp-04h], ebx

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x16d9c0x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2add0000x16978.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x131c00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x154300x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x130000x178.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x119550x11a00False0.791264960106data7.47772772393IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x130000x45f80x4600False0.281026785714data4.05856795989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x180000x2ac3cd00x1400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .befifup0x2adc0000x2720x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x2add0000x169780x16a00False0.672792213398data6.40537973684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        AFX_DIALOG_LAYOUT0x2af2b100xedata
                        AFX_DIALOG_LAYOUT0x2af2b000xedata
                        AFX_DIALOG_LAYOUT0x2af2b200xedata
                        AFX_DIALOG_LAYOUT0x2af2b300x2data
                        RT_CURSOR0x2af2b380x130data
                        RT_CURSOR0x2af2c800x130data
                        RT_CURSOR0x2af2db00xb0GLS_BINARY_LSB_FIRST
                        RT_ICON0x2add8900xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ade7380x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adefe00x6c8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adf6a80x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adfc100x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae21b80x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae32600x988dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae3be80x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae40c80xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae4f700x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae58180x25a8dBase III DBT, version number 0, next free block index 40Divehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae7dc00x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae8e680x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae93200x6c8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae99e80x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae9f500x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aec4f80x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aec9a00xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aed8480x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aee0f00x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aee6580x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af0c000x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af1ca80x988dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af26300x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_STRING0x2af30400x41edataBulgarianBulgaria
                        RT_STRING0x2af34600x1ccdataBulgarianBulgaria
                        RT_STRING0x2af36300x344dataBulgarianBulgaria
                        RT_GROUP_CURSOR0x2af2c680x14data
                        RT_GROUP_CURSOR0x2af2e600x22data
                        RT_GROUP_ICON0x2ae40500x76dataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2aec9600x3edataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2ae92d00x4cdataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2af2a980x68dataDivehi; Dhivehi; MaldivianMaldives
                        RT_VERSION0x2af2e880x1b4data

                        Imports

                        DLLImport
                        KERNEL32.dllLoadLibraryExW, GetEnvironmentStringsW, SetEvent, GetTickCount, ReadConsoleW, FindActCtxSectionStringA, CreateActCtxW, Sleep, FindNextVolumeW, GetMailslotInfo, GetModuleFileNameW, Module32First, GetCPInfoExW, GetLastError, GetProcAddress, VirtualAlloc, GetAtomNameA, LoadLibraryA, WriteConsoleA, LocalAlloc, BeginUpdateResourceA, SetEnvironmentVariableA, SetConsoleTitleW, EraseTape, GetProcessAffinityMask, SetProcessShutdownParameters, ReleaseMutex, EndUpdateResourceA, GetVersionExA, DeleteAtom, FindNextVolumeA, lstrcpyW, LCMapStringW, HeapReAlloc, EncodePointer, DecodePointer, GetCommandLineA, HeapSetInformation, GetStartupInfoW, RaiseException, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapAlloc, HeapFree, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, GetModuleHandleW, SetLastError, GetCurrentThreadId, InterlockedDecrement, ReadFile, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, SetFilePointer, CloseHandle, ExitProcess, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, MultiByteToWideChar, RtlUnwind, SetStdHandle, FlushFileBuffers, HeapSize, LoadLibraryW, WriteConsoleW, GetStringTypeW, CreateFileW
                        GDI32.dllGetBitmapBits

                        Version Infos

                        DescriptionData
                        InternalNamenomgpiarica.iwa
                        ProductVersion91.40.21.88
                        CopyrightCopyrighz (C) 2021, fudkagat
                        Translation0x0196 0x03fd

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        Divehi; Dhivehi; MaldivianMaldives
                        BulgarianBulgaria

                        Network Behavior

                        Network Port Distribution

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Oct 27, 2021 14:08:02.449810028 CEST5378453192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.076786041 CEST4955753192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.096251965 CEST53495578.8.8.8192.168.2.5
                        Oct 27, 2021 14:08:56.113085985 CEST6173353192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.130479097 CEST53617338.8.8.8192.168.2.5

