Loading ...

Play interactive tourEdit tour

Windows Analysis Report IfakQb9U15.exe

Overview

General Information

Sample Name:IfakQb9U15.exe
Analysis ID:510140
MD5:36f662b3c9a54c0c2427602f1463eb69
SHA1:7e46615097282ac51ef08d3e4ac7d65ce6684a07
SHA256:d836a03e0b7eeabbc971de7d3e6fcc11bf06e13e633d11118c7429b3abb3c4ed
Tags:exeSmokeLoader
Infos:

Most interesting Screenshot:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • IfakQb9U15.exe (PID: 4748 cmdline: 'C:\Users\user\Desktop\IfakQb9U15.exe' MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • IfakQb9U15.exe (PID: 2456 cmdline: 'C:\Users\user\Desktop\IfakQb9U15.exe' MD5: 36F662B3C9A54C0C2427602F1463EB69)
      • explorer.exe (PID: 3472 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • jjevwiw (PID: 6372 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • jjevwiw (PID: 6404 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
  • jjevwiw (PID: 5852 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
    • jjevwiw (PID: 5868 cmdline: C:\Users\user\AppData\Roaming\jjevwiw MD5: 36F662B3C9A54C0C2427602F1463EB69)
  • cleanup

Malware Configuration

Threatname: SmokeLoader

{"C2 list": ["http://gejajoo7.top/", "http://sysaheu9.top/"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            28.0.jjevwiw.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              28.2.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                28.1.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  14.1.jjevwiw.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    27.2.jjevwiw.30815a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                      Click to see the 7 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://gejajoo7.top/", "http://sysaheu9.top/"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: IfakQb9U15.exeVirustotal: Detection: 38%Perma Link
                      Source: IfakQb9U15.exeReversingLabs: Detection: 75%
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: IfakQb9U15.exeAvira: detected
                      Antivirus detection for URL or domainShow sources
                      Source: http://sysaheu9.top/Avira URL Cloud: Label: malware
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: gejajoo7.topVirustotal: Detection: 9%Perma Link
                      Source: sysaheu9.topVirustotal: Detection: 12%Perma Link
                      Antivirus detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwAvira: detection malicious, Label: TR/Redcap.yyhtm
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwReversingLabs: Detection: 75%
                      Machine Learning detection for sampleShow sources
                      Source: IfakQb9U15.exeJoe Sandbox ML: detected
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwJoe Sandbox ML: detected
                      Source: 14.0.jjevwiw.400000.1.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.2.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 1.0.IfakQb9U15.exe.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.3.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.1.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 27.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 13.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.2.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 3.0.IfakQb9U15.exe.400000.3.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: 14.0.jjevwiw.400000.0.unpackAvira: Label: TR/Redcap.yyhtm
                      Source: IfakQb9U15.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: Binary string: C:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: Binary string: HC:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe

                      Networking:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\explorer.exeDomain query: gejajoo7.top
                      Source: C:\Windows\explorer.exeDomain query: sysaheu9.top
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: http://gejajoo7.top/
                      Source: Malware configuration extractorURLs: http://sysaheu9.top/
                      Source: unknownDNS traffic detected: queries for: clientconfig.passport.net

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY
                      Source: IfakQb9U15.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401927 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401942 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401949 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401956 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00402026 LocalAlloc,NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_004018C9 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00401886 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_1_00402026 LocalAlloc,NtQuerySystemInformation,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401927 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401942 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401949 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401956 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00402026 LocalAlloc,NtQuerySystemInformation,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_004018C9 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00401886 Sleep,NtTerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 28_2_00402026 LocalAlloc,NtQuerySystemInformation,
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: IfakQb9U15.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: jjevwiw.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\explorer.exeSection loaded: webio.dll
                      Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                      Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\jjevwiw D836A03E0B7EEABBC971DE7D3E6FCC11BF06E13E633D11118C7429B3ABB3C4ED
                      Source: IfakQb9U15.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: jjevwiw.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: IfakQb9U15.exeVirustotal: Detection: 38%
                      Source: IfakQb9U15.exeReversingLabs: Detection: 75%
                      Source: IfakQb9U15.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/2@3/0
                      Source: IfakQb9U15.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: IfakQb9U15.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: Binary string: HC:\gawi_lemi-morur\16\suweg\xoyabel\les pugoy-74_lafi\t.pdb source: IfakQb9U15.exe
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_03022E12 push eax; retf
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_00402EED push eax; ret
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_1_00402EED push eax; ret
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B12E12 push eax; retf
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 14_2_00402EED push eax; ret
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 28_2_00402EED push eax; ret
                      Source: IfakQb9U15.exeStatic PE information: section name: .befifup
                      Source: jjevwiw.5.drStatic PE information: section name: .befifup
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.47772772393
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.47772772393
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jjevwiwJump to dropped file

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Deletes itself after installationShow sources
                      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\ifakqb9u15.exeJump to behavior
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jjevwiw:Zone.Identifier read attributes | delete
                      Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes

                      Malware Analysis System Evasion:

                      barindex
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: IfakQb9U15.exe, 00000003.00000002.314378875.0000000001F90000.00000004.00000001.sdmp, jjevwiw, 0000000E.00000002.376786636.0000000000657000.00000004.00000020.sdmp, jjevwiw, 0000001C.00000002.507811575.0000000001FB0000.00000004.00000001.sdmpBinary or memory string: ASWHOOK
                      Checks if the current machine is a virtual machine (disk enumeration)Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Users\user\AppData\Roaming\jjevwiwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Windows\explorer.exe TID: 6024Thread sleep count: 563 > 30
                      Source: C:\Windows\explorer.exe TID: 3000Thread sleep count: 378 > 30
                      Source: C:\Windows\explorer.exe TID: 3000Thread sleep time: -37800s >= -30000s
                      Source: C:\Windows\explorer.exe TID: 328Thread sleep count: 456 > 30
                      Source: C:\Windows\explorer.exe TID: 328Thread sleep time: -45600s >= -30000s
                      Source: C:\Windows\explorer.exe TID: 6760Thread sleep count: 390 > 30
                      Source: C:\Windows\explorer.exe TID: 6768Thread sleep count: 251 > 30
                      Source: C:\Users\user\AppData\Roaming\jjevwiwLast function: Thread delayed
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 563
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 378
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 456
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 390
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSystem information queried: ModuleInformation
                      Source: explorer.exe, 00000005.00000000.302263602.000000000891C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
                      Source: explorer.exe, 00000005.00000000.283570446.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.297854831.000000000374F000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
                      Source: explorer.exe, 00000005.00000000.282249776.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b};`
                      Source: explorer.exe, 00000005.00000000.302357156.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
                      Source: explorer.exe, 00000005.00000000.298561446.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
                      Source: explorer.exe, 00000005.00000000.302357156.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
                      Source: explorer.exe, 00000005.00000000.303969599.000000000DC40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}`

                      Anti Debugging:

                      barindex
                      Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSystem information queried: CodeIntegrityInformation
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSystem information queried: CodeIntegrityInformation
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSystem information queried: CodeIntegrityInformation
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_03020083 push dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B10083 push dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20042 push dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 3_2_004026CF EntryPoint,CreateFileW,MapViewOfFile,LdrLoadDll,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Benign windows process drops PE filesShow sources
                      Source: C:\Windows\explorer.exeFile created: jjevwiw.5.drJump to dropped file
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\explorer.exeDomain query: gejajoo7.top
                      Source: C:\Windows\explorer.exeDomain query: sysaheu9.top
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                      Source: C:\Users\user\AppData\Roaming\jjevwiwSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwMemory written: C:\Users\user\AppData\Roaming\jjevwiw base: 400000 value starts with: 4D5A
                      Contains functionality to inject code into remote processesShow sources
                      Source: C:\Users\user\AppData\Roaming\jjevwiwCode function: 13_2_04B20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                      Creates a thread in another existing process (thread injection)Show sources
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeThread created: C:\Windows\explorer.exe EIP: 30C1920
                      Source: C:\Users\user\AppData\Roaming\jjevwiwThread created: unknown EIP: 3A71920
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeProcess created: C:\Users\user\Desktop\IfakQb9U15.exe 'C:\Users\user\Desktop\IfakQb9U15.exe'
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: C:\Users\user\AppData\Roaming\jjevwiwProcess created: C:\Users\user\AppData\Roaming\jjevwiw C:\Users\user\AppData\Roaming\jjevwiw
                      Source: explorer.exe, 00000005.00000000.276042708.00000000089FF000.00000004.00000001.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                      Source: explorer.exe, 00000005.00000000.265816430.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: explorer.exe, 00000005.00000000.296505241.0000000001640000.00000002.00020000.sdmp, jjevwiw, 0000001C.00000002.507596888.0000000000BA0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\IfakQb9U15.exeCode function: 1_2_00405E0E GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected SmokeLoaderShow sources
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.1.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.jjevwiw.30815a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.jjevwiw.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.0.jjevwiw.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.IfakQb9U15.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.jjevwiw.4b215a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.IfakQb9U15.exe.31415a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsExploitation for Client Execution1DLL Side-Loading1Process Injection512Masquerading11OS Credential DumpingSystem Time Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion12LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection512Security Account ManagerSecurity Software Discovery411SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Hidden Files and Directories1NTDSVirtualization/Sandbox Evasion12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing3Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncSystem Information Discovery4Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510140 Sample: IfakQb9U15.exe Startdate: 27/10/2021 Architecture: WINDOWS Score: 100 31 clientconfig.passport.net 2->31 37 Multi AV Scanner detection for domain / URL 2->37 39 Found malware configuration 2->39 41 Antivirus detection for URL or domain 2->41 43 6 other signatures 2->43 8 IfakQb9U15.exe 2->8         started        10 jjevwiw 2->10         started        13 jjevwiw 2->13         started        signatures3 process4 signatures5 15 IfakQb9U15.exe 8->15         started        53 Antivirus detection for dropped file 10->53 55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 2 other signatures 10->59 18 jjevwiw 10->18         started        20 jjevwiw 13->20         started        process6 signatures7 61 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Checks if the current machine is a virtual machine (disk enumeration) 15->65 22 explorer.exe 2 15->22 injected 67 Creates a thread in another existing process (thread injection) 18->67 process8 dnsIp9 33 sysaheu9.top 22->33 35 gejajoo7.top 22->35 27 C:\Users\user\AppData\Roaming\jjevwiw, PE32 22->27 dropped 29 C:\Users\user\...\jjevwiw:Zone.Identifier, ASCII 22->29 dropped 45 System process connects to network (likely due to code injection or exploit) 22->45 47 Benign windows process drops PE files 22->47 49 Deletes itself after installation 22->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->51 file10 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      IfakQb9U15.exe38%VirustotalBrowse
                      IfakQb9U15.exe75%ReversingLabsWin32.Ransomware.StopCrypt
                      IfakQb9U15.exe100%AviraTR/Redcap.yyhtm
                      IfakQb9U15.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\jjevwiw100%AviraTR/Redcap.yyhtm
                      C:\Users\user\AppData\Roaming\jjevwiw100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\jjevwiw75%ReversingLabsWin32.Ransomware.StopCrypt

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      28.2.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.1.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.2.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.2.jjevwiw.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      14.0.jjevwiw.400000.2.unpack100%AviraTR/Redcap.yyhtmDownload File
                      14.2.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.0.jjevwiw.400000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.jjevwiw.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      1.2.IfakQb9U15.exe.31415a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.3.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.1.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      14.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      28.0.jjevwiw.400000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.IfakQb9U15.exe.400000.0.unpack100%AviraHEUR/AGEN.1124573Download File
                      3.0.IfakQb9U15.exe.400000.2.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      3.0.IfakQb9U15.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.IfakQb9U15.exe.400000.3.unpack100%AviraTR/Redcap.yyhtmDownload File
                      1.1.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      27.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.1.IfakQb9U15.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.1.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.jjevwiw.4b215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.0.unpack100%AviraTR/Redcap.yyhtmDownload File
                      27.2.jjevwiw.30815a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.0.jjevwiw.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      28.0.jjevwiw.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      SourceDetectionScannerLabelLink
                      clientconfig.passport.net0%VirustotalBrowse
                      gejajoo7.top10%VirustotalBrowse
                      sysaheu9.top12%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://gejajoo7.top/0%Avira URL Cloudsafe
                      http://sysaheu9.top/100%Avira URL Cloudmalware

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      clientconfig.passport.net
                      unknown
                      unknowntrueunknown
                      gejajoo7.top
                      unknown
                      unknowntrueunknown
                      sysaheu9.top
                      unknown
                      unknowntrueunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://gejajoo7.top/true
                      • Avira URL Cloud: safe
                      unknown
                      http://sysaheu9.top/true
                      • Avira URL Cloud: malware
                      unknown

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:510140
                      Start date:27.10.2021
                      Start time:14:07:11
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 25s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:IfakQb9U15.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:28
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@9/2@3/0
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 80.2% (good quality ratio 62.1%)
                      • Quality average: 43.3%
                      • Quality standard deviation: 31%
                      HCA Information:
                      • Successful, ratio: 67%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 23.203.70.208, 96.16.150.73, 20.50.102.62, 204.79.197.200, 13.107.21.200, 23.211.6.115, 23.211.4.86, 20.82.210.154, 23.203.78.112, 80.67.82.235, 80.67.82.211, 40.112.88.60
                      • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e15275.g.akamaiedge.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, go.microsoft.com, wildcard.weather.microsoft.com.edgekey.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, tile-service.weather.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net
                      • Not all processes where analyzed, report is missing behavior information

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      14:08:57Task SchedulerRun new task: Firefox Default Browser Agent 7A4EC823D5D4514B path: C:\Users\user\AppData\Roaming\jjevwiw

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Roaming\jjevwiwcx6hZvW5HV.exeGet hashmaliciousBrowse

                        Created / dropped Files

                        C:\Users\user\AppData\Roaming\jjevwiw
                        Process:C:\Windows\explorer.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):189952
                        Entropy (8bit):6.772121581791356
                        Encrypted:false
                        SSDEEP:3072:5+d4MmCHgQlJeblXMLQPAkilxUj3RMsOEd7lj/CrzeuVMO6P2+BwvHJ3/Rg:Ad4aHgaulXyQ4kicim9/C+ynVP
                        MD5:36F662B3C9A54C0C2427602F1463EB69
                        SHA1:7E46615097282AC51EF08D3E4AC7D65CE6684A07
                        SHA-256:D836A03E0B7EEABBC971DE7D3E6FCC11BF06E13E633D11118C7429B3ABB3C4ED
                        SHA-512:35B60C6DA50B94484A77F40C3446BEB1D5562128F5585731A09328140C68C7B57F1727CC0783B439DAFB5660C93CA1BD4E1C3F443261545AAA9B22C0DE9A1599
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 75%
                        Joe Sandbox View:
                        • Filename: cx6hZvW5HV.exe, Detection: malicious, Browse
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L...b.u_.....................p......8'.......0....@..........................@......E........................................m..<......xi...........................1..............................0T..@............0..x............................text...U........................... ..`.rdata...E...0...F..................@..@.data....<...........d..............@....befifupr............x..............@..@.rsrc...xi......j...|..............@..@........................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Roaming\jjevwiw:Zone.Identifier
                        Process:C:\Windows\explorer.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview: [ZoneTransfer]....ZoneId=0

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.772121581791356
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.94%
                        • Clipper DOS Executable (2020/12) 0.02%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • VXD Driver (31/22) 0.00%
                        File name:IfakQb9U15.exe
                        File size:189952
                        MD5:36f662b3c9a54c0c2427602f1463eb69
                        SHA1:7e46615097282ac51ef08d3e4ac7d65ce6684a07
                        SHA256:d836a03e0b7eeabbc971de7d3e6fcc11bf06e13e633d11118c7429b3abb3c4ed
                        SHA512:35b60c6da50b94484a77f40c3446beb1d5562128f5585731a09328140c68c7b57f1727cc0783b439dafb5660c93ca1bd4e1c3f443261545aaa9b22c0de9a1599
                        SSDEEP:3072:5+d4MmCHgQlJeblXMLQPAkilxUj3RMsOEd7lj/CrzeuVMO6P2+BwvHJ3/Rg:Ad4aHgaulXyQ4kicim9/C+ynVP
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L...b.u_...

                        File Icon

                        Icon Hash:b4fc36b6b694c6e2

                        Static PE Info

                        General

                        Entrypoint:0x402738
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x5F75D462 [Thu Oct 1 13:06:42 2020 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:fa148d0c70a978454538a9c9c0513fc1

                        Entrypoint Preview

                        Instruction
                        call 00007F3D40B969A6h
                        jmp 00007F3D40B9315Eh
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        sub esp, 20h
                        mov eax, dword ptr [ebp+08h]
                        push esi
                        push edi
                        push 00000008h
                        pop ecx
                        mov esi, 00413244h
                        lea edi, dword ptr [ebp-20h]
                        rep movsd
                        mov dword ptr [ebp-08h], eax
                        mov eax, dword ptr [ebp+0Ch]
                        pop edi
                        mov dword ptr [ebp-04h], eax
                        pop esi
                        test eax, eax
                        je 00007F3D40B932DEh
                        test byte ptr [eax], 00000008h
                        je 00007F3D40B932D9h
                        mov dword ptr [ebp-0Ch], 01994000h
                        lea eax, dword ptr [ebp-0Ch]
                        push eax
                        push dword ptr [ebp-10h]
                        push dword ptr [ebp-1Ch]
                        push dword ptr [ebp-20h]
                        call dword ptr [004130A4h]
                        leave
                        retn 0008h
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        push ecx
                        push esi
                        mov esi, dword ptr [ebp+0Ch]
                        push esi
                        call 00007F3D40B95834h
                        mov dword ptr [ebp+0Ch], eax
                        mov eax, dword ptr [esi+0Ch]
                        pop ecx
                        test al, 82h
                        jne 00007F3D40B932E9h
                        call 00007F3D40B942CFh
                        mov dword ptr [eax], 00000009h
                        or dword ptr [esi+0Ch], 20h
                        or eax, FFFFFFFFh
                        jmp 00007F3D40B93404h
                        test al, 40h
                        je 00007F3D40B932DFh
                        call 00007F3D40B942B4h
                        mov dword ptr [eax], 00000022h
                        jmp 00007F3D40B932B5h
                        push ebx
                        xor ebx, ebx
                        test al, 01h
                        je 00007F3D40B932E8h
                        mov dword ptr [esi+04h], ebx
                        test al, 10h
                        je 00007F3D40B9335Dh
                        mov ecx, dword ptr [esi+08h]
                        and eax, FFFFFFFEh
                        mov dword ptr [esi], ecx
                        mov dword ptr [esi+0Ch], eax
                        mov eax, dword ptr [esi+0Ch]
                        and eax, FFFFFFEFh
                        or eax, 02h
                        mov dword ptr [esi+0Ch], eax
                        mov dword ptr [esi+04h], ebx
                        mov dword ptr [ebp-04h], ebx

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x16d9c0x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2add0000x16978.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x131c00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x154300x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x130000x178.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x119550x11a00False0.791264960106data7.47772772393IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x130000x45f80x4600False0.281026785714data4.05856795989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x180000x2ac3cd00x1400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .befifup0x2adc0000x2720x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x2add0000x169780x16a00False0.672792213398data6.40537973684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        AFX_DIALOG_LAYOUT0x2af2b100xedata
                        AFX_DIALOG_LAYOUT0x2af2b000xedata
                        AFX_DIALOG_LAYOUT0x2af2b200xedata
                        AFX_DIALOG_LAYOUT0x2af2b300x2data
                        RT_CURSOR0x2af2b380x130data
                        RT_CURSOR0x2af2c800x130data
                        RT_CURSOR0x2af2db00xb0GLS_BINARY_LSB_FIRST
                        RT_ICON0x2add8900xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ade7380x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adefe00x6c8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adf6a80x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2adfc100x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae21b80x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae32600x988dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae3be80x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae40c80xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae4f700x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae58180x25a8dBase III DBT, version number 0, next free block index 40Divehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae7dc00x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae8e680x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae93200x6c8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae99e80x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2ae9f500x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aec4f80x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aec9a00xea8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aed8480x8a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aee0f00x568GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2aee6580x25a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af0c000x10a8dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af1ca80x988dataDivehi; Dhivehi; MaldivianMaldives
                        RT_ICON0x2af26300x468GLS_BINARY_LSB_FIRSTDivehi; Dhivehi; MaldivianMaldives
                        RT_STRING0x2af30400x41edataBulgarianBulgaria
                        RT_STRING0x2af34600x1ccdataBulgarianBulgaria
                        RT_STRING0x2af36300x344dataBulgarianBulgaria
                        RT_GROUP_CURSOR0x2af2c680x14data
                        RT_GROUP_CURSOR0x2af2e600x22data
                        RT_GROUP_ICON0x2ae40500x76dataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2aec9600x3edataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2ae92d00x4cdataDivehi; Dhivehi; MaldivianMaldives
                        RT_GROUP_ICON0x2af2a980x68dataDivehi; Dhivehi; MaldivianMaldives
                        RT_VERSION0x2af2e880x1b4data

                        Imports

                        DLLImport
                        KERNEL32.dllLoadLibraryExW, GetEnvironmentStringsW, SetEvent, GetTickCount, ReadConsoleW, FindActCtxSectionStringA, CreateActCtxW, Sleep, FindNextVolumeW, GetMailslotInfo, GetModuleFileNameW, Module32First, GetCPInfoExW, GetLastError, GetProcAddress, VirtualAlloc, GetAtomNameA, LoadLibraryA, WriteConsoleA, LocalAlloc, BeginUpdateResourceA, SetEnvironmentVariableA, SetConsoleTitleW, EraseTape, GetProcessAffinityMask, SetProcessShutdownParameters, ReleaseMutex, EndUpdateResourceA, GetVersionExA, DeleteAtom, FindNextVolumeA, lstrcpyW, LCMapStringW, HeapReAlloc, EncodePointer, DecodePointer, GetCommandLineA, HeapSetInformation, GetStartupInfoW, RaiseException, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapAlloc, HeapFree, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, GetModuleHandleW, SetLastError, GetCurrentThreadId, InterlockedDecrement, ReadFile, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, SetFilePointer, CloseHandle, ExitProcess, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, MultiByteToWideChar, RtlUnwind, SetStdHandle, FlushFileBuffers, HeapSize, LoadLibraryW, WriteConsoleW, GetStringTypeW, CreateFileW
                        GDI32.dllGetBitmapBits

                        Version Infos

                        DescriptionData
                        InternalNamenomgpiarica.iwa
                        ProductVersion91.40.21.88
                        CopyrightCopyrighz (C) 2021, fudkagat
                        Translation0x0196 0x03fd

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        Divehi; Dhivehi; MaldivianMaldives
                        BulgarianBulgaria

                        Network Behavior

                        Network Port Distribution

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Oct 27, 2021 14:08:02.449810028 CEST5378453192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.076786041 CEST4955753192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.096251965 CEST53495578.8.8.8192.168.2.5
                        Oct 27, 2021 14:08:56.113085985 CEST6173353192.168.2.58.8.8.8
                        Oct 27, 2021 14:08:56.130479097 CEST53617338.8.8.8192.168.2.5

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Oct 27, 2021 14:08:02.449810028 CEST192.168.2.58.8.8.80xc0ddStandard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.076786041 CEST192.168.2.58.8.8.80x5b0dStandard query (0)gejajoo7.topA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.113085985 CEST192.168.2.58.8.8.80x93dcStandard query (0)sysaheu9.topA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Oct 27, 2021 14:08:02.471621037 CEST8.8.8.8192.168.2.50xc0ddNo error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                        Oct 27, 2021 14:08:56.096251965 CEST8.8.8.8192.168.2.50x5b0dName error (3)gejajoo7.topnonenoneA (IP address)IN (0x0001)
                        Oct 27, 2021 14:08:56.130479097 CEST8.8.8.8192.168.2.50x93dcName error (3)sysaheu9.topnonenoneA (IP address)IN (0x0001)

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:14:08:06
                        Start date:27/10/2021
                        Path:C:\Users\user\Desktop\IfakQb9U15.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\IfakQb9U15.exe'
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:14:08:12
                        Start date:27/10/2021
                        Path:C:\Users\user\Desktop\IfakQb9U15.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\IfakQb9U15.exe'
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.314233218.0000000000680000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.314273302.00000000006A1000.00000004.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:14:08:19
                        Start date:27/10/2021
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\Explorer.EXE
                        Imagebase:0x7ff693d90000
                        File size:3933184 bytes
                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.296784154.00000000030C1000.00000020.00020000.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:14:08:57
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 75%, ReversingLabs
                        Reputation:low

                        General

                        Start time:14:09:04
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.376750362.0000000000460000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.376904228.0000000001F51000.00000004.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:14:10:01
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:14:10:08
                        Start date:27/10/2021
                        Path:C:\Users\user\AppData\Roaming\jjevwiw
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\jjevwiw
                        Imagebase:0x400000
                        File size:189952 bytes
                        MD5 hash:36F662B3C9A54C0C2427602F1463EB69
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >