Loading ...

Play interactive tourEdit tour

Windows Analysis Report dxEOMYaOtV.exe

Overview

General Information

Sample Name:dxEOMYaOtV.exe
Analysis ID:534013
MD5:a20a44e2add8f2ee2434258a20ac815e
SHA1:bf2886c5bda80c2cc1a1a8d3d270f3e82f3f39b9
SHA256:87b9a82fa05019692e89dc944a4fe1ab669d1c844abfd509c7e3648a024d4a73
Tags:exenjratRAT
Infos:

Most interesting Screenshot:

Errors
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Backup Database
  • Sigma runtime error: Invalid condition: all of selection* Rule: Stop Or Remove Antivirus Service
  • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Volume Shadow Listing
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With 7-ZIP
  • Sigma runtime error: Invalid condition: all of selection* Rule: Disable or Delete Windows Eventlog
  • Sigma runtime error: Invalid condition: all of selection* Rule: PowerShell SAM Copy
  • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With WINZIP

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Uses netsh to modify the Windows network and firewall settings
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Modifies the windows firewall
Contains functionality to spread to USB devices (.Net source)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
May infect USB drives
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Abnormal high CPU Usage
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Creates a window with clipboard capturing capabilities
Sigma detected: Netsh Port or Application Allowed

Classification

Process Tree

  • System is w10x64
  • dxEOMYaOtV.exe (PID: 7008 cmdline: "C:\Users\user\Desktop\dxEOMYaOtV.exe" MD5: A20A44E2ADD8F2EE2434258A20AC815E)
    • netsh.exe (PID: 7096 cmdline: netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
      • conhost.exe (PID: 7108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Njrat

{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "3f0e7e396c4b65a76b6471f1f9d6d90a", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "SoftwareMicrosoftWindowsCurrentVersionRun", "Port": "NDQz", "Network Seprator": "|'|'|"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
dxEOMYaOtV.exeMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
  • 0x13292:$s1: wireshark
  • 0x1325c:$s2: procexp
dxEOMYaOtV.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
  • 0x15ca9:$x1: cmd.exe /c ping 0 -n 2 & del "
  • 0x137c2:$s1: winmgmts:\\.\root\SecurityCenter2
  • 0x15717:$s3: Executed As
  • 0x124f0:$s5: Stub.exe
  • 0x156f9:$s6: Download ERROR
  • 0x13784:$s8: Select * From AntiVirusProduct
dxEOMYaOtV.exeJoeSecurity_NjratYara detected NjratJoe Security
    dxEOMYaOtV.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15a57:$reg: SEE_MASK_NOZONECHECKS
    • 0x156dd:$msg: Execute ERROR
    • 0x15731:$msg: Execute ERROR
    • 0x15ca9:$ping: cmd.exe /c ping 0 -n 2 & del

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x15857:$reg: SEE_MASK_NOZONECHECKS
      • 0x154dd:$msg: Execute ERROR
      • 0x15531:$msg: Execute ERROR
      • 0x15aa9:$ping: cmd.exe /c ping 0 -n 2 & del
      00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x15857:$reg: SEE_MASK_NOZONECHECKS
        • 0x154dd:$msg: Execute ERROR
        • 0x15531:$msg: Execute ERROR
        • 0x15aa9:$ping: cmd.exe /c ping 0 -n 2 & del
        00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          Click to see the 1 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          0.0.dxEOMYaOtV.exe.3b0000.0.unpackMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
          • 0x13292:$s1: wireshark
          • 0x1325c:$s2: procexp
          0.0.dxEOMYaOtV.exe.3b0000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0x15ca9:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0x137c2:$s1: winmgmts:\\.\root\SecurityCenter2
          • 0x15717:$s3: Executed As
          • 0x124f0:$s5: Stub.exe
          • 0x156f9:$s6: Download ERROR
          • 0x13784:$s8: Select * From AntiVirusProduct
          0.0.dxEOMYaOtV.exe.3b0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.dxEOMYaOtV.exe.3b0000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x15a57:$reg: SEE_MASK_NOZONECHECKS
            • 0x156dd:$msg: Execute ERROR
            • 0x15731:$msg: Execute ERROR
            • 0x15ca9:$ping: cmd.exe /c ping 0 -n 2 & del
            0.2.dxEOMYaOtV.exe.3b0000.0.unpackMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
            • 0x13292:$s1: wireshark
            • 0x1325c:$s2: procexp
            Click to see the 3 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Netsh Port or Application AllowedShow sources
            Source: Process startedAuthor: Markus Neis, Sander Wiebing: Data: Command: netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE, CommandLine: netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE, CommandLine|base64offset|contains: l, Image: C:\Windows\SysWOW64\netsh.exe, NewProcessName: C:\Windows\SysWOW64\netsh.exe, OriginalFileName: C:\Windows\SysWOW64\netsh.exe, ParentCommandLine: "C:\Users\user\Desktop\dxEOMYaOtV.exe" , ParentImage: C:\Users\user\Desktop\dxEOMYaOtV.exe, ParentProcessId: 7008, ProcessCommandLine: netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE, ProcessId: 7096

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "3f0e7e396c4b65a76b6471f1f9d6d90a", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "SoftwareMicrosoftWindowsCurrentVersionRun", "Port": "NDQz", "Network Seprator": "|'|'|"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: dxEOMYaOtV.exeVirustotal: Detection: 66%Perma Link
            Source: dxEOMYaOtV.exeReversingLabs: Detection: 92%
            Yara detected NjratShow sources
            Source: Yara matchFile source: dxEOMYaOtV.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dxEOMYaOtV.exe PID: 7008, type: MEMORYSTR
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: dxEOMYaOtV.exeAvira: detected
            Machine Learning detection for sampleShow sources
            Source: dxEOMYaOtV.exeJoe Sandbox ML: detected
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: dxEOMYaOtV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: dxEOMYaOtV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

            Spreading:

            barindex
            Contains functionality to spread to USB devices (.Net source)Show sources
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, Usb1.cs.Net Code: infect
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, Usb1.cs.Net Code: infect
            Source: dxEOMYaOtV.exeBinary or memory string: [autorun]
            Source: dxEOMYaOtV.exeBinary or memory string: \autorun.inf
            Source: dxEOMYaOtV.exeBinary or memory string: autorun.inf
            Source: dxEOMYaOtV.exe, 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmpBinary or memory string: \autorun.inf
            Source: dxEOMYaOtV.exe, 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmpBinary or memory string: [autorun]
            Source: dxEOMYaOtV.exe, 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmpBinary or memory string: autorun.inf
            Source: dxEOMYaOtV.exeBinary or memory string: \autorun.inf
            Source: dxEOMYaOtV.exeBinary or memory string: [autorun]
            Source: dxEOMYaOtV.exeBinary or memory string: autorun.inf

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: SoftwareMicrosoftWindowsCurrentVersionRun
            Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
            Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
            Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
            Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
            Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
            Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
            Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
            Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
            Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
            Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
            Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
            Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
            Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
            Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
            Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
            Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
            Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
            Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
            Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
            Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
            Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
            Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
            Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
            Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49939
            Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
            Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
            Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
            Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
            Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
            Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
            Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
            Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49917
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
            Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49911
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
            Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
            Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: unknownTCP traffic detected without corresponding DNS query: 109.123.118.63
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183036542.00000000009AB000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183036542.00000000009AB000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183015023.000000000097A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeWindow created: window name: CLIPBRDWNDCLASS

            E-Banking Fraud:

            barindex
            Yara detected NjratShow sources
            Source: Yara matchFile source: dxEOMYaOtV.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dxEOMYaOtV.exe PID: 7008, type: MEMORYSTR

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: dxEOMYaOtV.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: dxEOMYaOtV.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: dxEOMYaOtV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: dxEOMYaOtV.exe, type: SAMPLEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: dxEOMYaOtV.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: dxEOMYaOtV.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_00B72478
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_04B64298
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_04B6428F
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess Stats: CPU usage > 98%
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183015023.000000000097A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs dxEOMYaOtV.exe
            Source: dxEOMYaOtV.exeVirustotal: Detection: 66%
            Source: dxEOMYaOtV.exeReversingLabs: Detection: 92%
            Source: dxEOMYaOtV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\dxEOMYaOtV.exe "C:\Users\user\Desktop\dxEOMYaOtV.exe"
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_052B23DE AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_052B23A7 AdjustTokenPrivileges,
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
            Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@4/2@0/1
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeMutant created: \Sessions\1\BaseNamedObjects\3f0e7e396c4b65a76b6471f1f9d6d90a
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7108:120:WilError_01
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: dxEOMYaOtV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: dxEOMYaOtV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: dxEOMYaOtV.exe, Stub/Fransesco.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, Stub/Fransesco.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, Stub/Fransesco.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exe TID: 7060Thread sleep count: 1811 > 30
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exe TID: 7060Thread sleep time: -181100s >= -30000s
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeWindow / User API: threadDelayed 1811
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeWindow / User API: foregroundWindowGot 997
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeWindow / User API: foregroundWindowGot 500
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeWindow / User API: foregroundWindowGot 498
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183036542.00000000009AB000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" allowDefinition="MachineOnly"/>
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeMemory allocated: page read and write | page guard
            Source: dxEOMYaOtV.exeBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183552920.0000000002A93000.00000004.00000001.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1184101682.0000000004D0B000.00000004.00000010.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1183969540.0000000002EA0000.00000004.00000001.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1183302082.0000000001080000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: dxEOMYaOtV.exe, 00000000.00000002.1184101682.0000000004D0B000.00000004.00000010.sdmpBinary or memory string: C rdProgram Manager
            Source: dxEOMYaOtV.exeBinary or memory string: Shell_TrayWnd
            Source: dxEOMYaOtV.exeBinary or memory string: ProgMan
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183302082.0000000001080000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183302082.0000000001080000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: dxEOMYaOtV.exe, 00000000.00000002.1183552920.0000000002A93000.00000004.00000001.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1183969540.0000000002EA0000.00000004.00000001.sdmp, dxEOMYaOtV.exe, 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmpBinary or memory string: qedProgram Manager
            Source: dxEOMYaOtV.exeBinary or memory string: Shell_traywnd
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeCode function: 0_2_00B7A72E GetUserNameW,

            Lowering of HIPS / PFW / Operating System Security Settings:

            barindex
            Uses netsh to modify the Windows network and firewall settingsShow sources
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE
            Modifies the windows firewallShow sources
            Source: C:\Users\user\Desktop\dxEOMYaOtV.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE

            Stealing of Sensitive Information:

            barindex
            Yara detected NjratShow sources
            Source: Yara matchFile source: dxEOMYaOtV.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dxEOMYaOtV.exe PID: 7008, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected NjratShow sources
            Source: Yara matchFile source: dxEOMYaOtV.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.dxEOMYaOtV.exe.3b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dxEOMYaOtV.exe PID: 7008, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Replication Through Removable Media11Windows Management InstrumentationPath InterceptionAccess Token Manipulation1Masquerading1Input Capture1Security Software Discovery1Replication Through Removable Media11Input Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection2Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools21Security Account ManagerProcess Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection2LSA SecretsPeripheral Device Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing11Cached Domain CredentialsAccount Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery12Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            dxEOMYaOtV.exe66%VirustotalBrowse
            dxEOMYaOtV.exe93%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            dxEOMYaOtV.exe100%AviraTR/Dropper.Gen
            dxEOMYaOtV.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.dxEOMYaOtV.exe.3b0000.0.unpack100%AviraTR/Dropper.GenDownload File
            0.0.dxEOMYaOtV.exe.3b0000.0.unpack100%AviraTR/Dropper.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://go.microsoft.0%URL Reputationsafe
            http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
            SoftwareMicrosoftWindowsCurrentVersionRun0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            SoftwareMicrosoftWindowsCurrentVersionRuntrue
            • Avira URL Cloud: safe
            low

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://go.microsoft.dxEOMYaOtV.exe, 00000000.00000002.1183036542.00000000009AB000.00000004.00000020.sdmpfalse
            • URL Reputation: safe
            unknown
            http://go.microsoft.LinkId=42127dxEOMYaOtV.exe, 00000000.00000002.1183036542.00000000009AB000.00000004.00000020.sdmpfalse
            • Avira URL Cloud: safe
            low

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            109.123.118.63
            unknownUnited Kingdom
            13213UK2NET-ASGBfalse

            General Information

            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:534013
            Start date:05.12.2021
            Start time:00:29:26
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 25s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:dxEOMYaOtV.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.spre.troj.evad.winEXE@4/2@0/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 2.3% (good quality ratio 1.2%)
            • Quality average: 36.6%
            • Quality standard deviation: 35.4%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
            • TCP Packets have been reduced to 100
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            Errors:
            • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Backup Database
            • Sigma runtime error: Invalid condition: all of selection* Rule: Stop Or Remove Antivirus Service
            • Sigma runtime error: Invalid condition: all of selection* Rule: Conti Volume Shadow Listing
            • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With 7-ZIP
            • Sigma runtime error: Invalid condition: all of selection* Rule: Disable or Delete Windows Eventlog
            • Sigma runtime error: Invalid condition: all of selection* Rule: PowerShell SAM Copy
            • Sigma runtime error: Invalid condition: all of selection* Rule: Compress Data and Lock With Password for Exfiltration With WINZIP

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            UK2NET-ASGBiEChGuO0Wy.exeGet hashmaliciousBrowse
            • 37.123.118.150
            ZDSWrJbftX.exeGet hashmaliciousBrowse
            • 37.123.118.150
            Purchase Order.exeGet hashmaliciousBrowse
            • 37.123.118.150
            Invoice.exeGet hashmaliciousBrowse
            • 37.123.118.150
            Poh Tiong Trading - products list.exeGet hashmaliciousBrowse
            • 37.123.118.150
            yMznKPLZVR.exeGet hashmaliciousBrowse
            • 37.123.118.150
            REMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
            • 37.123.118.150
            REMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
            • 37.123.118.150
            ENQ 6205009033-6000003867.exeGet hashmaliciousBrowse
            • 37.123.118.150
            77isbA5bpi.exeGet hashmaliciousBrowse
            • 37.123.118.150
            RTfEx2KIxuGet hashmaliciousBrowse
            • 77.92.90.80
            OlHeE02x0N.exeGet hashmaliciousBrowse
            • 37.123.118.150
            TT COPY_02101011.exeGet hashmaliciousBrowse
            • 37.123.118.150
            XKLyPH8fil.exeGet hashmaliciousBrowse
            • 37.123.118.150
            Citation-HEQ211025001T-EXPP v4,pdf.exeGet hashmaliciousBrowse
            • 37.123.118.150
            VSL_MV SEA-BLUE SHIP OWNERS.exeGet hashmaliciousBrowse
            • 37.123.118.150
            Order.exeGet hashmaliciousBrowse
            • 37.123.118.150
            New Offer.exeGet hashmaliciousBrowse
            • 37.123.118.150
            202111161629639000582.exeGet hashmaliciousBrowse
            • 37.123.118.150
            vGULtWc6Jh.exeGet hashmaliciousBrowse
            • 37.123.118.150

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Roaming\app
            Process:C:\Users\user\Desktop\dxEOMYaOtV.exe
            File Type:UTF-8 Unicode (with BOM) text, with no line terminators
            Category:dropped
            Size (bytes):4
            Entropy (8bit):2.0
            Encrypted:false
            SSDEEP:3:V:V
            MD5:C6BDBC9D86009CCF7E8DE878C9603213
            SHA1:2A4B8716F978F2D107BCD8294B486A5EE45AFE6E
            SHA-256:36A067FDFCEE95EB270F0B72E3B9E40D52C907D749FB9A8490D82F8EE56B29EB
            SHA-512:C42A52CD8837E2533B3D5EC97639F0C94287E3D7A6C73635C21DF50EBA8483B60DF15BF262A308836875CD9AFED504E7F98A2F6B254E4181FE548B1853D42256
            Malicious:false
            Reputation:low
            Preview: .5
            \Device\ConDrv
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Reputation:high, very likely benign file
            Preview: ..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.567952442278428
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:dxEOMYaOtV.exe
            File size:95232
            MD5:a20a44e2add8f2ee2434258a20ac815e
            SHA1:bf2886c5bda80c2cc1a1a8d3d270f3e82f3f39b9
            SHA256:87b9a82fa05019692e89dc944a4fe1ab669d1c844abfd509c7e3648a024d4a73
            SHA512:ebb8b81d74aaf9475f64a23116da3d62497a6c92f6a7ac33fdcb7895e0aab6419c86ab92e104dc66cfc13a5bd0faa104fb3a997ce7bcfd0044e2ad3d25273e36
            SSDEEP:1536:RUXTr1IDavlZhbSKa9YdjEwzGi1dDyD6gS:RUXSDavlZIXmqi1dk/
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!.a.................p............... ........@.. ....................................@................................

            File Icon

            Icon Hash:00828e8e8686b000

            Static PE Info

            General

            Entrypoint:0x418f2e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x61A921A0 [Thu Dec 2 19:42:24 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:v2.0.50727
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

            Entrypoint Preview

            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed80x53.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x16f340x17000False0.368089758832data5.59964154951IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .reloc0x1a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

            Imports

            DLLImport
            mscoree.dll_CorExeMain

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Dec 5, 2021 00:30:28.051211119 CET49764443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:28.051249027 CET44349764109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:28.051323891 CET49764443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:28.282568932 CET49764443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:28.282613993 CET44349764109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:28.282705069 CET44349764109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:30.290872097 CET49765443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:30.290950060 CET44349765109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:30.291079044 CET49765443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:30.292226076 CET49765443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:30.292262077 CET44349765109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:30.292335033 CET44349765109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:32.307003975 CET49766443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:32.307065010 CET44349766109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:32.307214022 CET49766443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:32.308785915 CET49766443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:32.308821917 CET44349766109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:32.308876991 CET44349766109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:34.354434013 CET49767443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:34.354479074 CET44349767109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:34.354573011 CET49767443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:34.355950117 CET49767443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:34.355978012 CET44349767109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:34.356045961 CET44349767109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:36.465723038 CET49768443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:36.465790033 CET44349768109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:36.465889931 CET49768443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:36.466759920 CET49768443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:36.466789007 CET44349768109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:36.466886044 CET44349768109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:38.479134083 CET49769443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:38.479182005 CET44349769109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:38.479335070 CET49769443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:38.481561899 CET49769443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:38.481578112 CET44349769109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:38.481667042 CET44349769109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:40.495225906 CET49770443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:40.495274067 CET44349770109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:40.495368958 CET49770443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:40.496953011 CET49770443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:40.496970892 CET44349770109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:40.497047901 CET44349770109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:42.510999918 CET49771443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:42.511065006 CET44349771109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:42.511161089 CET49771443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:42.512016058 CET49771443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:42.512041092 CET44349771109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:42.512113094 CET44349771109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:44.525800943 CET49772443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:44.525851011 CET44349772109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:44.525952101 CET49772443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:44.526917934 CET49772443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:44.526936054 CET44349772109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:44.526997089 CET44349772109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:46.553313971 CET49773443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:46.553364038 CET44349773109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:46.553448915 CET49773443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:46.554281950 CET49773443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:46.554296970 CET44349773109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:46.554372072 CET44349773109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:46.554568052 CET49773443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:46.554583073 CET44349773109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:48.570416927 CET49774443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:48.570487022 CET44349774109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:48.570611954 CET49774443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:48.572103977 CET49774443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:48.572127104 CET44349774109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:48.572212934 CET44349774109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:50.588819981 CET49777443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:50.588891983 CET44349777109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:50.588983059 CET49777443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:50.589863062 CET49777443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:50.589890003 CET44349777109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:50.589975119 CET44349777109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:52.604760885 CET49778443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:52.604837894 CET44349778109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:52.605140924 CET49778443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:52.606569052 CET49778443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:52.606606007 CET44349778109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:52.606647968 CET44349778109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:54.620657921 CET49779443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:54.620702028 CET44349779109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:54.620773077 CET49779443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:54.621716022 CET49779443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:54.621737003 CET44349779109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:54.621789932 CET44349779109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:56.636663914 CET49780443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:56.636735916 CET44349780109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:56.636835098 CET49780443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:56.638216019 CET49780443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:56.638240099 CET44349780109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:56.638307095 CET44349780109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:58.652590036 CET49781443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:58.652652025 CET44349781109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:58.652776003 CET49781443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:58.654016972 CET49781443192.168.2.4109.123.118.63
            Dec 5, 2021 00:30:58.654047012 CET44349781109.123.118.63192.168.2.4
            Dec 5, 2021 00:30:58.654145956 CET44349781109.123.118.63192.168.2.4
            Dec 5, 2021 00:31:00.669383049 CET49782443192.168.2.4109.123.118.63
            Dec 5, 2021 00:31:00.669451952 CET44349782109.123.118.63192.168.2.4

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:00:30:18
            Start date:05/12/2021
            Path:C:\Users\user\Desktop\dxEOMYaOtV.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\dxEOMYaOtV.exe"
            Imagebase:0x3b0000
            File size:95232 bytes
            MD5 hash:A20A44E2ADD8F2EE2434258A20AC815E
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, Author: Joe Security
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1182843286.00000000003B2000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, Author: Joe Security
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.656185698.00000000003B2000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1183435675.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:00:30:20
            Start date:05/12/2021
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\Desktop\dxEOMYaOtV.exe" "dxEOMYaOtV.exe" ENABLE
            Imagebase:0x9f0000
            File size:82944 bytes
            MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:00:30:21
            Start date:05/12/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff724c50000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Code Analysis

            Reset < >