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Oct 27, 2021 14:08:02.449810028 CEST192.168.2.58.8.8.80xc0ddStandard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.076786041 CEST192.168.2.58.8.8.80x5b0dStandard query (0)gejajoo7.topA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.113085985 CEST192.168.2.58.8.8.80x93dcStandard query (0)sysaheu9.topA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Oct 27, 2021 14:08:02.471621037 CEST8.8.8.8192.168.2.50xc0ddNo error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                        Oct 27, 2021 14:08:56.096251965 CEST8.8.8.8192.168.2.50x5b0dName error (3)gejajoo7.topnonenoneA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.130479097 CEST8.8.8.8192.168.2.50x93dcName error (3)sysaheu9.topnonenoneA (IP address)IN (0x0001)

                        Code Manipulations

                        Statistics

                        CPU Usage

                        Click to jump to process

                        Memory Usage

                        Click to jump to process

                        High Level Behavior Distribution

                        Click to dive into process behavior distribution

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:14:08:06
                        Start date:27/10/2021
                        Path:C:\Users\user\Desktop\IfakQb9U15.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\IfakQb9U15.exe'
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:14:08:12
                        Start date:27/10/2021
                        Path:C:\Users\user\Desktop\IfakQb9U15.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\IfakQb9U15.exe'
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:14:08:19
                        Start date:27/10/2021
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\Explorer.EXE
                        Imagebase:0x7ff693d90000
                        File size:3933184 bytes
                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:14:08:57
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 75%, ReversingLabs
                        Reputation:low

                        General

                        Start time:14:09:04
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:14:10:01
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:14:10:08
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >

                          Executed Functions

                          APIs
                          • Module32First.KERNEL32(00000000,00000224), ref: 030207EE
                          Memory Dump Source
                          • Source File: 00000001.00000002.254310522.0000000003020000.00000040.00000001.sdmp, Offset: 03020000, based on PE: false
                          Similarity
                          • API ID: FirstModule32
                          • String ID:
                          • API String ID: 3757679902-0
                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction ID: 2d4a6bf8b4e6ec787eec33a8e1985639b095df31e20d0ad08bff1a195d85786e
                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction Fuzzy Hash: 56F0F631902B216FE7207BF9D88CB6FBAECAF49625F140169E643914C0DB70E8054B60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 030204B6
                          Memory Dump Source
                          • Source File: 00000001.00000002.254310522.0000000003020000.00000040.00000001.sdmp, Offset: 03020000, based on PE: false
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction ID: a71d145821d7fb3b15df0a1dfef2b1b8104c3f1723c7106cf3303a448bf8db76
                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction Fuzzy Hash: 48112B79A40208EFDB01DF98C985E99BFF5AF08350F058094F9489B361D371EA50DF80
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          Memory Dump Source
                          • Source File: 00000001.00000002.254310522.0000000003020000.00000040.00000001.sdmp, Offset: 03020000, based on PE: false
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                          • Instruction ID: 688a887a516e2a53a835b806a8957c9d636ce0df5eb9a93b7aa48828e5ec16ac
                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                          • Instruction Fuzzy Hash: F2116172341210AFE754DF59DCC1FA677EAEB89220F198065ED08CB316D676EC41C760
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID:
                          • String ID: e]7r
                          • API String ID: 0-1742001642
                          • Opcode ID: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction ID: bf1e4c29e8394bf4e4bff2a2201e1e45ff72a292bd5f2890b18381bc1826da06
                          • Opcode Fuzzy Hash: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction Fuzzy Hash: 0F117B72204201EADB11DA6CDC80AD9BFA49F06734F641277E612EA2F1D27D8417D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction ID: 3b4543c573e0ba230f1e22d973f84f7bf5f4f561b8916cc0aeb5d84fca97e8b3
                          • Opcode Fuzzy Hash: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction Fuzzy Hash: 9A213AB6204104ABE700A658D8A09E97B65EF45324F500637F613FA1F1D1398503D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction ID: 5ba3a312027bf4cf1797921de85fd221b2434d83bcdcec0ecc1a76d435d2ae3a
                          • Opcode Fuzzy Hash: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction Fuzzy Hash: A01129F1708104EBE7006A959CE2EAA37659B40714F20423BF613B91F1C53D8917E76F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction ID: 8b89ce805391e5d9e4a5fd5496950a175fb8b21db30667aa1bc40c731c130f23
                          • Opcode Fuzzy Hash: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction Fuzzy Hash: 8501D4F1208208F7EB006A958CA2EBA36299B01714F200137FA03791F1C57D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction ID: 9b7f6bdcef620c5d42e0dc3f821bb650a351672d2699287832fc7966d72add8e
                          • Opcode Fuzzy Hash: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction Fuzzy Hash: C8F0F4B2604205EADB006A95CCA1EB937259F40354F600537BA13B80F1C53E8912E72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction ID: bf7fe478b6361a2d3af1ea2e56104bb8cefa3ef5372b8a8b631063e2b9725998
                          • Opcode Fuzzy Hash: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction Fuzzy Hash: A4F090B6604204FADB006B909DA1EAA3729AF44758F604537FA13B80E1C67D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          C-Code - Quality: 16%
                          			E00402026(void* __ebx, signed int __edx, signed int __edi, signed int __esi) {
                          				void* _t33;
                          				void* _t34;
                          
                          				asm("out 0xde, al");
                          				asm("daa");
                          				 *(_t34 + 0x4cf135b4 + __esi * 4) =  *(_t34 + 0x4cf135b4 + __esi * 4) ^ __edx;
                          				asm("ror dword [esi+ebx*8-0xc], 0x4b");
                          				asm("out 0x8c, eax");
                          				asm("out 0x4b, al");
                          				asm("ror dword [ebx+ecx*2-0x3f], 0x40");
                          				asm("fidiv word [ecx-0x4bcfd8b5]");
                          				 *(__ebx - 1 + 0x31 + __edi * 4) =  *(__ebx - 1 + 0x31 + __edi * 4) ^ __esi;
                          				 *((intOrPtr*)(_t33 - 0x36c04b4c)) = __esi;
                          				asm("aaa");
                          				return 0x3f;
                          			}





                          0x00402026
                          0x0040202e
                          0x0040202f
                          0x0040203b
                          0x00402040
                          0x00402048
                          0x0040204a
                          0x0040204f
                          0x00402057
                          0x0040205b
                          0x00402062
                          0x0040206c

                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: b95e2b3195e10779ef01e2a27758ed59e200c4e99d105a1e15f10fcf0d8e9fb5
                          • Instruction ID: 7c26e6f1656fdbe0b769c41c2a217c8b6475646d2629368b27b629d2478ea2cd
                          • Opcode Fuzzy Hash: b95e2b3195e10779ef01e2a27758ed59e200c4e99d105a1e15f10fcf0d8e9fb5
                          • Instruction Fuzzy Hash: 93E0927D8187B4CBC7229F60D0802CABBA0FE44254B9258EDC4A75F31AD2249867DF63
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 23%
                          			E004026CF(void* __ebx, void* __ecx, signed int __edx, signed int __esi, signed int __fp0) {
                          				void* _t88;
                          				void* _t108;
                          				signed int _t116;
                          				void* _t119;
                          				signed long long _t132;
                          
                          				_t119 = 0xb4b4f45c;
                          				asm("invalid");
                          				 *(__ecx + __edx * 4 - 0x384b174c) =  *(__ecx + __edx * 4 - 0x384b174c) << 0xb4;
                          				asm("int 0xb4");
                          				asm("invalid");
                          				 *(__ecx + __edx * 8 - 0x784b264c) =  *(__ecx + __edx * 8 - 0x784b264c) << 0xb4;
                          				 *((intOrPtr*)(0xdb + _t116 * 8 - 0x3f4b254c)) = __edx;
                          				 *0x00000135 =  *0x00000135 | 0x000000ec;
                          				_t88 = __ebx;
                          				_t132 = __fp0 /  *0xFFFFFFFFE3B4B5A1;
                          				asm("in al, 0x4b");
                          				asm("out 0x90, eax");
                          				asm("fidiv word [edi-0x4b231b1c]");
                          				do {
                          					asm("jecxz 0x4d");
                          					asm("out 0x98, eax");
                          					asm("aaa");
                          					_t119 = _t119 - 1;
                          					_t88 = _t88 - 1;
                          					asm("ror byte [ecx+0x7485723d], 0xe4");
                          					asm("in al, 0xe4");
                          					_t132 = _t132 /  *(__esi - 0x1b4a4b4c);
                          					asm("loop 0x4d");
                          					asm("out 0x84, eax");
                          					 *0x00000170 =  *0x00000170 ^ __esi;
                          					asm("in al, 0xe4");
                          					asm("fidiv word [eax-0x7f18b41e]");
                          					 *0x00000177 =  *0x00000177 ^ __esi;
                          					asm("aas");
                          					asm("stc");
                          				} while ( *0x00000177 == 0);
                          				asm("int1");
                          				asm("fcom qword [eax-0x134b4b6e]");
                          				asm("insd");
                          				do {
                          					asm("jecxz 0xffffffe4");
                          					asm("fidiv word [esi+ebx*8-0x4318b44c]");
                          					 *0x111440BC0 =  *0x111440BC0 ^ __esi;
                          				} while ( *0x111440BC0 >= 0);
                          				_pop(_t108);
                          				 *((intOrPtr*)(_t108 + 0x41)) = 0x5f;
                          				asm("sti");
                          				asm("aas");
                          				asm("stc");
                          				asm("lds ebx, [esi+edx*4+0x5e]");
                          				return  *0xFFFFFFFFB548F16F;
                          			}








                          0x004026cf
                          0x004026e7
                          0x004026e9
                          0x004026f1
                          0x004026f3
                          0x004026f5
                          0x004026fd
                          0x00402717
                          0x0040271b
                          0x0040271c
                          0x00402722
                          0x00402724
                          0x0040272e
                          0x00402733
                          0x00402737
                          0x00402739
                          0x0040273b
                          0x0040273c
                          0x0040273d
                          0x0040273e
                          0x00402745
                          0x00402747
                          0x0040274d
                          0x0040274f
                          0x00402751
                          0x0040275a
                          0x0040275c
                          0x00402762
                          0x00402766
                          0x00402767
                          0x0040276f
                          0x0040277e
                          0x0040278a
                          0x00402793
                          0x004027fa
                          0x004027fa
                          0x004027fc
                          0x00402803
                          0x00402803
                          0x00402819
                          0x0040281c
                          0x00402826
                          0x00402827
                          0x00402830
                          0x00402833
                          0x00402840

                          Memory Dump Source
                          • Source File: 00000003.00000002.314150147.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9cfb81e8f6b5c81ea88f57b0be1cd50cc153469cce6c71e7b36acc20c85c89d9
                          • Instruction ID: c133d59ad69d030008a1335eada2cd2e51b6d26b831861fabc137822d8edb402
                          • Opcode Fuzzy Hash: 9cfb81e8f6b5c81ea88f57b0be1cd50cc153469cce6c71e7b36acc20c85c89d9
                          • Instruction Fuzzy Hash: 67313C2D2046584BE312876CE0803D9F7F0EA55325760567BC473DF3A1E5A58443DFB1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Executed Functions

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 04B20156
                          • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 04B2016C
                          • CreateProcessA.KERNELBASE(?,00000000), ref: 04B20255
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 04B20270
                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 04B20283
                          • GetThreadContext.KERNELBASE(00000000,?), ref: 04B2029F
                          • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 04B202C8
                          • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 04B202E3
                          • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 04B20304
                          • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 04B2032A
                          • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 04B20399
                          • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 04B203BF
                          • SetThreadContext.KERNELBASE(00000000,?), ref: 04B203E1
                          • ResumeThread.KERNELBASE(00000000), ref: 04B203ED
                          • ExitProcess.KERNEL32(00000000), ref: 04B20412
                          Memory Dump Source
                          • Source File: 0000000D.00000002.365864434.0000000004B20000.00000040.00000001.sdmp, Offset: 04B20000, based on PE: false
                          Similarity
                          • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                          • String ID:
                          • API String ID: 2875986403-0
                          • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                          • Instruction ID: caf3d8ac8cc9d8d8ef0e7d46ebc8d4ef808f34d1af3a8b170e40b7029da67024
                          • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                          • Instruction Fuzzy Hash: 34B1C874A00208AFDB44CF98C995F9EBBB5FF88314F248158E609AB391D771AE41CF94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 04B20533
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.365864434.0000000004B20000.00000040.00000001.sdmp, Offset: 04B20000, based on PE: false
                          Similarity
                          • API ID: CreateWindow
                          • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                          • API String ID: 716092398-2341455598
                          • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                          • Instruction ID: 91c42c6f80125d6f73240c5cca8d4737bb2eed8172ed7504df277231ecd78437
                          • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                          • Instruction Fuzzy Hash: 3B512C70D08388DEEB11DBD8C949BDDBFB2AF11708F144099E5487F286C3BA5558CB65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileAttributesA.KERNELBASE(apfHQ), ref: 04B205EC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.365864434.0000000004B20000.00000040.00000001.sdmp, Offset: 04B20000, based on PE: false
                          Similarity
                          • API ID: AttributesFile
                          • String ID: apfHQ$o
                          • API String ID: 3188754299-2999369273
                          • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                          • Instruction ID: 3d41c8a4c6fef7e1dc334ce53a5765cc22300d78d103fd9a5dd643eb352b285c
                          • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                          • Instruction Fuzzy Hash: AB011E70C0425CEEDF11EB98C5583AEBFB5AF41308F1480D9C5192B342D7B6AB58CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Module32First.KERNEL32(00000000,00000224), ref: 04B107EE
                          Memory Dump Source
                          • Source File: 0000000D.00000002.365852420.0000000004B10000.00000040.00000001.sdmp, Offset: 04B10000, based on PE: false
                          Similarity
                          • API ID: FirstModule32
                          • String ID:
                          • API String ID: 3757679902-0
                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction ID: 754c396f5135fe7d0667e926b30179defed81b8ed75f4aa1e027be4983d8ada5
                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction Fuzzy Hash: 44F096311017156FE7203BF9A98CB6F76E8EF49765F500568E643918D0DB70F8854A61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 04B104B6
                          Memory Dump Source
                          • Source File: 0000000D.00000002.365852420.0000000004B10000.00000040.00000001.sdmp, Offset: 04B10000, based on PE: false
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction ID: d24a91bb2ad8238445f1b7885066bec9bcb4c6c6cde0b8614e695bfb060d2695
                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction Fuzzy Hash: 18113C79A40208EFDB01DF98C985E98BBF5EF08350F0580A4F9489B362D775EA90DF80
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          Executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID:
                          • String ID: e]7r
                          • API String ID: 0-1742001642
                          • Opcode ID: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction ID: bf1e4c29e8394bf4e4bff2a2201e1e45ff72a292bd5f2890b18381bc1826da06
                          • Opcode Fuzzy Hash: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction Fuzzy Hash: 0F117B72204201EADB11DA6CDC80AD9BFA49F06734F641277E612EA2F1D27D8417D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction ID: 3b4543c573e0ba230f1e22d973f84f7bf5f4f561b8916cc0aeb5d84fca97e8b3
                          • Opcode Fuzzy Hash: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction Fuzzy Hash: 9A213AB6204104ABE700A658D8A09E97B65EF45324F500637F613FA1F1D1398503D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction ID: 5ba3a312027bf4cf1797921de85fd221b2434d83bcdcec0ecc1a76d435d2ae3a
                          • Opcode Fuzzy Hash: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction Fuzzy Hash: A01129F1708104EBE7006A959CE2EAA37659B40714F20423BF613B91F1C53D8917E76F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction ID: 8b89ce805391e5d9e4a5fd5496950a175fb8b21db30667aa1bc40c731c130f23
                          • Opcode Fuzzy Hash: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction Fuzzy Hash: 8501D4F1208208F7EB006A958CA2EBA36299B01714F200137FA03791F1C57D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction ID: 9b7f6bdcef620c5d42e0dc3f821bb650a351672d2699287832fc7966d72add8e
                          • Opcode Fuzzy Hash: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction Fuzzy Hash: C8F0F4B2604205EADB006A95CCA1EB937259F40354F600537BA13B80F1C53E8912E72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 00401990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.376719909.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction ID: bf7fe478b6361a2d3af1ea2e56104bb8cefa3ef5372b8a8b631063e2b9725998
                          • Opcode Fuzzy Hash: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction Fuzzy Hash: A4F090B6604204FADB006B909DA1EAA3729AF44758F604537FA13B80E1C67D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          Executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID:
                          • String ID: e]7r
                          • API String ID: 0-1742001642
                          • Opcode ID: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction ID: bf1e4c29e8394bf4e4bff2a2201e1e45ff72a292bd5f2890b18381bc1826da06
                          • Opcode Fuzzy Hash: 03dabbdefebf35592a7e489612839204698ad1d532f466162c5cb3ec3cc83112
                          • Instruction Fuzzy Hash: 0F117B72204201EADB11DA6CDC80AD9BFA49F06734F641277E612EA2F1D27D8417D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction ID: 3b4543c573e0ba230f1e22d973f84f7bf5f4f561b8916cc0aeb5d84fca97e8b3
                          • Opcode Fuzzy Hash: b9e8b6c3a396528a02766151ac80215df6808ed46c491a630c8b4addad5b2223
                          • Instruction Fuzzy Hash: 9A213AB6204104ABE700A658D8A09E97B65EF45324F500637F613FA1F1D1398503D76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction ID: 5ba3a312027bf4cf1797921de85fd221b2434d83bcdcec0ecc1a76d435d2ae3a
                          • Opcode Fuzzy Hash: 8f6aaa765b384a1ca6b9085d391a065f5c2b0d66ca6cf13303226a7e7991df59
                          • Instruction Fuzzy Hash: A01129F1708104EBE7006A959CE2EAA37659B40714F20423BF613B91F1C53D8917E76F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction ID: 8b89ce805391e5d9e4a5fd5496950a175fb8b21db30667aa1bc40c731c130f23
                          • Opcode Fuzzy Hash: 166619090f86e890d9f4e64b01d5ddc217048a2ac15b80f1daf0267cdb0f7fe2
                          • Instruction Fuzzy Hash: 8501D4F1208208F7EB006A958CA2EBA36299B01714F200137FA03791F1C57D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction ID: 9b7f6bdcef620c5d42e0dc3f821bb650a351672d2699287832fc7966d72add8e
                          • Opcode Fuzzy Hash: 2d64bca195404cee0333814b2ef8ec0553eed4e2ba03261d5e2f524a08d745ed
                          • Instruction Fuzzy Hash: C8F0F4B2604205EADB006A95CCA1EB937259F40354F600537BA13B80F1C53E8912E72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401968
                          Memory Dump Source
                          • Source File: 0000001C.00000002.507025170.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction ID: bf7fe478b6361a2d3af1ea2e56104bb8cefa3ef5372b8a8b631063e2b9725998
                          • Opcode Fuzzy Hash: edfc9a790569f0aa8855381c8dabeef7a37c8e7775369727eab9c7c6cc54e3ce
                          • Instruction Fuzzy Hash: A4F090B6604204FADB006B909DA1EAA3729AF44758F604537FA13B80E1C67D8912E76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions