Loading ...

Play interactive tourEdit tour

Windows Analysis Report T-T Swift Copy.exe

Overview

General Information

Sample Name:T-T Swift Copy.exe
Analysis ID:510295
MD5:a3127d76c37d53a8ecaab821ce5d99a6
SHA1:fe6529ff55514634d6cde730e4c4c5b664b02ccf
SHA256:d9ca56d191efaa8ac5beee52f508082d6e8efb29045bb61c23851537982fa6bf
Tags:exe
Infos:

Most interesting Screenshot:

Detection

DBatLoader FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected DBatLoader
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Execution from Suspicious Folder
Maps a DLL or memory area into another process
Writes to foreign memory regions
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
PE file contains strange resources
Drops PE files
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Found potential string decryption / allocating functions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Enables debug privileges

Classification

Process Tree

  • System is w10x64
  • T-T Swift Copy.exe (PID: 5760 cmdline: 'C:\Users\user\Desktop\T-T Swift Copy.exe' MD5: A3127D76C37D53A8ECAAB821CE5D99A6)
    • mobsync.exe (PID: 5600 cmdline: C:\Windows\System32\mobsync.exe MD5: 44C19378FA529DD88674BAF647EBDC3C)
      • explorer.exe (PID: 3472 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • Bukgwo.exe (PID: 5708 cmdline: 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' MD5: A3127D76C37D53A8ECAAB821CE5D99A6)
        • Bukgwo.exe (PID: 5060 cmdline: 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' MD5: A3127D76C37D53A8ECAAB821CE5D99A6)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.ehawkstech.com/s4mt/"], "decoy": ["deviousrofwft.xyz", "iphone13.photos", "cameraderie.info", "flogotwheelz.com", "lunasconstructionllc.com", "unameofficial.com", "digitalboat.cloud", "hifi-cans.com", "breskizci.com", "kyleandconner.com", "punnyaseva.com", "elitephotoedit.com", "pizzatallrikar.one", "espacio40.com", "bvgsf.xyz", "splootingcorgi.com", "metaverse360.biz", "xnegbuy.com", "buysubarus.com", "optophonia.com", "jingcai16.com", "verdantpor.xyz", "mandyfarricker.com", "affiliategang.com", "chemissimo.com", "myspecialgift4you.com", "21cfintech.com", "parsvivid.com", "ufabetkhmer.net", "litunity.com", "bcwis.com", "ekokosiarki.com", "expocanna.net", "shanichara.com", "brightstarlogisticss.com", "intaom.net", "petshop.zone", "habxgg.com", "taiqen.com", "vehiculosvivienda.com", "igsc-eg.com", "jfhy88.com", "circuspolitician.com", "etxperiodontics.com", "wsxkd.com", "abosasaio.com", "magnacursos.online", "indigenousjobs.net", "digital904.com", "pp-jm.com", "hkqlxc.com", "mygutimautpribuinrop.com", "cosplayharem.com", "jsxybq.com", "fieldstationlodges.com", "ggrow-hairsalon.com", "aureliemorgane.com", "yian-ho.com", "woruke.club", "meet-hamburg.com", "leadergaterealty.com", "choitokki.com", "cfweb.tools", "loveyopu.com"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\Public\Libraries\owgkuB.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000012.00000000.522824405.000000000DDB9000.00000004.00000001.sdmpMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x1d44:$file: URL=
  • 0x1d30:$url_explicit: [InternetShortcut]
00000015.00000002.520675116.00000000021A0000.00000004.00000001.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x46a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x4191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x47a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x6ac9:$sqlite3step: 68 34 1C 7B E1
      • 0x6bdc:$sqlite3step: 68 34 1C 7B E1
      • 0x6af8:$sqlite3text: 68 38 2A 90 C5
      • 0x6c1d:$sqlite3text: 68 38 2A 90 C5
      • 0x6b0b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x6c33:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 13 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      17.0.mobsync.exe.72480000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        17.0.mobsync.exe.72480000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d97:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        17.0.mobsync.exe.72480000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15cc9:$sqlite3step: 68 34 1C 7B E1
        • 0x15ddc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cf8:$sqlite3text: 68 38 2A 90 C5
        • 0x15e1d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d0b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e33:$sqlite3blob: 68 53 D8 7F 8C
        17.0.mobsync.exe.72480000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          17.0.mobsync.exe.72480000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 19 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' , CommandLine: 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe, NewProcessName: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe, OriginalFileName: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3472, ProcessCommandLine: 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' , ProcessId: 5708

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.ehawkstech.com/s4mt/"], "decoy": ["deviousrofwft.xyz", "iphone13.photos", "cameraderie.info", "flogotwheelz.com", "lunasconstructionllc.com", "unameofficial.com", "digitalboat.cloud", "hifi-cans.com", "breskizci.com", "kyleandconner.com", "punnyaseva.com", "elitephotoedit.com", "pizzatallrikar.one", "espacio40.com", "bvgsf.xyz", "splootingcorgi.com", "metaverse360.biz", "xnegbuy.com", "buysubarus.com", "optophonia.com", "jingcai16.com", "verdantpor.xyz", "mandyfarricker.com", "affiliategang.com", "chemissimo.com", "myspecialgift4you.com", "21cfintech.com", "parsvivid.com", "ufabetkhmer.net", "litunity.com", "bcwis.com", "ekokosiarki.com", "expocanna.net", "shanichara.com", "brightstarlogisticss.com", "intaom.net", "petshop.zone", "habxgg.com", "taiqen.com", "vehiculosvivienda.com", "igsc-eg.com", "jfhy88.com", "circuspolitician.com", "etxperiodontics.com", "wsxkd.com", "abosasaio.com", "magnacursos.online", "indigenousjobs.net", "digital904.com", "pp-jm.com", "hkqlxc.com", "mygutimautpribuinrop.com", "cosplayharem.com", "jsxybq.com", "fieldstationlodges.com", "ggrow-hairsalon.com", "aureliemorgane.com", "yian-ho.com", "woruke.club", "meet-hamburg.com", "leadergaterealty.com", "choitokki.com", "cfweb.tools", "loveyopu.com"]}
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeReversingLabs: Detection: 38%
          Source: 17.0.mobsync.exe.72480000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.0.mobsync.exe.72480000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.0.mobsync.exe.72480000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.0.mobsync.exe.72480000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: T-T Swift Copy.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.ehawkstech.com/s4mt/
          Source: unknownDNS traffic detected: queries for: onedrive.live.com

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: T-T Swift Copy.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
          Source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000012.00000000.522824405.000000000DDB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
          Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\Public\Libraries\owgkuB.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
          Source: T-T Swift Copy.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
          Source: Bukgwo.exe.0.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 0270A454 appears 32 times
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 0270D424 appears 48 times
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 021FAAB8 appears 64 times
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 0270837C appears 80 times
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 021F837C appears 80 times
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeCode function: String function: 021FD424 appears 48 times
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: String function: 0234D424 appears 36 times
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: 72480000 page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: 72480000 page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: 72480000 page no accessJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: 72480000 page read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: 72481000 page read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile read: C:\Users\user\Desktop\T-T Swift Copy.exeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\T-T Swift Copy.exe 'C:\Users\user\Desktop\T-T Swift Copy.exe'
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe'
          Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe'
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exeJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe 'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe' Jump to behavior
          Source: T-T Swift Copy.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Bukgwonqgngtrpkjastfgihmnxlmffz[1]Jump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/3@4/1
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: T-T Swift Copy.exeStatic file information: File size 1052672 > 1048576

          Data Obfuscation:

          barindex
          Yara detected DBatLoaderShow sources
          Source: Yara matchFile source: 00000015.00000002.520675116.00000000021A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.521099997.00000000026B0000.00000004.00000001.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A584 push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_0234A58E push eax; ret 0_3_0234A5C0
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeFile created: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeJump to dropped file
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run BukgwoJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run BukgwoJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\Libraries\Bukgwo\Bukgwo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Windows\SysWOW64\mobsync.exeRDTSC instruction interceptor: First address: 0000000072488604 second address: 000000007248860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mobsync.exeRDTSC instruction interceptor: First address: 000000007248898E second address: 0000000072488994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mobsync.exeProcess information queried: ProcessInformationJump to behavior
          Source: explorer.exe, 00000012.00000000.427677045.0000000008AEA000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000012.00000000.430733448.000000000DD50000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000012.00000000.414140722.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000012.00000000.461548736.0000000003767000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000012.00000002.532156882.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
          Source: explorer.exe, 00000012.00000000.495160737.0000000008AB2000.00000004.00000001.sdmpBinary or memory string: Prod_VMware_SATA-6
          Source: explorer.exe, 00000012.00000000.491525429.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
          Source: explorer.exe, 00000012.00000000.464859424.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
          Source: explorer.exe, 00000012.00000000.491525429.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
          Source: C:\Windows\SysWOW64\mobsync.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeCode function: 0_3_02349EE0 LdrInitializeThunk,0_3_02349EE0
          Source: C:\Windows\SysWOW64\mobsync.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Maps a DLL or memory area into another processShow sources
          Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 72480000Jump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 1000000Jump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 1010000Jump to behavior
          Creates a thread in another existing process (thread injection)Show sources
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeThread created: C:\Windows\SysWOW64\mobsync.exe EIP: 1010000Jump to behavior
          Allocates memory in foreign processesShow sources
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: C:\Windows\SysWOW64\mobsync.exe base: 72480000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: C:\Windows\SysWOW64\mobsync.exe base: 1000000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory allocated: C:\Windows\SysWOW64\mobsync.exe base: 1010000 protect: page execute and read and writeJump to behavior
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeMemory written: C:\Windows\SysWOW64\mobsync.exe base: 72480000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\T-T Swift Copy.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exeJump to behavior
          Source: explorer.exe, 00000012.00000000.427087654.00000000089FF000.00000004.00000001.sdmp, Bukgwo.exe, 00000015.00000002.519902050.0000000000D50000.00000002.00020000.sdmp, Bukgwo.exe, 00000018.00000002.519458391.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000012.00000000.450521833.0000000001640000.00000002.00020000.sdmp, Bukgwo.exe, 00000015.00000002.519902050.0000000000D50000.00000002.00020000.sdmp, Bukgwo.exe, 00000018.00000002.519458391.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000012.00000000.450521833.0000000001640000.00000002.00020000.sdmp, Bukgwo.exe, 00000015.00000002.519902050.0000000000D50000.00000002.00020000.sdmp, Bukgwo.exe, 00000018.00000002.519458391.0000000000E60000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
          Source: explorer.exe, 00000012.00000000.448726082.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
          Source: explorer.exe, 00000012.00000000.450521833.0000000001640000.00000002.00020000.sdmp, Bukgwo.exe, 00000015.00000002.519902050.0000000000D50000.00000002.00020000.sdmp, Bukgwo.exe, 00000018.00000002.519458391.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
          Source: explorer.exe, 00000012.00000000.450521833.0000000001640000.00000002.00020000.sdmp, Bukgwo.exe, 00000015.00000002.519902050.0000000000D50000.00000002.00020000.sdmp, Bukgwo.exe, 00000018.00000002.519458391.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progmanlock

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.mobsync.exe.72480000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection512Masquerading1OS Credential DumpingSecurity Software Discovery211Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection512Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsSystem Information Discovery11SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          No Antivirus matches

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe39%ReversingLabsWin32.Backdoor.Remcos

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          21.3.Bukgwo.exe.21fcb70.1557.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e668.3796.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2290.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270c48c.187.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e89c.3939.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234ef08.4348.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9a40.836.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.1731.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2886.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2092.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234993c.706.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.3308.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.435.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2510.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.1025.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234ecb0.4200.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1813.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270cb70.877.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9bec.1049.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fd9d0.333.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2924.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2871.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9740.451.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.1001.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234d76c.129.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f97ec.538.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1018.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9720.436.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.3022.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.1818.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.486.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2481.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.507.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.23496fc.417.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.3430.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9830.572.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e998.4002.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.3051.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2113.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2939.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270cb70.1666.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.27097f8.543.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1307.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.669.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1149.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2068.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1491.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2749.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234b144.3782.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fd9e8.341.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.2709984.741.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270991c.690.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2088.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.1477.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1993.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fa274.1885.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.3470.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2192.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2088.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fa390.2027.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.2709c5c.1105.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f8574.43.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270cb70.1360.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234a170.1756.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2295.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2011.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349e60.1364.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f98b4.637.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2442.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2169.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f955c.268.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2293.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234ad9c.234.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e5a8.3748.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9e74.1374.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.2709e68.1368.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e5b4.3753.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.2250.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9798.495.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270cb70.1647.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349b40.963.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349e30.1340.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234c6cc.250.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349934.701.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234cb70.492.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.2709f44.1478.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270cb70.1594.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f96fc.418.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9fdc.1553.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234d8bc.241.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349880.611.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234e5e4.3765.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234a168.1752.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.1093.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21f9898.623.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.23497c4.518.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          21.3.Bukgwo.exe.21fcb70.2079.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.234ef68.4374.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.3.T-T Swift Copy.exe.2349c00.1060.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          24.3.Bukgwo.exe.270a0ec.1689.unpack100%AviraTR/Crypt.XPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          www.ehawkstech.com/s4mt/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          onedrive.live.com
          unknown
          unknownfalse
            high
            vhpf4g.bn.files.1drv.com
            unknown
            unknownfalse
              high

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              www.ehawkstech.com/s4mt/true
              • Avira URL Cloud: safe
              low

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious

              Private

              IP
              192.168.2.1

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:510295
              Start date:27.10.2021
              Start time:17:20:15
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 19m 11s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:T-T Swift Copy.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/3@4/1
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 1
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.49.157.6, 13.107.42.13, 13.107.42.12, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.50.102.62, 13.107.43.13, 20.54.110.249
              • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, l-0004.dc-msedge.net, odc-bn-files-geo.onedrive.akadns.net, l-0004.l-msedge.net, e12564.dspb.akamaiedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, bn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, odc-bn-files-brs.onedrive.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/510295/sample/T-T Swift Copy.exe

              Simulations

              Behavior and APIs

              TimeTypeDescription
              17:22:23API Interceptor1x Sleep call for process: T-T Swift Copy.exe modified
              17:22:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Bukgwo C:\Users\Public\Libraries\\owgkuB.url
              17:22:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Bukgwo C:\Users\Public\Libraries\\owgkuB.url

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe
              Process:C:\Users\user\Desktop\T-T Swift Copy.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):1052672
              Entropy (8bit):7.030914360244136
              Encrypted:false
              SSDEEP:24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRCdS:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Apg
              MD5:A3127D76C37D53A8ECAAB821CE5D99A6
              SHA1:FE6529FF55514634D6CDE730E4C4C5B664B02CCF
              SHA-256:D9CA56D191EFAA8AC5BEEE52F508082D6E8EFB29045BB61C23851537982FA6BF
              SHA-512:503FB1825DEC1A108B4C307E561FB4DF829079BF53DEC6167B28A0C79D3DA81D188439EBD5590CA2AD24A528D1C63E4DBEAEECD516BE5665866BDC1F07D3E2D0
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 39%
              Reputation:unknown
              Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@..............................$%...........................0............................... ......................................................CODE................................ ..`DATA....,...........................@...BSS.....i................................idata..$%.......&..................@....tls....@................................rdata....... ......................@..P.reloc.......0......................@..P.rsrc................f..............@..P....................................@..P........................................................................................................................................
              C:\Users\Public\Libraries\owgkuB.url
              Process:C:\Users\user\Desktop\T-T Swift Copy.exe
              File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\\\Bukgwo\\Bukgwo.exe">), ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):96
              Entropy (8bit):4.851591375784615
              Encrypted:false
              SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMLQtSiL3bsGKd4ovn:HRYFVmTWDyzSQgiL3bsblvn
              MD5:FDC2ECE626A79B30C114488195904125
              SHA1:0E282FA6243F23E1388E1711A43D3F4033EDFD9F
              SHA-256:23976F3C585AEF6EAEE80D2FF579B4114B06766A101F1A0788CD0E129FEBF84E
              SHA-512:6E549209E2D5B7BC6089E8EEDD11C482E62A5D12C08A60A5B075FB3E8EC8449DD86C406D6892FDC19265B557A6C42DC52F07EDAC3D2804DCBF97777940D22FD9
              Malicious:false
              Yara Hits:
              • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\owgkuB.url, Author: @itsreallynick (Nick Carr)
              Reputation:unknown
              Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\\\Bukgwo\\Bukgwo.exe"..IconIndex=0..
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Bukgwonqgngtrpkjastfgihmnxlmffz[2]
              Process:C:\Users\user\Desktop\T-T Swift Copy.exe
              File Type:data
              Category:dropped
              Size (bytes):275456
              Entropy (8bit):7.995996090484397
              Encrypted:true
              SSDEEP:6144:eLRxllE7ow8bOFy5f0iAlZZ1CJWS5vg0GNwcNsoS58ErglehivLUHEJH:6zM0w8bl5siAlBCJWS5vWNwCxGg4ivLJ
              MD5:00BF4E71F9A6ECAD41587045D5591BE4
              SHA1:DAC3E45F849E280ABDEECB0010F71DB7FB92F68C
              SHA-256:D8C8989468B6EE8526A595B49DE36162DB5C6DE86DA9236529763AE16D0AE7C6
              SHA-512:E129420478F27FD888AC6821848C64BC332446B284021B1725702846F134202AB4C6197C1BBFEB20520FC1923169D933CE4652027FF7E20D4E9C5ACE967AB52B
              Malicious:false
              Reputation:unknown
              Preview: ..@5...q.P.Yf..MD0....QJ.-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...G.^..>..J..'.E.d.IQ@.....A..3....T.. `.V....o}X...X...).....v....E..E.Q}83..j...d.$m.FR.?....L........af...:6;.&m&l.h.o.O!......T..&.~.,.@("Yr.#..~.*v..u...J.Kid.L........af...:6;.&m&l.h.o.O!......T..&.~.,.@(].....0....%.....>.z'..7I...xP..;lM...... .T.4....a..b%{.N.l....*.I].#..h...9._Ua..s.`.[V....".............F]..,'J.u..J...V.B3...j.=..g..=..[w..c.....f..#.4G.)..1.sL.....Cc.P....?{.6..&.K.d8.......(.S.+.W......5J...,.,w.m..`!5...M..zq..rB.Y.....m.......)D.~y.;pK.....

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.030914360244136
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.24%
              • InstallShield setup (43055/19) 0.43%
              • Win32 Executable Delphi generic (14689/80) 0.15%
              • Windows Screen Saver (13104/52) 0.13%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              File name:T-T Swift Copy.exe
              File size:1052672
              MD5:a3127d76c37d53a8ecaab821ce5d99a6
              SHA1:fe6529ff55514634d6cde730e4c4c5b664b02ccf
              SHA256:d9ca56d191efaa8ac5beee52f508082d6e8efb29045bb61c23851537982fa6bf
              SHA512:503fb1825dec1a108b4c307e561fb4df829079bf53dec6167b28a0c79d3da81d188439ebd5590ca2ad24a528d1c63e4dbeaeecd516be5665866bdc1f07d3e2d0
              SSDEEP:24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRCdS:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Apg
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

              File Icon

              Icon Hash:252506584c9731c0

              Static PE Info

              General

              Entrypoint:0x490218
              Entrypoint Section:CODE
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
              DLL Characteristics:
              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:c615e590ab9a424646aba34bad72f321

              Entrypoint Preview

              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFF0h
              push ebx
              mov eax, 0048FF60h
              call 00007F63B09B53E4h
              mov ebx, dword ptr [004EB650h]
              mov eax, dword ptr [ebx]
              call 00007F63B0A0E673h
              mov eax, dword ptr [ebx]
              mov edx, 00490290h
              call 00007F63B0A0E267h
              mov ecx, dword ptr [004EB544h]
              mov eax, dword ptr [ebx]
              mov edx, dword ptr [0048EBB8h]
              call 00007F63B0A0E66Ch
              mov ecx, dword ptr [004EB5F8h]
              mov eax, dword ptr [ebx]
              mov edx, dword ptr [0047F918h]
              call 00007F63B0A0E659h
              mov ecx, dword ptr [004EB3C8h]
              mov eax, dword ptr [ebx]
              mov edx, dword ptr [0048E75Ch]
              call 00007F63B0A0E646h
              mov eax, dword ptr [ebx]
              call 00007F63B0A0E6BFh
              pop ebx
              call 00007F63B09B311Dh

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xee0000x2524.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xfd0000xaa00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xf30000x9ba8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0xf20000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              CODE0x10000x8f29c0x8f400False0.519360820244data6.57636511075IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              DATA0x910000x5a82c0x5aa00False0.421761853448data6.88948982392IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              BSS0xec0000x12690x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .idata0xee0000x25240x2600False0.362356085526data4.99675959328IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .tls0xf10000x400x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rdata0xf20000x180x200False0.05078125data0.199107517787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .reloc0xf30000x9ba80x9c00False0.571890024038data6.65385066773IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .rsrc0xfd0000xaa000xaa00False0.274057904412data4.57303719616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_CURSOR0xfe2a00x134data
              RT_CURSOR0xfe3d40x134data
              RT_CURSOR0xfe5080x134data
              RT_CURSOR0xfe63c0x134data
              RT_CURSOR0xfe7700x134data
              RT_CURSOR0xfe8a40x134data
              RT_CURSOR0xfe9d80x134data
              RT_BITMAP0xfeb0c0x1d0data
              RT_BITMAP0xfecdc0x1e4data
              RT_BITMAP0xfeec00x1d0data
              RT_BITMAP0xff0900x1d0data
              RT_BITMAP0xff2600x1d0data
              RT_BITMAP0xff4300x1d0data
              RT_BITMAP0xff6000x1d0data
              RT_BITMAP0xff7d00x1d0data
              RT_BITMAP0xff9a00x1d0data
              RT_BITMAP0xffb700x1d0data
              RT_BITMAP0xffd400x128data
              RT_BITMAP0xffe680x128data
              RT_BITMAP0xfff900x128data
              RT_BITMAP0x1000b80xe8data
              RT_BITMAP0x1001a00x128data
              RT_BITMAP0x1002c80x128data
              RT_BITMAP0x1003f00xd0data
              RT_BITMAP0x1004c00x128data
              RT_BITMAP0x1005e80x128data
              RT_BITMAP0x1007100x128data
              RT_BITMAP0x1008380x128data
              RT_BITMAP0x1009600x128data
              RT_BITMAP0x100a880xe8data
              RT_BITMAP0x100b700x128data
              RT_BITMAP0x100c980x128data
              RT_BITMAP0x100dc00xd0data
              RT_BITMAP0x100e900x128data
              RT_BITMAP0x100fb80x128data
              RT_BITMAP0x1010e00x128data
              RT_BITMAP0x1012080x128data
              RT_BITMAP0x1013300x128data
              RT_BITMAP0x1014580xe8data
              RT_BITMAP0x1015400x128data
              RT_BITMAP0x1016680x128data
              RT_BITMAP0x1017900xd0data
              RT_BITMAP0x1018600x128data
              RT_BITMAP0x1019880x128data
              RT_BITMAP0x101ab00xe8GLS_BINARY_LSB_FIRSTEnglishUnited States
              RT_ICON0x101b980x988dataEnglishUnited States
              RT_ICON0x1025200x10a8dataEnglishUnited States
              RT_DIALOG0x1035c80x52data
              RT_STRING0x10361c0x868data
              RT_STRING0x103e840x830data
              RT_STRING0x1046b40x1e0data
              RT_STRING0x1048940x198data
              RT_STRING0x104a2c0x158data
              RT_STRING0x104b840x624data
              RT_STRING0x1051a80x260data
              RT_STRING0x1054080xe8data
              RT_STRING0x1054f00x128data
              RT_STRING0x1056180x2c8data
              RT_STRING0x1058e00x408data
              RT_STRING0x105ce80x380data
              RT_STRING0x1060680x418data
              RT_STRING0x1064800x1b0data
              RT_STRING0x1066300xecdata
              RT_STRING0x10671c0x1e4data
              RT_STRING0x1069000x3e8data
              RT_STRING0x106ce80x358data
              RT_STRING0x1070400x2b4data
              RT_RCDATA0x1072f40x10data
              RT_RCDATA0x1073040x390data
              RT_RCDATA0x1076940x23fDelphi compiled form 'TFrmAbout'
              RT_GROUP_CURSOR0x1078d40x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x1078e80x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x1078fc0x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x1079100x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x1079240x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x1079380x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_CURSOR0x10794c0x14Lotus unknown worksheet or configuration, revision 0x1
              RT_GROUP_ICON0x1079600x22dataEnglishUnited States

              Imports

              DLLImport
              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
              user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
              kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
              gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetPaletteEntries, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
              user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawStateA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
              kernel32.dllSleep
              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
              ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
              oleaut32.dllGetErrorInfo, SysFreeString
              comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
              winmm.dllsndPlaySoundA
              uRLInetIsOffline

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Oct 27, 2021 17:22:23.840656042 CEST4955753192.168.2.58.8.8.8
              Oct 27, 2021 17:22:24.971437931 CEST6173353192.168.2.58.8.8.8
              Oct 27, 2021 17:23:29.635649920 CEST6529653192.168.2.58.8.8.8
              Oct 27, 2021 17:23:29.640189886 CEST6318353192.168.2.58.8.8.8

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Oct 27, 2021 17:22:23.840656042 CEST192.168.2.58.8.8.80xc540Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
              Oct 27, 2021 17:22:24.971437931 CEST192.168.2.58.8.8.80xd0eeStandard query (0)vhpf4g.bn.files.1drv.comA (IP address)IN (0x0001)
              Oct 27, 2021 17:23:29.635649920 CEST192.168.2.58.8.8.80x1701Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
              Oct 27, 2021 17:23:29.640189886 CEST192.168.2.58.8.8.80x501Standard query (0)onedrive.live.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Oct 27, 2021 17:22:23.881091118 CEST8.8.8.8192.168.2.50xc540No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
              Oct 27, 2021 17:22:25.050039053 CEST8.8.8.8192.168.2.50xd0eeNo error (0)vhpf4g.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
              Oct 27, 2021 17:22:25.050039053 CEST8.8.8.8192.168.2.50xd0eeNo error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
              Oct 27, 2021 17:23:29.654856920 CEST8.8.8.8192.168.2.50x1701No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
              Oct 27, 2021 17:23:29.695108891 CEST8.8.8.8192.168.2.50x501No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:17:21:10
              Start date:27/10/2021
              Path:C:\Users\user\Desktop\T-T Swift Copy.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\T-T Swift Copy.exe'
              Imagebase:0x400000
              File size:1052672 bytes
              MD5 hash:A3127D76C37D53A8ECAAB821CE5D99A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low

              General

              Start time:17:22:28
              Start date:27/10/2021
              Path:C:\Windows\SysWOW64\mobsync.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\System32\mobsync.exe
              Imagebase:0x1080000
              File size:93184 bytes
              MD5 hash:44C19378FA529DD88674BAF647EBDC3C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.406123178.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.407026308.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.406606133.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.405354552.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:moderate

              General

              Start time:17:22:31
              Start date:27/10/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff693d90000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000012.00000000.522824405.000000000DDB9000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000012.00000000.476572869.0000000006D0E000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:high

              General

              Start time:17:22:37
              Start date:27/10/2021
              Path:C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe'
              Imagebase:0x400000
              File size:1052672 bytes
              MD5 hash:A3127D76C37D53A8ECAAB821CE5D99A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Yara matches:
              • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000015.00000002.520675116.00000000021A0000.00000004.00000001.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 39%, ReversingLabs
              Reputation:low

              General

              Start time:17:22:46
              Start date:27/10/2021
              Path:C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\Public\Libraries\Bukgwo\Bukgwo.exe'
              Imagebase:0x7ff7e2800000
              File size:1052672 bytes
              MD5 hash:A3127D76C37D53A8ECAAB821CE5D99A6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Yara matches:
              • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000018.00000002.521099997.00000000026B0000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >

                Executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000003.239434067.0000000002348000.00000004.00000001.sdmp, Offset: 02348000, based on PE: false
                • Associated: 00000000.00000003.266225999.0000000002348000.00000004.00000001.sdmp Download File
                Similarity
                • API ID:
                • String ID: eA$eA
                • API String ID: 0-3298036644
                • Opcode ID: 8dabb5c303bacf356e371facf085681142284f69426b5c2cb771b069ba729779
                • Instruction ID: 6ee7c559ae73d9e1475b66241f2c19ab990ddd2a760c62578288e779b299111a
                • Opcode Fuzzy Hash: 8dabb5c303bacf356e371facf085681142284f69426b5c2cb771b069ba729779
                • Instruction Fuzzy Hash: 9B2192B4A05340AFC711DF68D840B8AFFE6EB48718F1189AAE44497261DB39F484CF5A
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000003.266225999.0000000002348000.00000004.00000001.sdmp, Offset: 02348000, based on PE: false
                • Associated: 00000000.00000003.239434067.0000000002348000.00000004.00000001.sdmp Download File
                Similarity
                • API ID:
                • String ID: `.@$cA
                • API String ID: 0-3820551636
                • Opcode ID: 758e850e5872a477811bf31f73a0a0d911e37b91d0ab9fba4b073a5bb3d29fd9
                • Instruction ID: 5c622ff71da4c1c37a2d15e4f98dcf284589ed4a912de44b64270013e32ecb85
                • Opcode Fuzzy Hash: 758e850e5872a477811bf31f73a0a0d911e37b91d0ab9fba4b073a5bb3d29fd9
                • Instruction Fuzzy Hash: 1241C5701807009AF7305F24CD14B63B5E5FB04758F208EAED5A6969E0DFB5F845C795
                Uniqueness

                Uniqueness Score: -1.00%