Loading ...

Play interactive tourEdit tour

Windows Analysis Report QUOTATION_doc.exe

Overview

General Information

Sample Name:QUOTATION_doc.exe
Analysis ID:510346
MD5:7c0902852cf17ae5d05ea35d770dcc93
SHA1:bd57aad081ce20140b226b878091164eaf777e11
SHA256:a67796ab32ba225ab871923548c5b98147a848edeffb72089724d6131d20dc0c
Tags:exe
Infos:

Most interesting Screenshot:

Detection

DBatLoader FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected DBatLoader
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Svchost Process
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Uses code obfuscation techniques (call, push, ret)
Found potential string decryption / allocating functions
Enables debug privileges
PE file contains strange resources
Drops PE files
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • QUOTATION_doc.exe (PID: 6252 cmdline: 'C:\Users\user\Desktop\QUOTATION_doc.exe' MD5: 7C0902852CF17AE5D05EA35D770DCC93)
    • svchost.exe (PID: 6592 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • Huptze.exe (PID: 6940 cmdline: 'C:\Users\Public\Libraries\Huptze\Huptze.exe' MD5: 7C0902852CF17AE5D05EA35D770DCC93)
        • Huptze.exe (PID: 6864 cmdline: 'C:\Users\Public\Libraries\Huptze\Huptze.exe' MD5: 7C0902852CF17AE5D05EA35D770DCC93)
    • mobsync.exe (PID: 6592 cmdline: C:\Windows\System32\mobsync.exe MD5: 44C19378FA529DD88674BAF647EBDC3C)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.septemberstockevent200.com/ht08/"], "decoy": ["joye.club", "istanbulemlakgalerisi.online", "annikadaniel.love", "oooci.com", "curebase-test.com", "swisstradecenter.com", "hacticum.com", "centercodebase.com", "recbi56ni.com", "mmj0115.xyz", "sharpstead.com", "sprklbeauty.com", "progettogenesi.cloud", "dolinum.com", "amaroqadvisors.com", "traininig.com", "leewaysvcs.com", "nashhomesearch.com", "joy1263.com", "serkanyamac.com", "nursingprogramsforme.com", "huakf.com", "1w3.online", "watermountsteam.top", "tyralruutan.quest", "mattlambert.xyz", "xn--fiqs8sypgfujbl4a.xn--czru2d", "hfgoal.com", "587868.net", "noyoucantridemyonewheel.com", "riewesell.top", "expn.asia", "suplementarsas.com", "item154655544.com", "cdgdentists.com", "deboraverdian.com", "franquiciasexclusivas.tienda", "tminus-10.com", "psychoterapeuta-wroclaw.com", "coachingbywatson.com", "lknitti.net", "belenpison.agency", "facilitetec.com", "99077000.com", "thefitmog.com", "kinmanpowerwashing.com", "escueladelbuenamor.com", "getjoyce.net", "oilelm.com", "maikoufarm.com", "hespresso.net", "timothyschmallrealt.com", "knoxvilleraingutters.com", "roonkingagency.online", "trashwasher.com", "angyfoods.com", "yungbredda.com", "digipoint-entertainment.com", "shangduli.space", "kalaraskincare.com", "ktnsound.xyz", "miabellavita.com", "thenlpmentor.com", "marzhukov.com"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\Public\Libraries\eztpuH.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000011.00000000.624299247.000000000D4FD000.00000004.00000001.sdmpMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x10c4:$file: URL=
  • 0x10b0:$url_explicit: [InternetShortcut]
00000015.00000002.631255655.00000000021A0000.00000004.00000001.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
      • 0x16bec:$sqlite3step: 68 34 1C 7B E1
      • 0x16b08:$sqlite3text: 68 38 2A 90 C5
      • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
      • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 15 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Execution from Suspicious FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\Libraries\Huptze\Huptze.exe' , CommandLine: 'C:\Users\Public\Libraries\Huptze\Huptze.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Huptze\Huptze.exe, NewProcessName: C:\Users\Public\Libraries\Huptze\Huptze.exe, OriginalFileName: C:\Users\Public\Libraries\Huptze\Huptze.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3440, ProcessCommandLine: 'C:\Users\Public\Libraries\Huptze\Huptze.exe' , ProcessId: 6940
      Sigma detected: Suspicious Svchost ProcessShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: 'C:\Users\user\Desktop\QUOTATION_doc.exe' , ParentImage: C:\Users\user\Desktop\QUOTATION_doc.exe, ParentProcessId: 6252, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p, ProcessId: 6592
      Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: 'C:\Users\user\Desktop\QUOTATION_doc.exe' , ParentImage: C:\Users\user\Desktop\QUOTATION_doc.exe, ParentProcessId: 6252, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p, ProcessId: 6592

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.septemberstockevent200.com/ht08/"], "decoy": ["joye.club", "istanbulemlakgalerisi.online", "annikadaniel.love", "oooci.com", "curebase-test.com", "swisstradecenter.com", "hacticum.com", "centercodebase.com", "recbi56ni.com", "mmj0115.xyz", "sharpstead.com", "sprklbeauty.com", "progettogenesi.cloud", "dolinum.com", "amaroqadvisors.com", "traininig.com", "leewaysvcs.com", "nashhomesearch.com", "joy1263.com", "serkanyamac.com", "nursingprogramsforme.com", "huakf.com", "1w3.online", "watermountsteam.top", "tyralruutan.quest", "mattlambert.xyz", "xn--fiqs8sypgfujbl4a.xn--czru2d", "hfgoal.com", "587868.net", "noyoucantridemyonewheel.com", "riewesell.top", "expn.asia", "suplementarsas.com", "item154655544.com", "cdgdentists.com", "deboraverdian.com", "franquiciasexclusivas.tienda", "tminus-10.com", "psychoterapeuta-wroclaw.com", "coachingbywatson.com", "lknitti.net", "belenpison.agency", "facilitetec.com", "99077000.com", "thefitmog.com", "kinmanpowerwashing.com", "escueladelbuenamor.com", "getjoyce.net", "oilelm.com", "maikoufarm.com", "hespresso.net", "timothyschmallrealt.com", "knoxvilleraingutters.com", "roonkingagency.online", "trashwasher.com", "angyfoods.com", "yungbredda.com", "digipoint-entertainment.com", "shangduli.space", "kalaraskincare.com", "ktnsound.xyz", "miabellavita.com", "thenlpmentor.com", "marzhukov.com"]}
      Multi AV Scanner detection for submitted fileShow sources
      Source: QUOTATION_doc.exeVirustotal: Detection: 29%Perma Link
      Source: QUOTATION_doc.exeReversingLabs: Detection: 29%
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Multi AV Scanner detection for domain / URLShow sources
      Source: www.septemberstockevent200.com/ht08/Virustotal: Detection: 7%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeVirustotal: Detection: 29%Perma Link
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeReversingLabs: Detection: 29%
      Source: 16.0.mobsync.exe.72480000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: 16.0.mobsync.exe.72480000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: 16.0.mobsync.exe.72480000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: 16.0.mobsync.exe.72480000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: QUOTATION_doc.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: www.septemberstockevent200.com/ht08/
      Source: explorer.exe, 00000011.00000000.560901848.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: unknownDNS traffic detected: queries for: onedrive.live.com

      E-Banking Fraud:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: QUOTATION_doc.exe
      Source: initial sampleStatic PE information: Filename: QUOTATION_doc.exe
      Source: QUOTATION_doc.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
      Source: 00000011.00000000.624299247.000000000D4FD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
      Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000011.00000000.624322018.000000000D502000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
      Source: 00000011.00000000.550371526.000000000D4FD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
      Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: C:\Users\Public\Libraries\eztpuH.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: String function: 022F837C appears 90 times
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeCode function: String function: 0274A6A0 appears 96 times
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeCode function: String function: 0274837C appears 104 times
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeCode function: String function: 021FD424 appears 90 times
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeCode function: String function: 0274D424 appears 72 times
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeCode function: String function: 021F837C appears 120 times
      Source: QUOTATION_doc.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
      Source: Huptze.exe.0.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: 72480000 page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: 72480000 page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: 72480000 page no accessJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: 72480000 page read and writeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: 72481000 page read and writeJump to behavior
      Source: QUOTATION_doc.exeVirustotal: Detection: 29%
      Source: QUOTATION_doc.exeReversingLabs: Detection: 29%
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile read: C:\Users\user\Desktop\QUOTATION_doc.exeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION_doc.exe 'C:\Users\user\Desktop\QUOTATION_doc.exe'
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeProcess created: C:\Windows\SysWOW64\mobsync.exe C:\Windows\System32\mobsync.exe
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Huptze\Huptze.exe 'C:\Users\Public\Libraries\Huptze\Huptze.exe'
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Huptze\Huptze.exe 'C:\Users\Public\Libraries\Huptze\Huptze.exe'
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -pJump to behavior
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Huptze\Huptze.exe 'C:\Users\Public\Libraries\Huptze\Huptze.exe' Jump to behavior
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Huptze\Huptze.exe 'C:\Users\Public\Libraries\Huptze\Huptze.exe' Jump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\Huptzeullazkbrfuqvqdlxbsjktmnwu[1]Jump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/3@4/0
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: QUOTATION_doc.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: QUOTATION_doc.exeStatic file information: File size 1052672 > 1048576

      Data Obfuscation:

      barindex
      Yara detected DBatLoaderShow sources
      Source: Yara matchFile source: 00000015.00000002.631255655.00000000021A0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.632108057.00000000026F0000.00000004.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA58E push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022FA584 push eax; ret 0_3_022FA5C0
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeFile created: C:\Users\Public\Libraries\Huptze\Huptze.exeJump to dropped file
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HuptzeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HuptzeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\Libraries\Huptze\Huptze.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Windows\SysWOW64\mobsync.exeRDTSC instruction interceptor: First address: 0000000072488604 second address: 000000007248860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Windows\SysWOW64\mobsync.exeRDTSC instruction interceptor: First address: 000000007248899E second address: 00000000724889A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Windows\SysWOW64\mobsync.exeProcess information queried: ProcessInformationJump to behavior
      Source: explorer.exe, 00000011.00000000.546571356.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
      Source: explorer.exe, 00000011.00000000.601959319.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
      Source: explorer.exe, 00000011.00000000.584670896.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000011.00000000.586385186.0000000006414000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000011.00000000.601959319.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000011.00000000.586385186.0000000006414000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000011.00000000.600240165.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
      Source: explorer.exe, 00000011.00000000.549013567.0000000008678000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}1SPS0
      Source: explorer.exe, 00000011.00000000.600240165.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
      Source: explorer.exe, 00000011.00000000.546571356.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
      Source: Huptze.exe, 00000015.00000002.630029726.0000000000808000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: explorer.exe, 00000011.00000000.560901848.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
      Source: C:\Windows\SysWOW64\mobsync.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\mobsync.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeCode function: 0_3_022F9EE0 LdrInitializeThunk,0_3_022F9EE0

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory written: C:\Windows\System32\svchost.exe base: 72480000Jump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory written: C:\Windows\System32\svchost.exe base: 2440000Jump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory written: C:\Windows\System32\svchost.exe base: 2450000Jump to behavior
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: C:\Windows\System32\svchost.exe base: 72480000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2440000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2450000 protect: page execute and read and writeJump to behavior
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeMemory written: C:\Windows\System32\svchost.exe base: 72480000 value starts with: 4D5AJump to behavior
      Creates a thread in another existing process (thread injection)Show sources
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeThread created: C:\Windows\System32\svchost.exe EIP: 2450000Jump to behavior
      Source: C:\Users\user\Desktop\QUOTATION_doc.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -pJump to behavior
      Source: explorer.exe, 00000011.00000002.642961549.0000000000EE0000.00000002.00020000.sdmp, Huptze.exe, 00000014.00000002.631158026.0000000000E70000.00000002.00020000.sdmp, Huptze.exe, 00000015.00000002.630849928.0000000000D90000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000011.00000000.560363495.00000000008B8000.00000004.00000020.sdmp, Huptze.exe, 00000014.00000002.631158026.0000000000E70000.00000002.00020000.sdmp, Huptze.exe, 00000015.00000002.630849928.0000000000D90000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000011.00000002.642961549.0000000000EE0000.00000002.00020000.sdmp, Huptze.exe, 00000014.00000002.631158026.0000000000E70000.00000002.00020000.sdmp, Huptze.exe, 00000015.00000002.630849928.0000000000D90000.00000002.00020000.sdmpBinary or memory string: &Program Manager
      Source: explorer.exe, 00000011.00000002.642961549.0000000000EE0000.00000002.00020000.sdmp, Huptze.exe, 00000014.00000002.631158026.0000000000E70000.00000002.00020000.sdmp, Huptze.exe, 00000015.00000002.630849928.0000000000D90000.00000002.00020000.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection512Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery211Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection512Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      QUOTATION_doc.exe29%VirustotalBrowse
      QUOTATION_doc.exe30%ReversingLabsWin32.Backdoor.Remcos

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\Public\Libraries\Huptze\Huptze.exe29%VirustotalBrowse
      C:\Users\Public\Libraries\Huptze\Huptze.exe30%ReversingLabsWin32.Backdoor.Remcos

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.3.QUOTATION_doc.exe.22fb590.4331.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3351.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9a0c.809.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1807.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.27499ec.793.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1837.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274d880.221.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1060.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274a198.1776.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274d6dc.81.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fd940.285.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2828.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.981.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fc5f4.228.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.986.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.1264.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274ab2c.131.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3282.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fb03c.348.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fa1a0.1780.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749ee8.1432.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.636.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f9ad4.909.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9c10.1067.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fee48.4300.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22faf1c.300.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3484.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9768.472.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.669.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.948.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f9f0c.1450.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9a50.843.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fa38c.2025.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3538.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.27499a0.755.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749c48.1095.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fa350.1995.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2140.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fa060.1619.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.1044.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3216.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fa2e8.1943.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3666.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f98a0.627.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749a90.876.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.831.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9d70.1244.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.1537.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3659.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fd844.201.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.910.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3401.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274a204.1829.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2231.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f9cd0.1164.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.608.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1271.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1716.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fe7f4.3897.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9828.567.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fe8b4.3943.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21f9988.743.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3241.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fcb70.428.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274a038.1600.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fb0cc.371.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749704.421.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f94d8.223.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.850.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274c4d4.196.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f99e4.789.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f9e0c.1322.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3358.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2613.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fea58.4050.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f949c.202.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749798.496.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749ff8.1568.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fac34.175.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749e10.1323.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2217.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f99f4.798.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f940c.156.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fda3c.369.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.3.Huptze.exe.21fca08.342.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.2749c5c.1105.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22feeb4.4329.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.1424.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.1263.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3725.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fef80.4379.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22f9790.491.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fecec.4214.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      20.3.Huptze.exe.274cb70.1937.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      21.2.Huptze.exe.400000.0.unpack100%AviraHEUR/AGEN.1131223Download File
      21.3.Huptze.exe.21fcb70.1169.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.2381.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3273.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.3489.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      0.3.QUOTATION_doc.exe.22fcb70.640.unpack100%AviraTR/Crypt.XPACK.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      www.septemberstockevent200.com/ht08/8%VirustotalBrowse
      www.septemberstockevent200.com/ht08/0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      onedrive.live.com
      unknown
      unknownfalse
        high
        mpc3og.am.files.1drv.com
        unknown
        unknownfalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          www.septemberstockevent200.com/ht08/true
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000011.00000000.560901848.000000000095C000.00000004.00000020.sdmpfalse
            high

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:510346
            Start date:27.10.2021
            Start time:18:13:44
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 18m 48s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:QUOTATION_doc.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:23
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@8/3@4/0
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 1
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.50.102.62, 20.54.110.249, 40.112.88.60, 80.67.82.242, 80.67.82.235, 13.107.43.13, 13.107.42.12, 23.211.4.86, 20.82.210.154, 13.107.42.13
            • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, l-0004.dc-msedge.net, l-0004.l-msedge.net, e12564.dspb.akamaiedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, am-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, odc-web-geo.onedrive.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, odc-am-files-geo.onedrive.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, odc-am-files-brs.onedrive.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            18:15:59API Interceptor1x Sleep call for process: QUOTATION_doc.exe modified
            18:16:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Huptze C:\Users\Public\Libraries\\eztpuH.url
            18:16:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Huptze C:\Users\Public\Libraries\\eztpuH.url

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\Public\Libraries\Huptze\Huptze.exe
            Process:C:\Users\user\Desktop\QUOTATION_doc.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1052672
            Entropy (8bit):7.028470000025409
            Encrypted:false
            SSDEEP:24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRC/S:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Ap2
            MD5:7C0902852CF17AE5D05EA35D770DCC93
            SHA1:BD57AAD081CE20140B226B878091164EAF777E11
            SHA-256:A67796AB32BA225AB871923548C5B98147A848EDEFFB72089724D6131D20DC0C
            SHA-512:12226734D0BF22C9C8D70DF2D9F308BA13F44F1715C0FD7A033FE90B32F55D33BB0794AA41259BEF5A626604D3C23937B8D97D9B35C6A6E5546AE2121947CEF8
            Malicious:true
            Antivirus:
            • Antivirus: Virustotal, Detection: 29%, Browse
            • Antivirus: ReversingLabs, Detection: 30%
            Reputation:unknown
            Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@..............................$%...........................0............................... ......................................................CODE................................ ..`DATA....,...........................@...BSS.....i................................idata..$%.......&..................@....tls....@................................rdata....... ......................@..P.reloc.......0......................@..P.rsrc................f..............@..P....................................@..P........................................................................................................................................
            C:\Users\Public\Libraries\eztpuH.url
            Process:C:\Users\user\Desktop\QUOTATION_doc.exe
            File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\\\Huptze\\Huptze.exe">), ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):96
            Entropy (8bit):4.760663709605442
            Encrypted:false
            SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMBmFVRfpvsGKd4ovn:HRYFVmTWDyzYmFbpvsblvn
            MD5:E40C5506522187D4ADA803A75985B159
            SHA1:137895C9759726F7E7B37C6A3952EC71FFC33C6D
            SHA-256:21054BD6BFAB6DC1145970A05F28A548EC5522755E7377C2882B674E67FC1B96
            SHA-512:885F8E3E623F6C9D9E4BE04BF44496DF5BEB0D3F077ACB17082A7A4AFD0F15585AB575450713361304AB7D34C5FBA61236D1A79EE0D692059C9DFB62BE987DFB
            Malicious:false
            Yara Hits:
            • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\eztpuH.url, Author: @itsreallynick (Nick Carr)
            Reputation:unknown
            Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\\\Huptze\\Huptze.exe"..IconIndex=0..
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\Huptzeullazkbrfuqvqdlxbsjktmnwu[1]
            Process:C:\Users\user\Desktop\QUOTATION_doc.exe
            File Type:data
            Category:dropped
            Size (bytes):275456
            Entropy (8bit):7.994159392177355
            Encrypted:true
            SSDEEP:6144:1AM8JCaN+mrI9JdIayx4wkdmg8NsoS58ErglehivLUHEJH:aM8JC+rAJdIvxGdmgixGg4ivLUH6H
            MD5:5706CCC115E3F3B69F2DD33634F1A4EC
            SHA1:6B6F6108126B94F84350C961DC6EC1511640EB41
            SHA-256:C3F351E325FD7103DD8A32D2FC8460075B3A99A7818F05CFC5B3EB86C6DEA97C
            SHA-512:8093B45D9F074B79744B4C168CB6F2FB39E45A9454900C68D869BC1F6C1C4EC616C54EFF708B43880800F365833FF9F7D90B554D96716DE043F24158C0EB2C1A
            Malicious:false
            Reputation:unknown
            Preview: ..@5...q.P.Yf..MD0....QJ.-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!...o....y9.{-..!....f...[t..j...d.$m.FR.?....L........af...:6;.&m&l.h.o.O!......T..&.~.,.@("Yr.#..~.*v..u...J.Kid.L........af...:6;.&m&l.h.o.O!......T..&.~.,.@("Yr.#..~.*v..u...J.Kid.L........af...:6;.&m&l.h.o.O!......T..&.~.,.@(L...'Ae.BW..Y..=.@. ..QY....xU..lH.y......4...f,..m..1Eq....k}.|u.....oM..j...G..4p......K%..6,8_Y.R..@p./...R.0..!".....W1.0A.7....O..Q.....$|..5~..L..&..5..h.[R...a....B.,.5....g..2A....Em...[.U.u.jZ0<...,....$..k.S.78.7Fx^:..X-J.zm...e..a..g.O...:..1\.......

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.028470000025409
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.24%
            • InstallShield setup (43055/19) 0.43%
            • Win32 Executable Delphi generic (14689/80) 0.15%
            • Windows Screen Saver (13104/52) 0.13%
            • Win16/32 Executable Delphi generic (2074/23) 0.02%
            File name:QUOTATION_doc.exe
            File size:1052672
            MD5:7c0902852cf17ae5d05ea35d770dcc93
            SHA1:bd57aad081ce20140b226b878091164eaf777e11
            SHA256:a67796ab32ba225ab871923548c5b98147a848edeffb72089724d6131d20dc0c
            SHA512:12226734d0bf22c9c8d70df2d9f308ba13f44f1715c0fd7a033fe90b32f55d33bb0794aa41259bef5a626604d3c23937b8d97d9b35c6a6e5546ae2121947cef8
            SSDEEP:24576:6BMjoRADI2bZ77GjLkEg/0EZcN+fBPLtUqU9PPj2hqp8Zs7SZxD95UCcoyRcRC/S:6BMjVRGZg/0EZcN+fBPLtUqU9PPj2Ap2
            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

            File Icon

            Icon Hash:252506584c9731c0

            Static PE Info

            General

            Entrypoint:0x490218
            Entrypoint Section:CODE
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
            DLL Characteristics:
            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:c615e590ab9a424646aba34bad72f321

            Entrypoint Preview

            Instruction
            push ebp
            mov ebp, esp
            add esp, FFFFFFF0h
            push ebx
            mov eax, 0048FF60h
            call 00007F8EACAEDEF4h
            mov ebx, dword ptr [004EB650h]
            mov eax, dword ptr [ebx]
            call 00007F8EACB47183h
            mov eax, dword ptr [ebx]
            mov edx, 00490290h
            call 00007F8EACB46D77h
            mov ecx, dword ptr [004EB544h]
            mov eax, dword ptr [ebx]
            mov edx, dword ptr [0048EBB8h]
            call 00007F8EACB4717Ch
            mov ecx, dword ptr [004EB5F8h]
            mov eax, dword ptr [ebx]
            mov edx, dword ptr [0047F918h]
            call 00007F8EACB47169h
            mov ecx, dword ptr [004EB3C8h]
            mov eax, dword ptr [ebx]
            mov edx, dword ptr [0048E75Ch]
            call 00007F8EACB47156h
            mov eax, dword ptr [ebx]
            call 00007F8EACB471CFh
            pop ebx
            call 00007F8EACAEBC2Dh

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xee0000x2524.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xfd0000xaa00.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf30000x9ba8.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xf20000x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            CODE0x10000x8f29c0x8f400False0.519360820244data6.57636511075IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            DATA0x910000x5a82c0x5aa00False0.421761853448data6.86640769394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            BSS0xec0000x12690x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .idata0xee0000x25240x2600False0.362356085526data4.99675959328IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .tls0xf10000x400x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rdata0xf20000x180x200False0.05078125data0.199107517787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
            .reloc0xf30000x9ba80x9c00False0.571890024038data6.65385066773IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
            .rsrc0xfd0000xaa000xaa00False0.274057904412data4.57303719616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_CURSOR0xfe2a00x134data
            RT_CURSOR0xfe3d40x134data
            RT_CURSOR0xfe5080x134data
            RT_CURSOR0xfe63c0x134data
            RT_CURSOR0xfe7700x134data
            RT_CURSOR0xfe8a40x134data
            RT_CURSOR0xfe9d80x134data
            RT_BITMAP0xfeb0c0x1d0data
            RT_BITMAP0xfecdc0x1e4data
            RT_BITMAP0xfeec00x1d0data
            RT_BITMAP0xff0900x1d0data
            RT_BITMAP0xff2600x1d0data
            RT_BITMAP0xff4300x1d0data
            RT_BITMAP0xff6000x1d0data
            RT_BITMAP0xff7d00x1d0data
            RT_BITMAP0xff9a00x1d0data
            RT_BITMAP0xffb700x1d0data
            RT_BITMAP0xffd400x128data
            RT_BITMAP0xffe680x128data
            RT_BITMAP0xfff900x128data
            RT_BITMAP0x1000b80xe8data
            RT_BITMAP0x1001a00x128data
            RT_BITMAP0x1002c80x128data
            RT_BITMAP0x1003f00xd0data
            RT_BITMAP0x1004c00x128data
            RT_BITMAP0x1005e80x128data
            RT_BITMAP0x1007100x128data
            RT_BITMAP0x1008380x128data
            RT_BITMAP0x1009600x128data
            RT_BITMAP0x100a880xe8data
            RT_BITMAP0x100b700x128data
            RT_BITMAP0x100c980x128data
            RT_BITMAP0x100dc00xd0data
            RT_BITMAP0x100e900x128data
            RT_BITMAP0x100fb80x128data
            RT_BITMAP0x1010e00x128data
            RT_BITMAP0x1012080x128data
            RT_BITMAP0x1013300x128data
            RT_BITMAP0x1014580xe8data
            RT_BITMAP0x1015400x128data
            RT_BITMAP0x1016680x128data
            RT_BITMAP0x1017900xd0data
            RT_BITMAP0x1018600x128data
            RT_BITMAP0x1019880x128data
            RT_BITMAP0x101ab00xe8GLS_BINARY_LSB_FIRSTEnglishUnited States
            RT_ICON0x101b980x988dataEnglishUnited States
            RT_ICON0x1025200x10a8dataEnglishUnited States
            RT_DIALOG0x1035c80x52data
            RT_STRING0x10361c0x868data
            RT_STRING0x103e840x830data
            RT_STRING0x1046b40x1e0data
            RT_STRING0x1048940x198data
            RT_STRING0x104a2c0x158data
            RT_STRING0x104b840x624data
            RT_STRING0x1051a80x260data
            RT_STRING0x1054080xe8data
            RT_STRING0x1054f00x128data
            RT_STRING0x1056180x2c8data
            RT_STRING0x1058e00x408data
            RT_STRING0x105ce80x380data
            RT_STRING0x1060680x418data
            RT_STRING0x1064800x1b0data
            RT_STRING0x1066300xecdata
            RT_STRING0x10671c0x1e4data
            RT_STRING0x1069000x3e8data
            RT_STRING0x106ce80x358data
            RT_STRING0x1070400x2b4data
            RT_RCDATA0x1072f40x10data
            RT_RCDATA0x1073040x390data
            RT_RCDATA0x1076940x23fDelphi compiled form 'TFrmAbout'
            RT_GROUP_CURSOR0x1078d40x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x1078e80x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x1078fc0x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x1079100x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x1079240x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x1079380x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_CURSOR0x10794c0x14Lotus unknown worksheet or configuration, revision 0x1
            RT_GROUP_ICON0x1079600x22dataEnglishUnited States

            Imports

            DLLImport
            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
            user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
            oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
            kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
            kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
            version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
            gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetPaletteEntries, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
            user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawStateA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
            kernel32.dllSleep
            oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
            ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
            oleaut32.dllGetErrorInfo, SysFreeString
            comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
            winmm.dllsndPlaySoundA
            uRLInetIsOffline

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            Network Port Distribution

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Oct 27, 2021 18:15:59.831888914 CEST5406453192.168.2.68.8.8.8
            Oct 27, 2021 18:16:01.041918039 CEST5281153192.168.2.68.8.8.8
            Oct 27, 2021 18:17:03.908759117 CEST6137453192.168.2.68.8.8.8
            Oct 27, 2021 18:17:03.934751987 CEST5033953192.168.2.68.8.8.8

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Oct 27, 2021 18:15:59.831888914 CEST192.168.2.68.8.8.80x37bfStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
            Oct 27, 2021 18:16:01.041918039 CEST192.168.2.68.8.8.80x59aaStandard query (0)mpc3og.am.files.1drv.comA (IP address)IN (0x0001)
            Oct 27, 2021 18:17:03.908759117 CEST192.168.2.68.8.8.80x3804Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
            Oct 27, 2021 18:17:03.934751987 CEST192.168.2.68.8.8.80x1c90Standard query (0)onedrive.live.comA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Oct 27, 2021 18:15:59.851483107 CEST8.8.8.8192.168.2.60x37bfNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
            Oct 27, 2021 18:16:01.120649099 CEST8.8.8.8192.168.2.60x59aaNo error (0)mpc3og.am.files.1drv.comam-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
            Oct 27, 2021 18:16:01.120649099 CEST8.8.8.8192.168.2.60x59aaNo error (0)am-files.fe.1drv.comodc-am-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
            Oct 27, 2021 18:17:03.949292898 CEST8.8.8.8192.168.2.60x3804No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
            Oct 27, 2021 18:17:03.952945948 CEST8.8.8.8192.168.2.60x1c90No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

            Code Manipulations

            Statistics

            CPU Usage

            Click to jump to process

            Memory Usage

            Click to jump to process

            High Level Behavior Distribution

            Click to dive into process behavior distribution

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:18:14:42
            Start date:27/10/2021
            Path:C:\Users\user\Desktop\QUOTATION_doc.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\QUOTATION_doc.exe'
            Imagebase:0x400000
            File size:1052672 bytes
            MD5 hash:7C0902852CF17AE5D05EA35D770DCC93
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Reputation:low

            General

            Start time:18:14:53
            Start date:27/10/2021
            Path:C:\Windows\System32\svchost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
            Imagebase:0x7ff6b7590000
            File size:51288 bytes
            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:18:16:06
            Start date:27/10/2021
            Path:C:\Windows\SysWOW64\mobsync.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\System32\mobsync.exe
            Imagebase:0x120000
            File size:93184 bytes
            MD5 hash:44C19378FA529DD88674BAF647EBDC3C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000000.523957704.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000000.523481465.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000000.524496982.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000000.522931849.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:moderate

            General

            Start time:18:16:09
            Start date:27/10/2021
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\Explorer.EXE
            Imagebase:0x7ff6f22f0000
            File size:3933184 bytes
            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000011.00000000.624299247.000000000D4FD000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.598500416.0000000007B56000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000011.00000000.624322018.000000000D502000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
            • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000011.00000000.550371526.000000000D4FD000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
            Reputation:high

            General

            Start time:18:16:19
            Start date:27/10/2021
            Path:C:\Users\Public\Libraries\Huptze\Huptze.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\Public\Libraries\Huptze\Huptze.exe'
            Imagebase:0x400000
            File size:1052672 bytes
            MD5 hash:7C0902852CF17AE5D05EA35D770DCC93
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000014.00000002.632108057.00000000026F0000.00000004.00000001.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 29%, Virustotal, Browse
            • Detection: 30%, ReversingLabs
            Reputation:low

            General

            Start time:18:16:26
            Start date:27/10/2021
            Path:C:\Users\Public\Libraries\Huptze\Huptze.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\Public\Libraries\Huptze\Huptze.exe'
            Imagebase:0x400000
            File size:1052672 bytes
            MD5 hash:7C0902852CF17AE5D05EA35D770DCC93
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000015.00000002.631255655.00000000021A0000.00000004.00000001.sdmp, Author: Joe Security
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >

              Executed Functions

              Non-executed Functions

              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.401900048.00000000022F8000.00000004.00000001.sdmp, Offset: 022F8000, based on PE: false
              • Associated: 00000000.00000003.445926831.00000000022F8000.00000004.00000001.sdmp Download File
              Similarity
              • API ID:
              • String ID: `.@$cA
              • API String ID: 0-3820551636
              • Opcode ID: 758e850e5872a477811bf31f73a0a0d911e37b91d0ab9fba4b073a5bb3d29fd9
              • Instruction ID: 609ade336144863f48fa2b752b6a897a81735b3fd0ced76adcdd3dca1bf6916c
              • Opcode Fuzzy Hash: 758e850e5872a477811bf31f73a0a0d911e37b91d0ab9fba4b073a5bb3d29fd9
              • Instruction Fuzzy Hash: 7141F63013070199E7B05FA8D904B23F5E5EB04748F208F3DD39A96AECD7F5A8808B55
              Uniqueness

              Uniqueness Score: -1.00%