Loading ...

Play interactive tourEdit tour

Windows Analysis Report important invoice presentation nov 2021.pif

Overview

General Information

Sample Name:important invoice presentation nov 2021.pif (renamed file extension from pif to exe)
Analysis ID:523630
MD5:1364844e0bfb349272c5050fb0e677e3
SHA1:ffc57ad66c9a3764a88a2b2c3ec1f0f19042c77a
SHA256:004f011b37e4446fa04b76aae537cc00f6588c0705839152ae2d8a837ef2b730
Infos:

Most interesting Screenshot:

Detection

NetWire
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:46
Range:0 - 100

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected NetWire RAT
Sigma detected: Copying Sensitive Files with Credential Data
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Initial sample is a PE file and has a suspicious name
Found evasive API chain (may stop execution after checking mutex)
Writes to foreign memory regions
Contains functionality to log keystrokes
Found stalling execution ending in API Sleep call
Sigma detected: Xwizard DLL Sideloading
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Abnormal high CPU Usage
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Potential key logger detected (key state polling based)
Found evasive API chain (may stop execution after accessing registry keys)
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to simulate mouse events

Classification

Process Tree

  • System is w10x64
  • important invoice presentation nov 2021.exe (PID: 6968 cmdline: "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" MD5: 1364844E0BFB349272C5050FB0E677E3)
    • cmd.exe (PID: 3576 cmdline: cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • xcopy.exe (PID: 6100 cmdline: xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q MD5: 9F3712DDC0D7FE3D75B8A06C6EE8E68C)
    • cmd.exe (PID: 5536 cmdline: cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5660 cmdline: schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • xwizard.exe (PID: 5612 cmdline: C:\Windows\System32\xwizard.exe MD5: 17059CA3DDD41B52DE4140705B38AE53)
  • important invoice presentation nov 2021.exe (PID: 2872 cmdline: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe MD5: 1364844E0BFB349272C5050FB0E677E3)
    • cmd.exe (PID: 5704 cmdline: cmd /c xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • xcopy.exe (PID: 4920 cmdline: xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q MD5: 9F3712DDC0D7FE3D75B8A06C6EE8E68C)
    • cmd.exe (PID: 3032 cmdline: cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2032 cmdline: schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • xwizard.exe (PID: 2040 cmdline: C:\Windows\System32\xwizard.exe MD5: 17059CA3DDD41B52DE4140705B38AE53)
  • cleanup

Malware Configuration

Threatname: NetWire

{"C2 list": ["calibare5454.pro:3360"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "wAnRkHLX", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmpnetwiredetect netwire in memoryJPCERT/CC Incident Response Group
    • 0x580:$v1: HostId-%Rand%
    00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
      0000000E.00000002.863773731.0000000000422000.00000004.00020000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
        0000000D.00000002.683551594.000000001CF00000.00000040.00000001.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          Click to see the 5 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          1.2.important invoice presentation nov 2021.exe.1c8f0000.1.raw.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
            14.2.xwizard.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
              13.2.important invoice presentation nov 2021.exe.1cf00000.1.raw.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
                30.2.xwizard.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
                  30.2.xwizard.exe.400000.0.unpacknetwiredetect netwire in memoryJPCERT/CC Incident Response Group
                  • 0x20f80:$v1: HostId-%Rand%

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Copying Sensitive Files with Credential DataShow sources
                  Source: Process startedAuthor: Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community: Data: Command: cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q , CommandLine: cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q , CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" , ParentImage: C:\Users\user\Desktop\important invoice presentation nov 2021.exe, ParentProcessId: 6968, ProcessCommandLine: cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q , ProcessId: 3576
                  Sigma detected: Xwizard DLL SideloadingShow sources
                  Source: Process startedAuthor: Christian Burkard: Data: Command: C:\Windows\System32\xwizard.exe, CommandLine: C:\Windows\System32\xwizard.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\xwizard.exe, NewProcessName: C:\Windows\SysWOW64\xwizard.exe, OriginalFileName: C:\Windows\SysWOW64\xwizard.exe, ParentCommandLine: "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" , ParentImage: C:\Users\user\Desktop\important invoice presentation nov 2021.exe, ParentProcessId: 6968, ProcessCommandLine: C:\Windows\System32\xwizard.exe, ProcessId: 5612

                  Jbx Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmpMalware Configuration Extractor: NetWire {"C2 list": ["calibare5454.pro:3360"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "wAnRkHLX", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
                  Source: 30.2.xwizard.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                  Source: 14.2.xwizard.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040C4B7 RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegCloseKey,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040E511 CryptUnprotectData,LocalFree,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040EDD6 fopen,malloc,fclose,fread,fclose,CryptUnprotectData,sprintf,strcmp,strcmp,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040D290 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040C4B7 RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegCloseKey,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040E511 CryptUnprotectData,LocalFree,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040EDD6 fopen,malloc,fclose,fread,fclose,CryptUnprotectData,sprintf,strcmp,strcmp,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040D290 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

                  Compliance:

                  barindex
                  Uses 32bit PE filesShow sources
                  Source: important invoice presentation nov 2021.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  PE / OLE file has a valid certificateShow sources
                  Source: important invoice presentation nov 2021.exeStatic PE information: certificate valid
                  Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                  Source: important invoice presentation nov 2021.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BD655F __EH_prolog3_GS,GetFullPathNameA,__cftof,_strlen,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,_strlen,_strlen,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,

                  Networking:

                  barindex
                  C2 URLs / IPs found in malware configurationShow sources
                  Source: Malware configuration extractorURLs: calibare5454.pro:3360
                  Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                  Source: Joe Sandbox ViewIP Address: 51.195.57.233 51.195.57.233
                  Source: global trafficTCP traffic: 192.168.2.6:49777 -> 51.195.57.233:3360
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://ocsp.comodoca.com0
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://ocsp.sectigo.com0
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: http://www.xnview.com
                  Source: xwizard.exeString found in binary or memory: http://www.yandex.com
                  Source: important invoice presentation nov 2021.exe, 00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmp, important invoice presentation nov 2021.exe, 0000000D.00000002.683551594.000000001CF00000.00000040.00000001.sdmp, xwizard.exe, 0000000E.00000002.863773731.0000000000422000.00000004.00020000.sdmp, xwizard.exe, 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmpString found in binary or memory: http://www.yandex.comsocks=
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: https://sectigo.com/CPS0
                  Source: important invoice presentation nov 2021.exeString found in binary or memory: https://sectigo.com/CPS0D
                  Source: unknownDNS traffic detected: queries for: calibare5454.pro
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00405FBE recv,WSAGetLastError,

                  Key, Mouse, Clipboard, Microphone and Screen Capturing:

                  barindex
                  Contains functionality to log keystrokesShow sources
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00411D8C GetSystemMetrics,GetSystemMetrics,GetDesktopWindow,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetDIBits,calloc,GetDIBits,ReleaseDC,DeleteDC,DeleteObject,free,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BBA38E GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BF8181 __EH_prolog3,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,

                  System Summary:

                  barindex
                  Malicious sample detected (through community Yara rule)Show sources
                  Source: 30.2.xwizard.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: Process Memory Space: xwizard.exe PID: 2040, type: MEMORYSTRMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Initial sample is a PE file and has a suspicious nameShow sources
                  Source: initial sampleStatic PE information: Filename: important invoice presentation nov 2021.exe
                  Source: important invoice presentation nov 2021.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: 30.2.xwizard.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmp, type: MEMORYMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: Process Memory Space: xwizard.exe PID: 2040, type: MEMORYSTRMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00B9E230
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BBAA7C
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BE106A
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00403047
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0041D049
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00419463
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00415079
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00420420
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004208C0
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004034D3
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00414976
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00402E68
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00416619
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040AEC6
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00402AFC
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00415ABF
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00420F40
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0041FF50
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040A728
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00403047
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0041D049
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00419463
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00415079
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00420420
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_004208C0
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_004034D3
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00414976
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00402E68
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00416619
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040AEC6
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00402AFC
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00415ABF
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00420F40
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0041FF50
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040A728
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: String function: 00D59920 appears 36 times
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: String function: 00D597E9 appears 54 times
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: String function: 00B9F800 appears 31 times
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: String function: 00D597B6 appears 167 times
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00CC161A LocalAlloc,GetSystemInfo,NtQueryVirtualMemory,LocalFree,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00CC161A LocalAlloc,GetSystemInfo,NtQueryVirtualMemory,
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess Stats: CPU usage > 98%
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess Stats: CPU usage > 98%
                  Source: important invoice presentation nov 2021.exe, 00000001.00000000.336774909.000000000150B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamexnviewmp.exeL vs important invoice presentation nov 2021.exe
                  Source: important invoice presentation nov 2021.exe, 0000000D.00000002.682952195.0000000000E4B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamexnviewmp.exeL vs important invoice presentation nov 2021.exe
                  Source: important invoice presentation nov 2021.exeBinary or memory string: OriginalFilenamexnviewmp.exeL vs important invoice presentation nov 2021.exe
                  Source: important invoice presentation nov 2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: important invoice presentation nov 2021.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: important invoice presentation nov 2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\important invoice presentation nov 2021.exe "C:\Users\user\Desktop\important invoice presentation nov 2021.exe"
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: unknownProcess created: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: classification engineClassification label: mal84.troj.spyw.evad.winEXE@26/2@1/1
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00C00C4D CoInitialize,CoCreateInstance,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00402570 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5272:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3132:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4388:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_01
                  Source: C:\Windows\SysWOW64\xwizard.exeMutant created: \Sessions\1\BaseNamedObjects\wAnRkHLX
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BAC0F7 __EH_prolog3_catch,FindResourceA,LoadResource,LockResource,GetDesktopWindow,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,
                  Source: C:\Windows\SysWOW64\xcopy.exeFile created: C:\Program Files (x86)\SecurityJump to behavior
                  Source: C:\Windows\SysWOW64\xwizard.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\xwizard.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: important invoice presentation nov 2021.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: important invoice presentation nov 2021.exeStatic file information: File size 3391296 > 1048576
                  Source: important invoice presentation nov 2021.exeStatic PE information: certificate valid
                  Source: important invoice presentation nov 2021.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x22cc00
                  Source: important invoice presentation nov 2021.exeStatic PE information: More than 200 imports for USER32.dll
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: important invoice presentation nov 2021.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: important invoice presentation nov 2021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: important invoice presentation nov 2021.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: important invoice presentation nov 2021.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: important invoice presentation nov 2021.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: important invoice presentation nov 2021.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: important invoice presentation nov 2021.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D5A1ED push ecx; ret
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BB061B push 8B00DBECh; retf
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BB0607 push 8B00DBECh; retf
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BB0739 push 8B00DBECh; iretd
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BB0702 push 8B00DBECh; iretd
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DCE9 push ecx; mov dword ptr [esp], 00423976h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DCE9 push ebp; mov dword ptr [esp], 0042398Ah
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DCE9 push edx; mov dword ptr [esp], 00423997h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DCE9 push edx; mov dword ptr [esp], esi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040A4BC push esi; mov dword ptr [esp], 00423347h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00409953 push edi; mov dword ptr [esp], 00000091h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00409953 push ebp; mov dword ptr [esp], 00000090h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00411D8C push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00409E61 push eax; mov dword ptr [esp], ebx
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406E04 push ecx; mov dword ptr [esp], ebx
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040262F push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040262F push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040262F push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004146E1 push eax; mov dword ptr [esp], ebx
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040970C push eax; mov dword ptr [esp], 0042B4A0h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DCE9 push ecx; mov dword ptr [esp], 00423976h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DCE9 push ebp; mov dword ptr [esp], 0042398Ah
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DCE9 push edx; mov dword ptr [esp], 00423997h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DCE9 push edx; mov dword ptr [esp], esi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040A4BC push esi; mov dword ptr [esp], 00423347h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00409953 push edi; mov dword ptr [esp], 00000091h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00409953 push ebp; mov dword ptr [esp], 00000090h
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00411D8C push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00409E61 push eax; mov dword ptr [esp], ebx
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406E04 push ecx; mov dword ptr [esp], ebx
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040262F push edx; mov dword ptr [esp], edi
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00408417 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,malloc,
                  Source: C:\Windows\SysWOW64\xcopy.exeFile created: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Overwrites code with unconditional jumps - possibly settings hooks in foreign processShow sources
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: PID: 5612 base: CC13DB value: E9 4D 10 74 FF
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: PID: 5612 base: 11E4EF0 value: E9 43 B8 AD FF
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: PID: 2040 base: CC13DB value: E9 4D 10 74 FF
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: PID: 2040 base: 11E4EF0 value: E9 43 B8 AD FF
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BE6783 IsWindowVisible,IsIconic,
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Found evasive API chain (may stop execution after checking mutex)Show sources
                  Source: C:\Windows\SysWOW64\xwizard.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                  Source: C:\Windows\SysWOW64\xwizard.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
                  Found stalling execution ending in API Sleep callShow sources
                  Source: C:\Windows\SysWOW64\xwizard.exeStalling execution: Execution stalls by calling Sleep
                  Source: C:\Windows\SysWOW64\xwizard.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\xwizard.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\xwizard.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                  Source: C:\Windows\SysWOW64\xwizard.exeAPI coverage: 7.6 %
                  Source: C:\Windows\SysWOW64\xwizard.exeAPI coverage: 3.1 %
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess information queried: ProcessInformation
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D7216B VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BD655F __EH_prolog3_GS,GetFullPathNameA,__cftof,_strlen,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,_strlen,_strlen,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 30_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,
                  Source: C:\Windows\SysWOW64\xwizard.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\xwizard.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\xwizard.exeAPI call chain: ExitProcess graph end node
                  Source: xwizard.exe, 0000001E.00000002.688604583.00000000010A8000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
                  Source: xwizard.exe, 0000000E.00000002.864002557.0000000000F38000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D680C8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D7216B VirtualProtect ?,-00000001,00000104,?,?,?,00000000
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BAACF6 OutputDebugStringA,GetLastError,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_00408417 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,malloc,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BC23F6 GetProcessHeap,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D9085C mov eax, dword ptr fs:[00000030h]
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D680C8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D5A5D4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Maps a DLL or memory area into another processShow sources
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeSection loaded: unknown target: C:\Windows\SysWOW64\xwizard.exe protection: execute and read and write
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeSection loaded: unknown target: C:\Windows\SysWOW64\xwizard.exe protection: execute and read and write
                  Writes to foreign memory regionsShow sources
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: B4B008
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: CC0000
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: CC13DB
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: 11E4EF0
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: BBD008
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: CC0000
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: CC13DB
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory written: C:\Windows\SysWOW64\xwizard.exe base: 11E4EF0
                  Allocates memory in foreign processesShow sources
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeMemory allocated: C:\Windows\SysWOW64\xwizard.exe base: CC0000 protect: page execute and read and write
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeMemory allocated: C:\Windows\SysWOW64\xwizard.exe base: CC0000 protect: page execute and read and write
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004121C0 keybd_event,
                  Source: C:\Users\user\Desktop\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeProcess created: C:\Windows\SysWOW64\xwizard.exe C:\Windows\System32\xwizard.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\xcopy.exe xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004121EF SetCursorPos,mouse_event,
                  Source: xwizard.exe, 0000000E.00000002.863923152.0000000000C94000.00000004.00000001.sdmpBinary or memory string: Program Manager
                  Source: xwizard.exe, 0000000E.00000002.864740086.0000000003980000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: xwizard.exe, 0000000E.00000002.864740086.0000000003980000.00000002.00020000.sdmpBinary or memory string: Progman
                  Source: xwizard.exe, 0000000E.00000002.863923152.0000000000C94000.00000004.00000001.sdmpBinary or memory string: Program Manager"
                  Source: xwizard.exe, 0000000E.00000002.864740086.0000000003980000.00000002.00020000.sdmpBinary or memory string: &Program Manager
                  Source: xwizard.exe, 0000000E.00000002.864740086.0000000003980000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D5A3F4 cpuid
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00D5A7D1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                  Source: C:\Program Files (x86)\Security\important invoice presentation nov 2021.exeCode function: 13_2_00BE3003 __EH_prolog3_GS,GetVersionExA,__cftof,_strlen,CoInitializeEx,CoCreateInstance,
                  Source: C:\Windows\SysWOW64\xwizard.exeCode function: 14_2_004130E8 GetUserNameW,WideCharToMultiByte,

                  Remote Access Functionality:

                  barindex
                  Yara detected NetWire RATShow sources
                  Source: Yara matchFile source: 1.2.important invoice presentation nov 2021.exe.1c8f0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.xwizard.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.important invoice presentation nov 2021.exe.1cf00000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.xwizard.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.863773731.0000000000422000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.683551594.000000001CF00000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: important invoice presentation nov 2021.exe PID: 6968, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: important invoice presentation nov 2021.exe PID: 2872, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: xwizard.exe PID: 5612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: xwizard.exe PID: 2040, type: MEMORYSTR

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsNative API11Scheduled Task/Job1Process Injection312Disable or Modify Tools1Credential API Hooking1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Input Capture121Account Discovery1Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesCredential API Hooking1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSSystem Information Discovery15Distributed Component Object ModelInput Capture121Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery31SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection312Cached Domain CredentialsProcess Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 523630 Sample: important invoice presentat... Startdate: 17/11/2021 Architecture: WINDOWS Score: 84 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Yara detected NetWire RAT 2->53 55 4 other signatures 2->55 7 important invoice presentation nov 2021.exe 2->7         started        10 important invoice presentation nov 2021.exe 2->10         started        process3 signatures4 57 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->57 59 Writes to foreign memory regions 7->59 61 Allocates memory in foreign processes 7->61 12 xwizard.exe 2 7->12         started        16 cmd.exe 1 7->16         started        18 cmd.exe 1 7->18         started        63 Maps a DLL or memory area into another process 10->63 20 cmd.exe 1 10->20         started        22 cmd.exe 1 10->22         started        24 xwizard.exe 10->24         started        process5 dnsIp6 47 calibare5454.pro 51.195.57.233, 3360, 49777 OVHFR France 12->47 65 Contains functionality to log keystrokes 12->65 67 Found evasive API chain (may stop execution after checking mutex) 12->67 69 Found stalling execution ending in API Sleep call 12->69 71 Uses schtasks.exe or at.exe to add and modify task schedules 16->71 26 xcopy.exe 4 16->26         started        29 conhost.exe 16->29         started        31 conhost.exe 18->31         started        33 schtasks.exe 1 18->33         started        35 conhost.exe 20->35         started        37 xcopy.exe 1 20->37         started        39 conhost.exe 22->39         started        41 schtasks.exe 1 22->41         started        signatures7 process8 file9 43 important invoice ...tation nov 2021.exe, PE32 26->43 dropped 45 important invoice ...exe:Zone.Identifier, ASCII 26->45 dropped

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  No Antivirus matches

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  30.2.xwizard.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                  13.2.important invoice presentation nov 2021.exe.1cf00000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  14.2.xwizard.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
                  1.2.important invoice presentation nov 2021.exe.1c8f0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                  http://ocsp.sectigo.com00%URL Reputationsafe
                  http://www.yandex.comsocks=0%Avira URL Cloudsafe
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                  https://sectigo.com/CPS0D0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                  calibare5454.pro:33600%Avira URL Cloudsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  calibare5454.pro
                  51.195.57.233
                  truetrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    calibare5454.pro:3360true
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0timportant invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPS0important invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yimportant invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0important invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0important invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.yandex.comsocks=important invoice presentation nov 2021.exe, 00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmp, important invoice presentation nov 2021.exe, 0000000D.00000002.683551594.000000001CF00000.00000040.00000001.sdmp, xwizard.exe, 0000000E.00000002.863773731.0000000000422000.00000004.00020000.sdmp, xwizard.exe, 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#important invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPS0Dimportant invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#important invoice presentation nov 2021.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.xnview.comimportant invoice presentation nov 2021.exefalse
                      high
                      http://www.yandex.comxwizard.exefalse
                        high
                        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#important invoice presentation nov 2021.exefalse
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        51.195.57.233
                        calibare5454.proFrance
                        16276OVHFRtrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:523630
                        Start date:17.11.2021
                        Start time:14:31:45
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 13m 25s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:important invoice presentation nov 2021.pif (renamed file extension from pif to exe)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:35
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal84.troj.spyw.evad.winEXE@26/2@1/1
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HDC Information:
                        • Successful, ratio: 91.9% (good quality ratio 46%)
                        • Quality average: 39.4%
                        • Quality standard deviation: 44%
                        HCA Information:
                        • Successful, ratio: 94%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Override analysis time to 240s for sample files taking high CPU consumption
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 40.126.31.140, 40.126.31.138, 40.126.31.136, 20.190.159.135, 20.190.159.137, 40.126.31.7, 40.126.31.9, 40.126.31.5, 51.104.136.2, 51.11.168.232, 20.49.150.241
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, www.tm.lg.prod.aadmsa.akadns.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, arc.msn.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        14:33:51Task SchedulerRun new task: Security path: C:\Program s>Files (x86)\Security\important invoice presentation nov 2021.exe

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        51.195.57.2334opi0b3gZn.exeGet hashmaliciousBrowse
                          fGh96VozUi.exeGet hashmaliciousBrowse
                            cTpmz8G3Ob.exeGet hashmaliciousBrowse
                              DigiCertUtil.exeGet hashmaliciousBrowse
                                FireFoxExtension.exeGet hashmaliciousBrowse

                                  Domains

                                  No context

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  OVHFRXE7c64PfoP.exeGet hashmaliciousBrowse
                                  • 91.134.150.150
                                  3AgSx1cQFE.exeGet hashmaliciousBrowse
                                  • 51.81.139.72
                                  982tSWUdff.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  ji2TXozBAl.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  N6CyMVFTbm.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  ji2TXozBAl.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  index.dllGet hashmaliciousBrowse
                                  • 51.68.175.8
                                  lUynlGo56B9U3mQG.dllGet hashmaliciousBrowse
                                  • 51.178.61.60
                                  Ttj0AuTKHQ.dllGet hashmaliciousBrowse
                                  • 51.178.61.60
                                  KgtyOfJo2W.dllGet hashmaliciousBrowse
                                  • 51.178.61.60
                                  h5ZcTHDXbJ.dllGet hashmaliciousBrowse
                                  • 51.178.61.60
                                  SCygJvetwW.dllGet hashmaliciousBrowse
                                  • 51.68.175.8
                                  a5uyawQx9G.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  bymJNhzejq.dllGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  DOC_1003394276473336675207.docmGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  Pending Invoice 38129337.exeGet hashmaliciousBrowse
                                  • 54.38.220.85
                                  File#BOL.exeGet hashmaliciousBrowse
                                  • 51.83.52.225
                                  60039DF63E861FBDABF05185173E4A6937A8813A9C499.exeGet hashmaliciousBrowse
                                  • 66.70.218.54
                                  Report.docmGet hashmaliciousBrowse
                                  • 158.69.222.101
                                  CyNu4YFki4.dllGet hashmaliciousBrowse
                                  • 158.69.222.101

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe
                                  Process:C:\Windows\SysWOW64\xcopy.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3391296
                                  Entropy (8bit):6.764334303023271
                                  Encrypted:false
                                  SSDEEP:98304:s1zCQ5fFa1BJLhjtX5yI3FwzLhYsJLIy38X79Tg:s1zCesBPny2y38X79T
                                  MD5:1364844E0BFB349272C5050FB0E677E3
                                  SHA1:FFC57AD66C9A3764A88A2B2C3EC1F0F19042C77A
                                  SHA-256:004F011B37E4446FA04B76AAE537CC00F6588C0705839152AE2D8A837EF2B730
                                  SHA-512:82AD807D0AE5D34D49A9DE38F02BA5096BF4B80DF8A58F1E9F2FF9FA53AE04B3B58C584CD19E62B996D63FE4E3FE1B1FDCC6C5C7433FBA7A07D19D4103EE82D3
                                  Malicious:true
                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2..v..v..v..b..j..b..W..b.......e.....o........b..t..b..S..v..~....~.....w....w..Richv..........................PE..L....q.a..................".........N........."...@...........................4.......3...@...................................).|.....+..O............3.@)....1. .....'.......................'.......'.@.............".h............................text....."......."................. ..`.rdata..8K...."..L....".............@..@.data........0*..2....*.............@....rsrc....O....+..P...N+.............@..@.reloc.. .....1.......0.............@..B........................................................................................................................................................................................................................................................................................
                                  C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe:Zone.Identifier
                                  Process:C:\Windows\SysWOW64\xcopy.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview: [ZoneTransfer]....ZoneId=0

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.764334303023271
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 98.81%
                                  • Windows ActiveX control (116523/4) 1.15%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:important invoice presentation nov 2021.exe
                                  File size:3391296
                                  MD5:1364844e0bfb349272c5050fb0e677e3
                                  SHA1:ffc57ad66c9a3764a88a2b2c3ec1f0f19042c77a
                                  SHA256:004f011b37e4446fa04b76aae537cc00f6588c0705839152ae2d8a837ef2b730
                                  SHA512:82ad807d0ae5d34d49a9de38f02ba5096bf4b80df8a58f1e9f2ff9fa53ae04b3b58c584cd19e62b996d63fe4e3fe1b1fdcc6c5c7433fba7a07d19d4103ee82d3
                                  SSDEEP:98304:s1zCQ5fFa1BJLhjtX5yI3FwzLhYsJLIy38X79Tg:s1zCesBPny2y38X79T
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...v...v...v...b...j...b...W...b...........e.......o...........b...t...b...S...v...~.......~.......w.......w...Richv..........

                                  File Icon

                                  Icon Hash:69ab96a6a6dc6891

                                  Static PE Info

                                  General

                                  Entrypoint:0x5c944e
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x61907180 [Sun Nov 14 02:16:32 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:928ca23958b7b89682da5497b37038ac

                                  Authenticode Signature

                                  Signature Valid:true
                                  Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                  Signature Validation Error:The operation completed successfully
                                  Error Number:0
                                  Not Before, Not After
                                  • 11/11/2021 4:00:00 PM 11/12/2022 3:59:59 PM
                                  Subject Chain
                                  • CN=ULTRA ACADEMY LTD, O=ULTRA ACADEMY LTD, S=London, C=GB
                                  Version:3
                                  Thumbprint MD5:BCAF7BE878249CC7571201AE00B95303
                                  Thumbprint SHA-1:E94AD249747FD4B88750B2CD6D8D65AD33D3566D
                                  Thumbprint SHA-256:0D358ADC3623D52FBF1EC26ACAEBBEE7AFC73082276B60DE1FE51F59E4B4AEBC
                                  Serial:387EEB89B8BF626BBF4C7C9F5B998B40

                                  Entrypoint Preview

                                  Instruction
                                  call 00007FC524AAFEC0h
                                  jmp 00007FC524AAEAF5h
                                  push 00000014h
                                  push 0069DC58h
                                  call 00007FC524AAEFB1h
                                  push 00000001h
                                  call 00007FC524AAE5F3h
                                  pop ecx
                                  test al, al
                                  je 00007FC524AAEC40h
                                  xor bl, bl
                                  mov byte ptr [ebp-19h], bl
                                  and dword ptr [ebp-04h], 00000000h
                                  call 00007FC524AAE4E1h
                                  mov byte ptr [ebp-24h], al
                                  mov eax, dword ptr [006B9B14h]
                                  xor ecx, ecx
                                  inc ecx
                                  cmp eax, ecx
                                  je 00007FC524AAEC1Fh
                                  test eax, eax
                                  jne 00007FC524AAEB3Bh
                                  mov dword ptr [006B9B14h], ecx
                                  push 0062EF74h
                                  push 0062EF4Ch
                                  call 00007FC524AE086Bh
                                  pop ecx
                                  pop ecx
                                  test eax, eax
                                  je 00007FC524AAEB03h
                                  mov dword ptr [ebp-04h], FFFFFFFEh
                                  mov eax, 000000FFh
                                  jmp 00007FC524AAEBDEh
                                  push 0062EF48h
                                  push 0062EC74h
                                  call 00007FC524AE0800h
                                  pop ecx
                                  pop ecx
                                  mov dword ptr [006B9B14h], 00000002h
                                  jmp 00007FC524AAEAF7h
                                  mov bl, cl
                                  mov byte ptr [ebp-19h], bl
                                  push dword ptr [ebp-24h]
                                  call 00007FC524AAE6C4h
                                  pop ecx
                                  call 00007FC524AAFED4h
                                  mov esi, eax
                                  xor edi, edi
                                  cmp dword ptr [esi], edi
                                  je 00007FC524AAEB0Dh
                                  push esi
                                  call 00007FC524AAE61Ch
                                  pop ecx
                                  test al, al
                                  je 00007FC524AAEB02h
                                  mov esi, dword ptr [esi]
                                  push edi
                                  push 00000002h
                                  push edi
                                  mov ecx, esi
                                  call dword ptr [0062EC68h]

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x29e8f40x17c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2bb0000x54fdc.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x3396000x2940.reloc
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3100000x2f620.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x278af80x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x278c800x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x278b180x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x22e0000xc68.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x22cac90x22cc00unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rdata0x22e0000x74b380x74c00False0.342708612152data5.50911370588IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x2a30000x17f0c0x13200False0.680695976307data7.16739114428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                  .rsrc0x2bb0000x54fdc0x55000False0.794674862132data7.15845808893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x3100000x2f6200x2f800False0.469078947368data6.58652778609IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_CURSOR0x2bbc780x134dataEnglishUnited States
                                  RT_CURSOR0x2bbdac0xb4dataEnglishUnited States
                                  RT_CURSOR0x2bbe600x134AmigaOS bitmap fontEnglishUnited States
                                  RT_CURSOR0x2bbf940x134dataEnglishUnited States
                                  RT_CURSOR0x2bc0c80x134dataEnglishUnited States
                                  RT_CURSOR0x2bc1fc0x134dataEnglishUnited States
                                  RT_CURSOR0x2bc3300x134dataEnglishUnited States
                                  RT_CURSOR0x2bc4640x134dataEnglishUnited States
                                  RT_CURSOR0x2bc5980x134dataEnglishUnited States
                                  RT_CURSOR0x2bc6cc0x134dataEnglishUnited States
                                  RT_CURSOR0x2bc8000x134dataEnglishUnited States
                                  RT_CURSOR0x2bc9340x134dataEnglishUnited States
                                  RT_CURSOR0x2bca680x134AmigaOS bitmap fontEnglishUnited States
                                  RT_CURSOR0x2bcb9c0x134dataEnglishUnited States
                                  RT_CURSOR0x2bccd00x134dataEnglishUnited States
                                  RT_CURSOR0x2bce040x134dataEnglishUnited States
                                  RT_BITMAP0x2bcf380xb8dataEnglishUnited States
                                  RT_BITMAP0x2bcff00x144dataEnglishUnited States
                                  RT_ICON0x2bd1340xf6daPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                  RT_ICON0x2cc8100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                  RT_ICON0x2dd0380x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 260112383, next used block 4294902256EnglishUnited States
                                  RT_ICON0x2e12600x25a8dataEnglishUnited States
                                  RT_ICON0x2e38080x10a8dataEnglishUnited States
                                  RT_ICON0x2e48b00x988dataEnglishUnited States
                                  RT_ICON0x2e52380x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                  RT_DIALOG0x2e56a00x146dataEnglishUnited States
                                  RT_DIALOG0x2e57e80x3e0dataEnglishUnited States
                                  RT_DIALOG0x2e5bc80xe8dataEnglishUnited States
                                  RT_DIALOG0x2e5cb00x34dataEnglishUnited States
                                  RT_STRING0x2e5ce40x148dataEnglishUnited States
                                  RT_STRING0x2e5e2c0x82dataEnglishUnited States
                                  RT_STRING0x2e5eb00x2adataEnglishUnited States
                                  RT_STRING0x2e5edc0x184dataEnglishUnited States
                                  RT_STRING0x2e60600x4eedataEnglishUnited States
                                  RT_STRING0x2e65500x264dataEnglishUnited States
                                  RT_STRING0x2e67b40x2dadataEnglishUnited States
                                  RT_STRING0x2e6a900x8adataEnglishUnited States
                                  RT_STRING0x2e6b1c0xacdataEnglishUnited States
                                  RT_STRING0x2e6bc80xdedataEnglishUnited States
                                  RT_STRING0x2e6ca80x4a8dataEnglishUnited States
                                  RT_STRING0x2e71500x228dataEnglishUnited States
                                  RT_STRING0x2e73780x2cdataEnglishUnited States
                                  RT_STRING0x2e73a40x53edataEnglishUnited States
                                  RT_RCDATA0x2e78e40x28250data
                                  RT_GROUP_CURSOR0x30fb340x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                                  RT_GROUP_CURSOR0x30fb580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fb6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fb800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fb940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fba80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fbbc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fbd00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fbe40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fbf80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fc0c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fc200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fc340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fc480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_CURSOR0x30fc5c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                  RT_GROUP_ICON0x30fc700x68dataEnglishUnited States
                                  RT_VERSION0x30fcd80x304dataEnglishUnited States

                                  Imports

                                  DLLImport
                                  ACTIVEDS.dll
                                  KERNEL32.dllGetEnvironmentStringsW, IsValidCodePage, FindNextFileW, FindFirstFileExW, SetFilePointerEx, ReadConsoleW, GetConsoleMode, GetConsoleOutputCP, GetStringTypeW, GetTimeZoneInformation, EnumSystemLocalesW, IsValidLocale, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, SetEnvironmentVariableW, GetFileType, SetStdHandle, QueryPerformanceFrequency, HeapQueryInformation, GetCommandLineW, GetCommandLineA, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, VirtualQuery, GetSystemInfo, InterlockedFlushSList, InterlockedPushEntrySList, RtlUnwind, OutputDebugStringW, FreeEnvironmentStringsW, SetConsoleCtrlHandler, CreateFileW, GetStdHandle, ExitProcess, VirtualAlloc, LoadResource, LockResource, SizeofResource, FindResourceW, LocalFree, FormatMessageA, MultiByteToWideChar, WideCharToMultiByte, DecodePointer, RaiseException, GetLastError, HeapDestroy, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GlobalHandle, GetProcessHeap, InitializeCriticalSectionEx, DeleteCriticalSection, SetLastError, GlobalAlloc, GlobalSize, GlobalUnlock, GlobalLock, GlobalFree, MulDiv, CopyFileA, OutputDebugStringA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, LoadLibraryA, LoadLibraryW, FindResourceA, CloseHandle, SetEvent, WaitForSingleObject, CreateEventA, GetCurrentThreadId, SetThreadPriority, SuspendThread, ResumeThread, GetCurrentThread, GetVersionExA, FreeLibrary, GetModuleFileNameA, LoadLibraryExW, GlobalDeleteAtom, lstrcmpA, CompareStringA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileStringA, GlobalAddAtomA, GetCurrentProcessId, EncodePointer, GetSystemDirectoryW, lstrcmpW, GlobalFindAtomA, GlobalGetAtomNameA, FileTimeToSystemTime, SystemTimeToFileTime, GetThreadLocale, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, WriteConsoleW, LocalAlloc, LocalReAlloc, GetAtomNameA, GlobalFlags, GetACP, GetCurrentDirectoryA, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, DeleteFileA, CreateFileA, FindClose, FindFirstFileA, FlushFileBuffers, GetFileSize, GetFullPathNameA, LockFile, ReadFile, SetEndOfFile, SetFilePointer, UnlockFile, WriteFile, GetVolumeInformationA, DuplicateHandle, GetCurrentProcess, LoadLibraryExA, GetShortPathNameA, lstrcmpiA, MoveFileA, GetStringTypeExA, lstrcpyA, VirtualProtect, GetOEMCP, GetCPInfo, GetWindowsDirectoryA, SetErrorMode, FileTimeToLocalFileTime, GetFileAttributesA, GetFileAttributesExA, GetFileSizeEx, GetFileTime, LocalFileTimeToFileTime, SetFileAttributesA, SetFileTime, SystemTimeToTzSpecificLocalTime, VerSetConditionMask, VerifyVersionInfoA, FindResourceExW, GetTempPathA, GetTickCount, GetProfileIntA, SearchPathA, Sleep, GetDiskFreeSpaceA, GetTempFileNameA, ReplaceFileA, GetUserDefaultLCID, LocalLock, LocalUnlock, ResetEvent, WaitForSingleObjectEx, CreateEventW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead
                                  USER32.dllHideCaret, EnableScrollBar, MessageBeep, GetIconInfo, DrawIconEx, IsRectEmpty, DrawFocusRect, GetNextDlgGroupItem, ReuseDDElParam, UnpackDDElParam, GetMenuBarInfo, LoadImageA, InsertMenuItemA, LoadMenuA, TranslateAcceleratorA, LoadAcceleratorsA, BringWindowToTop, GetMenuDefaultItem, CreatePopupMenu, MapDialogRect, GetAsyncKeyState, LoadImageW, TrackMouseEvent, LoadCursorW, WindowFromPoint, ReleaseCapture, SetCapture, WaitMessage, CharUpperA, DestroyIcon, InvalidateRect, KillTimer, SetTimer, DeleteMenu, CopyImage, GetDialogBaseUnits, RealChildWindowFromPoint, IntersectRect, LoadCursorA, GetSysColorBrush, IsDialogMessageA, SetWindowTextA, ScrollWindowEx, IsDlgButtonChecked, CheckRadioButton, CheckDlgButton, GetDlgItemTextA, SetDlgItemTextA, GetDlgItemInt, SetDlgItemInt, MoveWindow, ShowWindow, GetMonitorInfoA, MonitorFromWindow, WinHelpA, GetScrollInfo, SetScrollInfo, LoadIconA, GetTopWindow, GetClassNameA, GetClassLongA, SetWindowLongA, PtInRect, EqualRect, MapWindowPoints, AdjustWindowRectEx, GetWindowRect, RemovePropA, GetPropA, SetPropA, ShowScrollBar, GetScrollRange, SetScrollRange, ScrollWindow, RedrawWindow, InvertRect, GetForegroundWindow, UpdateWindow, TrackPopupMenuEx, TrackPopupMenu, SetMenu, GetMenu, GetCapture, GetDlgCtrlID, SetClassLongA, DeferWindowPos, BeginDeferWindowPos, SetWindowPlacement, GetWindowPlacement, SetWindowPos, IsChild, IsMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, CallWindowProcA, DefWindowProcA, GetMessageTime, GetMessagePos, RegisterWindowMessageA, OffsetRect, SetRectEmpty, SendDlgItemMessageA, GetWindow, GetWindowTextLengthA, GetWindowTextA, GetScrollPos, SetScrollPos, SetFocus, SystemParametersInfoA, InflateRect, SetWindowRgn, SetParent, DrawEdge, GetMenuItemCount, InsertMenuA, RemoveMenu, IsWindow, GetKeyNameTextA, GetMenuItemInfoA, DestroyMenu, FillRect, GetSysColor, ScreenToClient, ClientToScreen, EndPaint, BeginPaint, GetWindowDC, TabbedTextOutA, GrayStringA, DrawTextExA, DrawTextA, UnhookWindowsHookEx, GetLastActivePopup, GetWindowThreadProcessId, DrawFrameControl, IsZoomed, LoadMenuW, SetCursorPos, CopyIcon, SendMessageA, IsIconic, EnableWindow, GetSystemMetrics, GetSystemMenu, AppendMenuA, DrawIcon, FrameRect, NotifyWinEvent, MessageBoxA, SetCursor, SetLayeredWindowAttributes, EnumDisplayMonitors, OpenClipboard, CloseClipboard, SetClipboardData, EmptyClipboard, SetForegroundWindow, DrawStateA, MapVirtualKeyA, GetDC, ReleaseDC, CopyRect, GetFocus, CheckMenuItem, EnableMenuItem, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, SetMenuItemInfoA, GetParent, LoadBitmapW, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetDlgItem, GetNextDlgTabItem, GetActiveWindow, IsWindowEnabled, SetActiveWindow, GetWindowLongA, GetDesktopWindow, GetMessageA, TranslateMessage, DispatchMessageA, PeekMessageA, IsWindowVisible, GetKeyState, ValidateRect, GetCursorPos, SetWindowsHookExA, CallNextHookEx, PostMessageA, PostQuitMessage, ShowOwnedPopups, GetClientRect, LoadIconW, UnregisterClassA, GetMenuStringA, GetMenuState, GetMenuItemID, GetTabbedTextExtentW, GetTabbedTextExtentA, DestroyCursor, GetWindowRgn, WindowFromDC, CreateMenu, InSendMessage, MonitorFromRect, SendNotifyMessageA, SubtractRect, TranslateMDISysAccel, DefMDIChildProcA, DefFrameProcA, DrawMenuBar, EnumChildWindows, GetDCEx, GetUpdateRect, IsClipboardFormatAvailable, CharUpperBuffA, RegisterClipboardFormatA, ModifyMenuA, GetDoubleClickTime, SetMenuDefaultItem, LockWindowUpdate, SetRect, CopyAcceleratorTableA, DestroyAcceleratorTable, CreateAcceleratorTableA, LoadAcceleratorsW, ToAsciiEx, GetKeyboardState, MapVirtualKeyExA, IsCharLowerA, GetKeyboardLayout, PostThreadMessageA, GetComboBoxInfo, MonitorFromPoint, UpdateLayeredWindow, UnionRect, EndDeferWindowPos, GetSubMenu
                                  GDI32.dllGetTextFaceA, GetTextExtentPoint32W, GetTextExtentPointA, GetTextAlign, GetStretchBltMode, GetPolyFillMode, GetNearestColor, GetBkMode, GetROP2, SetAbortProc, AbortDoc, EndPage, StartPage, EndDoc, DeleteMetaFile, CreateMetaFileA, CloseMetaFile, GetViewportOrgEx, GetWindowOrgEx, SetPixelV, SetPaletteEntries, ExtFloodFill, PtInRegion, GetBoundsRect, FrameRgn, FillRgn, RoundRect, GetCurrentObject, OffsetRgn, GetRgnBox, Rectangle, StretchDIBits, GetCharWidthA, CreateFontA, EnumFontFamiliesExA, LPtoDP, CreateRoundRectRgn, Polyline, Polygon, CreatePolygonRgn, GetTextColor, Ellipse, CreateEllipticRgn, SetDIBColorTable, CreateDIBSection, StretchBlt, SetPixel, GetDIBits, GetTextCharsetInfo, EnumFontFamiliesA, CreateDIBitmap, GetBkColor, RealizePalette, GetSystemPaletteEntries, GetPaletteEntries, GetNearestPaletteIndex, CreatePalette, CreateCompatibleBitmap, GetTextMetricsA, DPtoLP, SetRectRgn, GetMapMode, CombineRgn, GetTextExtentPoint32A, CreateFontIndirectA, ScaleWindowExtEx, ScaleViewportExtEx, OffsetWindowOrgEx, OffsetViewportOrgEx, SetWindowOrgEx, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, PolylineTo, PolyBezierTo, ExtTextOutA, TextOutA, MoveToEx, GetObjectA, ExtCreatePen, SetArcDirection, SelectClipPath, PolyDraw, ArcTo, StartDocA, SetColorAdjustment, ModifyWorldTransform, SetWorldTransform, EnumMetaFile, PlayMetaFileRecord, SetTextJustification, SetTextAlign, SetTextColor, SetTextCharacterExtra, SetStretchBltMode, SetROP2, SetPolyFillMode, GetLayout, SetLayout, SetMapMode, SetGraphicsMode, SetMapperFlags, SetBkMode, SetBkColor, SelectPalette, SelectObject, ExtSelectClipRgn, SelectClipRgn, SaveDC, RestoreDC, RectVisible, PtVisible, PlayMetaFile, OffsetClipRgn, LineTo, IntersectClipRect, GetWindowExtEx, GetViewportExtEx, GetStockObject, GetPixel, GetObjectType, GetCurrentPositionEx, GetClipRgn, GetClipBox, ExcludeClipRect, Escape, DeleteObject, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePatternBrush, CreatePen, CreateHatchBrush, CreateDIBPatternBrushPt, CreateCompatibleDC, BitBlt, CreateBitmap, PatBlt, CreateRectRgnIndirect, GetDeviceCaps, CreateDCA, CopyMetaFileA
                                  MSIMG32.dllTransparentBlt, AlphaBlend
                                  WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter, GetJobA
                                  ADVAPI32.dllRegSetValueA, RegOpenKeyExA, RegQueryValueExA, GetFileSecurityA, SetFileSecurityA, RegEnumKeyExA, RegOpenKeyExW, RegEnumValueA, RegQueryValueA, RegEnumKeyA, RegSetValueExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey
                                  SHELL32.dllDragFinish, DragQueryFileA, SHGetDesktopFolder, SHBrowseForFolderA, ShellExecuteA, SHGetPathFromIDListA, SHGetFileInfoA, ExtractIconA, SHAddToRecentDocs, SHAppBarMessage, SHGetSpecialFolderLocation, SHGetMalloc, ShellExecuteExA
                                  COMCTL32.dllImageList_ReplaceIcon
                                  SHLWAPI.dllPathStripToRootA, PathIsUNCA, PathRemoveExtensionA, PathFindFileNameA, PathFindExtensionA, StrFormatKBSizeA, PathRemoveFileSpecW
                                  UxTheme.dllGetThemeSysColor, GetWindowTheme, IsAppThemed, GetThemePartSize, IsThemeBackgroundPartiallyTransparent, DrawThemeText, DrawThemeParentBackground, OpenThemeData, CloseThemeData, DrawThemeBackground, GetThemeColor, GetCurrentThemeName
                                  ole32.dllCoLockObjectExternal, OleGetClipboard, DoDragDrop, OleIsCurrentClipboard, OleQueryCreateFromData, CoFreeUnusedLibraries, RevokeDragDrop, PropVariantCopy, OleSetMenuDescriptor, OleLockRunning, StgCreateDocfile, StgOpenStorage, StgOpenStorageOnILockBytes, StgIsStorageFile, CreateILockBytesOnHGlobal, CreateFileMoniker, OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleRegGetMiscStatus, OleRegEnumVerbs, StgCreateDocfileOnILockBytes, WriteClassStm, GetHGlobalFromILockBytes, CreateGenericComposite, CreateItemMoniker, OleCreate, OleCreateFromData, OleCreateLinkFromData, OleCreateStaticFromData, RegisterDragDrop, OleFlushClipboard, OleSetClipboard, CreateStreamOnHGlobal, CoInitializeEx, CoDisconnectObject, StringFromGUID2, CoCreateGuid, OleRun, OleCreateLinkToFile, OleCreateFromFile, CLSIDFromProgID, CLSIDFromString, SetConvertStg, OleRegGetUserType, ReleaseStgMedium, OleDuplicateData, ReadFmtUserTypeStg, WriteFmtUserTypeStg, CreateBindCtx, CoTreatAsClass, WriteClassStg, ReadClassStg, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoInitialize, CoCreateInstance, CoUninitialize, OleLoad, OleSave, OleSaveToStream, OleSetContainedObject, OleGetIconOfClass, CreateDataAdviseHolder, CreateOleAdviseHolder, GetRunningObjectTable, OleIsRunning, CoGetMalloc, OleInitialize, CoRegisterMessageFilter, CoRevokeClassObject, CoRegisterClassObject, CoGetClassObject, OleUninitialize, OleQueryLinkFromData
                                  OLEAUT32.dllSysAllocString, SysStringLen, VariantChangeType, SysAllocStringLen, SysReAllocStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, SafeArrayAllocDescriptor, SafeArrayAllocData, SafeArrayCreate, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayDestroy, SafeArrayRedim, SafeArrayGetDim, SafeArrayGetElemsize, SysAllocStringByteLen, SafeArrayUnlock, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayPutElement, SafeArrayCopy, SafeArrayPtrOfIndex, VariantCopy, VarDateFromStr, VarCyFromStr, VarBstrFromCy, VarBstrFromDate, VarBstrFromDec, VarDecFromStr, LoadTypeLib, LoadRegTypeLib, RegisterTypeLib, SafeArrayGetUBound, SysStringByteLen, VariantClear, VariantInit, SafeArrayGetLBound, SafeArrayGetElement, SafeArrayLock, SysFreeString
                                  oledlg.dll
                                  gdiplus.dllGdipDrawImageRectI, GdipSetInterpolationMode, GdipCreateFromHDC, GdipCreateBitmapFromHBITMAP, GdipDrawImageI, GdipDeleteGraphics, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromFileICM, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromFile, GdipCreateBitmapFromStream, GdipGetImagePaletteSize, GdipGetImagePalette, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipGetImageGraphicsContext, GdipDisposeImage, GdipCloneImage, GdiplusStartup, GdipFree, GdipAlloc, GdiplusShutdown
                                  OLEACC.dllAccessibleObjectFromWindow, LresultFromObject, CreateStdAccessibleObject
                                  IMM32.dllImmReleaseContext, ImmGetOpenStatus, ImmGetContext
                                  WINMM.dllPlaySoundA

                                  Version Infos

                                  DescriptionData
                                  LegalCopyrightCopyright 2008-2021 XnView
                                  InternalNameXnView MP
                                  FileVersion0.99.1.0
                                  CompanyNameXnView, http://www.xnview.com
                                  ProductNameXnView MP Application
                                  ProductVersion0.99.1.0
                                  FileDescriptionXnView MP
                                  OriginalFilenamexnviewmp.exe
                                  Translation0x040c 0x04b0

                                  Possible Origin

                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2021 14:34:01.705142021 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:34:01.734396935 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:34:01.734606028 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:34:01.735004902 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:34:01.822124004 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:34:01.837641954 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:34:01.960125923 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:34:33.478473902 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:34:33.481177092 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:34:33.576091051 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:35:33.778160095 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:35:33.778877974 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:35:33.874748945 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:36:34.102082968 CET33604977751.195.57.233192.168.2.6
                                  Nov 17, 2021 14:36:34.102746964 CET497773360192.168.2.651.195.57.233
                                  Nov 17, 2021 14:36:34.195188046 CET33604977751.195.57.233192.168.2.6

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2021 14:34:01.496373892 CET5529953192.168.2.68.8.8.8
                                  Nov 17, 2021 14:34:01.583832026 CET53552998.8.8.8192.168.2.6

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Nov 17, 2021 14:34:01.496373892 CET192.168.2.68.8.8.80xa048Standard query (0)calibare5454.proA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Nov 17, 2021 14:34:01.583832026 CET8.8.8.8192.168.2.60xa048No error (0)calibare5454.pro51.195.57.233A (IP address)IN (0x0001)
                                  Nov 17, 2021 14:37:19.377098083 CET8.8.8.8192.168.2.60xdb66No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:14:32:39
                                  Start date:17/11/2021
                                  Path:C:\Users\user\Desktop\important invoice presentation nov 2021.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\important invoice presentation nov 2021.exe"
                                  Imagebase:0x1250000
                                  File size:3391296 bytes
                                  MD5 hash:1364844E0BFB349272C5050FB0E677E3
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000001.00000002.507835553.000000001C8F0000.00000040.00000001.sdmp, Author: Joe Security
                                  Reputation:low

                                  General

                                  Start time:14:33:44
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd /c xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                                  Imagebase:0x2a0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:33:45
                                  Start date:17/11/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff61de10000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:33:46
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\xcopy.exe
                                  Wow64 process (32bit):true
                                  Commandline:xcopy "C:\Users\user\Desktop\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                                  Imagebase:0x12c0000
                                  File size:44544 bytes
                                  MD5 hash:9F3712DDC0D7FE3D75B8A06C6EE8E68C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  General

                                  Start time:14:33:49
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                                  Imagebase:0x2a0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:33:50
                                  Start date:17/11/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff61de10000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:33:50
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                                  Imagebase:0xa10000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:33:51
                                  Start date:17/11/2021
                                  Path:C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe
                                  Imagebase:0xb90000
                                  File size:3391296 bytes
                                  MD5 hash:1364844E0BFB349272C5050FB0E677E3
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 0000000D.00000002.683551594.000000001CF00000.00000040.00000001.sdmp, Author: Joe Security
                                  Reputation:low

                                  General

                                  Start time:14:33:51
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\xwizard.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\System32\xwizard.exe
                                  Imagebase:0x11e0000
                                  File size:55808 bytes
                                  MD5 hash:17059CA3DDD41B52DE4140705B38AE53
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 0000000E.00000002.863773731.0000000000422000.00000004.00020000.sdmp, Author: Joe Security
                                  Reputation:low

                                  General

                                  Start time:14:35:08
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd /c xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "%ProgramFiles%\Security\" /y /i /c /q
                                  Imagebase:0x2a0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:35:09
                                  Start date:17/11/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff61de10000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:35:10
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\xcopy.exe
                                  Wow64 process (32bit):true
                                  Commandline:xcopy "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" "C:\Program Files (x86)\Security\" /y /i /c /q
                                  Imagebase:0x7ff7e33a0000
                                  File size:44544 bytes
                                  MD5 hash:9F3712DDC0D7FE3D75B8A06C6EE8E68C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  General

                                  Start time:14:35:11
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd /c schtasks /create /sc ONLOGON /tn "Security" /tr "%ProgramFiles%\Security\important invoice presentation nov 2021.exe" /it /f
                                  Imagebase:0x2a0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:35:12
                                  Start date:17/11/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff61de10000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language

                                  General

                                  Start time:14:35:12
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /sc ONLOGON /tn "Security" /tr "C:\Program Files (x86)\Security\important invoice presentation nov 2021.exe" /it /f
                                  Imagebase:0xa10000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language

                                  General

                                  Start time:14:35:13
                                  Start date:17/11/2021
                                  Path:C:\Windows\SysWOW64\xwizard.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\System32\xwizard.exe
                                  Imagebase:0x11e0000
                                  File size:55808 bytes
                                  MD5 hash:17059CA3DDD41B52DE4140705B38AE53
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmp, Author: Joe Security
                                  • Rule: netwire, Description: detect netwire in memory, Source: 0000001E.00000002.688394318.0000000000422000.00000004.00020000.sdmp, Author: JPCERT/CC Incident Response Group

                                  Disassembly

                                  Code Analysis

                                  Reset < >